CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
86.7%
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed :
CVE-2019-19081: Fixed a memory leak in the nfp_flower_spawn_vnic_reprs() could have allowed attackers to cause a denial of service (bsc#1157045).
CVE-2019-19080: Fixed four memory leaks in the nfp_flower_spawn_phy_reprs() could have allowed attackers to cause a denial of service (bsc#1157044).
CVE-2019-19052: Fixed a memory leak in the gs_can_open() which could have led to denial of service (bsc#1157324).
CVE-2019-19067: Fixed multiple memory leaks in acp_hw_init (bsc#1157180).
CVE-2019-19060: Fixed a memory leak in the adis_update_scan_mode() which could have led to denial of service (bsc#1157178).
CVE-2019-19049: Fixed a memory leak in unittest_data_add (bsc#1157173).
CVE-2019-19075: Fixed a memory leak in the ca8210_probe() which could have led to denial of service by triggering ca8210_get_platform_data() failures (bsc#1157162).
CVE-2019-19058: Fixed a memory leak in the alloc_sgtable() which could have led to denial of service by triggering alloc_page() failures (bsc#1157145).
CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd() function which could have led to denial of service (bsc#1157143).
CVE-2019-19073: Fixed multiple memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c which could have led to denial of service by triggering wait_for_completion_timeout() failures (bsc#1157070).
CVE-2019-19083: Fixed multiple memory leaks in *clock_source_create() functions which could have led to denial of service (bsc#1157049).
CVE-2019-19082: Fixed multiple memory leaks in *create_resource_pool() which could have led to denial of service (bsc#1157046).
CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() which might have led denial of service (bsc#1149448).
CVE-2019-0154: Fixed an improper access control in subsystem for Intel ® processor graphics whichs may have allowed an authenticated user to potentially enable denial of service via local access (bsc#1135966).
CVE-2019-0155: Fixed an improper access control in subsystem for Intel ® processor graphics whichs may have allowed an authenticated user to potentially enable escalation of privilege via local access (bsc#1135967).
CVE-2019-16231: Fixed a NULL pointer dereference due to lack of checking the alloc_workqueue return value (bsc#1150466).
CVE-2019-18805: Fixed an integer overflow in tcp_ack_update_rtt() leading to a denial of service or possibly unspecified other impact (bsc#1156187).
CVE-2019-17055: Enforced CAP_NET_RAW in the AF_ISDN network module to restrict unprivileged users to create a raw socket (bsc#1152782).
CVE-2019-16995: Fixed a memory leak in hsr_dev_finalize() which may have caused denial of service (bsc#1152685).
CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the alloc_workqueue return value, leading to a NULL pointer dereference.
(bsc#1150457).
CVE-2019-10220: Added sanity checks on the pathnames passed to the user space. (bsc#1144903)
CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code (bsc#1154372).
CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW, which meant that unprivileged users could create a raw socket (bsc#1152788).
CVE-2019-14821: An out-of-bounds access issue was fixed in the kernel’s kvm hypervisor. An unprivileged host user or process with access to ‘/dev/kvm’ device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system (bnc#1151350).
CVE-2017-18595: A double free in allocate_trace_buffer was fixed (bnc#1149555).
CVE-2019-9506: The Bluetooth BR/EDR specification used to permit sufficiently low encryption key length and did not prevent an attacker from influencing the key length negotiation. This allowed practical brute-force attacks (aka ‘KNOB’) that could decrypt traffic and inject arbitrary ciphertext without the victim noticing (bnc#1137865).
CVE-2019-14835: A buffer overflow flaw was found in the kernel’s vhost functionality that translates virtqueue buffers to IOVs. A privileged guest user able to pass descriptors with invalid length to the host could use this flaw to increase their privileges on the host (bnc#1150112).
CVE-2019-9456: An out-of-bounds write in the USB monitor driver has been fixed. This issue could lead to local escalation of privilege with System execution privileges needed. (bnc#1150025).
CVE-2019-15030, CVE-2019-15031: On the powerpc platform, a local user could read vector registers of other users’ processes via an interrupt (bsc#1149713).
CVE-2019-18683: An issue was discovered in drivers/media/platform/vivid. It is exploitable for privilege escalation on some Linux distributions where local users have /dev/video0 access, but only if the driver happens to be loaded. There are multiple race conditions during streaming stopping in this driver (part of the V4L2 subsystem). These issues are caused by wrong mutex locking in vivid_stop_generating_vid_cap(), vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the corresponding kthreads. At least one of these race conditions leads to a use-after-free (bnc#1155897).
CVE-2019-18809: A memory leak in the af9005_identify_state() function in drivers/media/usb/dvb-usb/af9005.c allows attackers to cause a denial of service (memory consumption), aka CID-2289adbfa559 (bnc#1156258).
CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2 (bnc#1157032).
CVE-2019-18660: The Linux kernel on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c (bnc#1157038).
CVE-2019-14895: A heap-based buffer overflow was discovered in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code (bnc#1157158).
CVE-2019-19065: A memory leak in the sdma_init() function in drivers/infiniband/hw/hfi1/sdma.c allows attackers to cause a denial of service (memory consumption) by triggering rhashtable_init() failures, aka CID-34b3be18a04e (bnc#1157191).
CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e (bnc#1157193).
CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932 (bnc#1157197).
CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113 (bnc#1157298).
CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c allow attackers to cause a denial of service (bsc#1157304).
CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6 (bnc#1157307).
CVE-2019-19062: A memory leak in the crypto_report() function in crypto/crypto_user_base.c allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042 (bnc#1157333).
CVE-2019-19227: In the AppleTalk subsystem, there is a potential NULL pointer dereference because register_snap_client may return NULL. This will lead to denial of service in net/appletalk/aarp.c and net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka CID-9804501fa122 (bnc#1157678).
CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with Transactional Memory support could be used to facilitate sidechannel information leaks out of microarchitectural buffers, similar to the previously described ‘Microarchitectural Data Sampling’ attack.
The Linux kernel was supplemented with the option to disable TSX operation altogether (requiring CPU Microcode updates on older systems) and better flushing of microarchitectural buffers (VERW).
The set of options available is described in our TID at https://www.suse.com/support/kb/doc/?id=7024251
The update package also includes non-security fixes. See advisory for details.
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from SUSE update advisory SUSE-SU-2019:3200-1.
# The text itself is copyright (C) SUSE.
#
include('compat.inc');
if (description)
{
script_id(131833);
script_version("1.5");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/04/05");
script_cve_id(
"CVE-2017-18595",
"CVE-2019-0154",
"CVE-2019-0155",
"CVE-2019-9456",
"CVE-2019-9506",
"CVE-2019-10220",
"CVE-2019-11135",
"CVE-2019-14821",
"CVE-2019-14835",
"CVE-2019-14895",
"CVE-2019-15030",
"CVE-2019-15031",
"CVE-2019-15916",
"CVE-2019-16231",
"CVE-2019-16233",
"CVE-2019-16995",
"CVE-2019-17055",
"CVE-2019-17056",
"CVE-2019-17666",
"CVE-2019-18660",
"CVE-2019-18683",
"CVE-2019-18805",
"CVE-2019-18809",
"CVE-2019-19046",
"CVE-2019-19049",
"CVE-2019-19052",
"CVE-2019-19056",
"CVE-2019-19057",
"CVE-2019-19058",
"CVE-2019-19060",
"CVE-2019-19062",
"CVE-2019-19063",
"CVE-2019-19065",
"CVE-2019-19067",
"CVE-2019-19068",
"CVE-2019-19073",
"CVE-2019-19074",
"CVE-2019-19075",
"CVE-2019-19078",
"CVE-2019-19080",
"CVE-2019-19081",
"CVE-2019-19082",
"CVE-2019-19083",
"CVE-2019-19227"
);
script_name(english:"SUSE SLES12 Security Update : kernel (SUSE-SU-2019:3200-1)");
script_set_attribute(attribute:"synopsis", value:
"The remote SUSE host is missing one or more security updates.");
script_set_attribute(attribute:"description", value:
"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various
security and bugfixes.
The following security bugs were fixed :
CVE-2019-19081: Fixed a memory leak in the
nfp_flower_spawn_vnic_reprs() could have allowed attackers to cause a
denial of service (bsc#1157045).
CVE-2019-19080: Fixed four memory leaks in the
nfp_flower_spawn_phy_reprs() could have allowed attackers to cause a
denial of service (bsc#1157044).
CVE-2019-19052: Fixed a memory leak in the gs_can_open() which could
have led to denial of service (bsc#1157324).
CVE-2019-19067: Fixed multiple memory leaks in acp_hw_init
(bsc#1157180).
CVE-2019-19060: Fixed a memory leak in the adis_update_scan_mode()
which could have led to denial of service (bsc#1157178).
CVE-2019-19049: Fixed a memory leak in unittest_data_add
(bsc#1157173).
CVE-2019-19075: Fixed a memory leak in the ca8210_probe() which could
have led to denial of service by triggering ca8210_get_platform_data()
failures (bsc#1157162).
CVE-2019-19058: Fixed a memory leak in the alloc_sgtable() which could
have led to denial of service by triggering alloc_page() failures
(bsc#1157145).
CVE-2019-19074: Fixed a memory leak in the ath9k_wmi_cmd() function
which could have led to denial of service (bsc#1157143).
CVE-2019-19073: Fixed multiple memory leaks in
drivers/net/wireless/ath/ath9k/htc_hst.c which could have led to
denial of service by triggering wait_for_completion_timeout() failures
(bsc#1157070).
CVE-2019-19083: Fixed multiple memory leaks in *clock_source_create()
functions which could have led to denial of service (bsc#1157049).
CVE-2019-19082: Fixed multiple memory leaks in *create_resource_pool()
which could have led to denial of service (bsc#1157046).
CVE-2019-15916: Fixed a memory leak in register_queue_kobjects() which
might have led denial of service (bsc#1149448).
CVE-2019-0154: Fixed an improper access control in subsystem for Intel
(R) processor graphics whichs may have allowed an authenticated user
to potentially enable denial of service via local access
(bsc#1135966).
CVE-2019-0155: Fixed an improper access control in subsystem for Intel
(R) processor graphics whichs may have allowed an authenticated user
to potentially enable escalation of privilege via local access
(bsc#1135967).
CVE-2019-16231: Fixed a NULL pointer dereference due to lack of
checking the alloc_workqueue return value (bsc#1150466).
CVE-2019-18805: Fixed an integer overflow in tcp_ack_update_rtt()
leading to a denial of service or possibly unspecified other impact
(bsc#1156187).
CVE-2019-17055: Enforced CAP_NET_RAW in the AF_ISDN network module to
restrict unprivileged users to create a raw socket (bsc#1152782).
CVE-2019-16995: Fixed a memory leak in hsr_dev_finalize() which may
have caused denial of service (bsc#1152685).
CVE-2019-16233: drivers/scsi/qla2xxx/qla_os.c did not check the
alloc_workqueue return value, leading to a NULL pointer dereference.
(bsc#1150457).
CVE-2019-10220: Added sanity checks on the pathnames passed to the
user space. (bsc#1144903)
CVE-2019-17666: rtlwifi: Fix potential overflow in P2P code
(bsc#1154372).
CVE-2019-17056: The AF_NFC network module did not enforce CAP_NET_RAW,
which meant that unprivileged users could create a raw socket
(bsc#1152788).
CVE-2019-14821: An out-of-bounds access issue was fixed in the
kernel's kvm hypervisor. An unprivileged host user or process with
access to '/dev/kvm' device could use this flaw to crash the host
kernel, resulting in a denial of service or potentially escalating
privileges on the system (bnc#1151350).
CVE-2017-18595: A double free in allocate_trace_buffer was fixed
(bnc#1149555).
CVE-2019-9506: The Bluetooth BR/EDR specification used to permit
sufficiently low encryption key length and did not prevent an attacker
from influencing the key length negotiation. This allowed practical
brute-force attacks (aka 'KNOB') that could decrypt traffic and inject
arbitrary ciphertext without the victim noticing (bnc#1137865).
CVE-2019-14835: A buffer overflow flaw was found in the kernel's vhost
functionality that translates virtqueue buffers to IOVs. A privileged
guest user able to pass descriptors with invalid length to the host
could use this flaw to increase their privileges on the host
(bnc#1150112).
CVE-2019-9456: An out-of-bounds write in the USB monitor driver has
been fixed. This issue could lead to local escalation of privilege
with System execution privileges needed. (bnc#1150025).
CVE-2019-15030, CVE-2019-15031: On the powerpc platform, a local user
could read vector registers of other users' processes via an interrupt
(bsc#1149713).
CVE-2019-18683: An issue was discovered in
drivers/media/platform/vivid. It is exploitable for privilege
escalation on some Linux distributions where local users have
/dev/video0 access, but only if the driver happens to be loaded. There
are multiple race conditions during streaming stopping in this driver
(part of the V4L2 subsystem). These issues are caused by wrong mutex
locking in vivid_stop_generating_vid_cap(),
vivid_stop_generating_vid_out(), sdr_cap_stop_streaming(), and the
corresponding kthreads. At least one of these race conditions leads to
a use-after-free (bnc#1155897).
CVE-2019-18809: A memory leak in the af9005_identify_state() function
in drivers/media/usb/dvb-usb/af9005.c allows attackers to cause a
denial of service (memory consumption), aka CID-2289adbfa559
(bnc#1156258).
CVE-2019-19078: A memory leak in the ath10k_usb_hif_tx_sg() function
in drivers/net/wireless/ath/ath10k/usb.c allows attackers to cause a
denial of service (memory consumption) by triggering usb_submit_urb()
failures, aka CID-b8d17e7d93d2 (bnc#1157032).
CVE-2019-18660: The Linux kernel on powerpc allows Information
Exposure because the Spectre-RSB mitigation is not in place for all
applicable CPUs, aka CID-39e72bf96f58. This is related to
arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c
(bnc#1157038).
CVE-2019-14895: A heap-based buffer overflow was discovered in Marvell
WiFi chip driver. The flaw could occur when the station attempts a
connection negotiation during the handling of the remote devices
country settings. This could allow the remote device to cause a denial
of service (system crash) or possibly execute arbitrary code
(bnc#1157158).
CVE-2019-19065: A memory leak in the sdma_init() function in
drivers/infiniband/hw/hfi1/sdma.c allows attackers to cause a denial
of service (memory consumption) by triggering rhashtable_init()
failures, aka CID-34b3be18a04e (bnc#1157191).
CVE-2019-19057: Two memory leaks in the mwifiex_pcie_init_evt_ring()
function in drivers/net/wireless/marvell/mwifiex/pcie.c allow
attackers to cause a denial of service (memory consumption) by
triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e
(bnc#1157193).
CVE-2019-19056: A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf()
function in drivers/net/wireless/marvell/mwifiex/pcie.c allows
attackers to cause a denial of service (memory consumption) by
triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932
(bnc#1157197).
CVE-2019-19063: Two memory leaks in the rtl_usb_probe() function in
drivers/net/wireless/realtek/rtlwifi/usb.c allow attackers to cause a
denial of service (memory consumption), aka CID-3f9361695113
(bnc#1157298).
CVE-2019-19046: A memory leak in the __ipmi_bmc_register() function in
drivers/char/ipmi/ipmi_msghandler.c allow attackers to cause a denial
of service (bsc#1157304).
CVE-2019-19068: A memory leak in the rtl8xxxu_submit_int_urb()
function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c
allows attackers to cause a denial of service (memory consumption) by
triggering usb_submit_urb() failures, aka CID-a2cdd07488e6
(bnc#1157307).
CVE-2019-19062: A memory leak in the crypto_report() function in
crypto/crypto_user_base.c allows attackers to cause a denial of
service (memory consumption) by triggering crypto_report_alg()
failures, aka CID-ffdde5932042 (bnc#1157333).
CVE-2019-19227: In the AppleTalk subsystem, there is a potential NULL
pointer dereference because register_snap_client may return NULL. This
will lead to denial of service in net/appletalk/aarp.c and
net/appletalk/ddp.c, as demonstrated by unregister_snap_client, aka
CID-9804501fa122 (bnc#1157678).
CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs
with Transactional Memory support could be used to facilitate
sidechannel information leaks out of microarchitectural buffers,
similar to the previously described 'Microarchitectural Data Sampling'
attack.
The Linux kernel was supplemented with the option to disable TSX
operation altogether (requiring CPU Microcode updates on older
systems) and better flushing of microarchitectural buffers (VERW).
The set of options available is described in our TID at
https://www.suse.com/support/kb/doc/?id=7024251
The update package also includes non-security fixes. See advisory for
details.
Note that Tenable Network Security has extracted the preceding
description block directly from the SUSE security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1046299");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1046303");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1046305");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1048942");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1050244");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1050536");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1050545");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1051510");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1054914");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1055117");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1055186");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1061840");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1064802");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1065600");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1065729");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1066129");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1071995");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1073513");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1082555");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1082635");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1083647");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1086323");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1087092");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1089644");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1090631");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1091041");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1093205");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1096254");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1097583");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1097584");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1097585");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1097586");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1097587");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1097588");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1098291");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1101674");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1103990");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1103991");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1104353");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1104427");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1104745");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1104967");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1106434");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1108043");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1108382");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1109158");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1109837");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1111666");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1112178");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1112374");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1113722");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1113994");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1114279");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1117169");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1117665");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1118661");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1119086");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1119113");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1119461");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1119465");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1120902");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1122363");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1123034");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1123080");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1123105");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1126390");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1127155");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1127354");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1127371");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1127988");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1131107");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1131304");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1131489");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1133140");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1134476");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1134983");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1135642");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1135854");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1135873");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1135966");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1135967");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1136261");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137040");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137069");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137223");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137236");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137799");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137861");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137865");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137959");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137982");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1138039");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1138190");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1138539");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1139073");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1140090");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1140155");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1140729");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1140845");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1140883");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1141013");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1141340");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1141543");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1141600");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1142076");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1142635");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1142667");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1142924");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1143706");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1144338");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1144375");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1144449");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1144653");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1144903");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1145099");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1145661");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1146042");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1146612");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1146664");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1148133");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1148410");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1148712");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1148859");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1148868");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149083");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149119");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149224");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149446");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149448");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149555");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149651");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149652");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149713");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149853");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149940");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149959");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149963");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1149976");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150025");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150033");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150112");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150305");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150381");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150423");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150457");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150466");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150562");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150727");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150846");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150860");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150861");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150875");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1150933");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151021");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151067");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151192");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151225");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151350");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151508");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151548");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151610");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151661");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151662");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151667");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151671");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151680");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151807");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151891");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151900");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151955");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152024");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152025");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152026");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152033");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152161");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152187");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152325");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152457");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152460");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152466");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152525");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152624");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152665");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152685");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152696");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152697");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152782");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152788");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152790");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152791");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152885");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152972");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152974");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1152975");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153108");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153112");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153236");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153263");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153476");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153509");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153607");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153628");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153646");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153681");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153713");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153717");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153718");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153719");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153811");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153969");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154043");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154048");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154058");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154108");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154124");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154189");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154242");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154268");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154354");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154355");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154372");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154521");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154526");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154578");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154601");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154607");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154608");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154610");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154611");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154651");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154737");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154747");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154848");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154858");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154905");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154956");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1154959");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155021");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155061");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155178");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155179");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155184");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155186");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155671");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155689");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155692");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155836");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155897");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1155982");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156187");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156258");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156429");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156466");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156471");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156494");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156609");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156700");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156729");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156882");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1156928");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157032");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157038");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157044");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157045");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157046");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157049");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157070");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157115");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157143");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157145");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157158");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157160");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157162");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157173");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157178");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157180");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157182");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157183");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157184");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157191");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157193");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157197");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157298");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157304");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157307");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157324");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157333");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157386");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157424");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157463");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157499");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157678");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157698");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157778");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1157908");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1158049");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1158063");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1158064");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1158065");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1158066");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1158067");
script_set_attribute(attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1158068");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2017-18595/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-0154/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-0155/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-10220/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11135/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-14821/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-14835/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-14895/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-15030/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-15031/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-15916/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-16231/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-16233/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-16995/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-17055/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-17056/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-17666/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-18660/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-18683/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-18805/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-18809/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19046/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19049/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19052/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19056/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19057/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19058/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19060/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19062/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19063/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19065/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19067/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19068/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19073/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19074/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19075/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19078/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19080/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19081/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19082/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19083/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-19227/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-9456/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-9506/");
script_set_attribute(attribute:"see_also", value:"https://www.suse.com/support/kb/doc/?id=7024251");
# https://www.suse.com/support/update/announcement/2019/suse-su-20193200-1/
script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?99666b33");
script_set_attribute(attribute:"solution", value:
"To install this SUSE Security Update use the SUSE recommended
installation methods like YaST online_update or 'zypper patch'.
Alternatively you can run the command listed for your product :
SUSE Linux Enterprise Workstation Extension 12-SP5:zypper in -t patch
SUSE-SLE-WE-12-SP5-2019-3200=1
SUSE Linux Enterprise Software Development Kit 12-SP5:zypper in -t
patch SUSE-SLE-SDK-12-SP5-2019-3200=1
SUSE Linux Enterprise Server 12-SP5:zypper in -t patch
SUSE-SLE-SERVER-12-SP5-2019-3200=1
SUSE Linux Enterprise Live Patching 12-SP5:zypper in -t patch
SUSE-SLE-Live-Patching-12-SP5-2019-3200=1
SUSE Linux Enterprise High Availability 12-SP5:zypper in -t patch
SUSE-SLE-HA-12-SP5-2019-3200=1");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-10220");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2019-18805");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/08/14");
script_set_attribute(attribute:"patch_publication_date", value:"2019/12/06");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/12/09");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-debugsource");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-man");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms");
script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"SuSE Local Security Checks");
script_copyright(english:"This script is Copyright (C) 2019-2024 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/SuSE/release");
if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE");
os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE");
os_ver = os_ver[1];
if (! preg(pattern:"^(SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES12", "SUSE " + os_ver);
if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu);
sp = get_kb_item("Host/SuSE/patchlevel");
if (isnull(sp)) sp = "0";
if (os_ver == "SLES12" && (! preg(pattern:"^(5)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP5", os_ver + " SP" + sp);
flag = 0;
if (rpm_check(release:"SLES12", sp:"5", cpu:"x86_64", reference:"kernel-default-devel-debuginfo-4.12.14-122.7.1")) flag++;
if (rpm_check(release:"SLES12", sp:"5", cpu:"s390x", reference:"kernel-default-man-4.12.14-122.7.1")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"kernel-default-4.12.14-122.7.1")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"kernel-default-base-4.12.14-122.7.1")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"kernel-default-base-debuginfo-4.12.14-122.7.1")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"kernel-default-debuginfo-4.12.14-122.7.1")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"kernel-default-debugsource-4.12.14-122.7.1")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"kernel-default-devel-4.12.14-122.7.1")) flag++;
if (rpm_check(release:"SLES12", sp:"5", reference:"kernel-syms-4.12.14-122.7.1")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel");
}
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18595
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0154
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0155
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10220
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11135
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14895
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15030
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15031
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16995
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18683
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18805
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18809
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19049
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19052
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19056
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19057
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19060
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19065
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19067
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19068
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19073
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19074
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19075
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19078
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19080
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19081
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19082
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19083
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19227
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9456
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9506
www.nessus.org/u?99666b33
bugzilla.suse.com/show_bug.cgi?id=1046299
bugzilla.suse.com/show_bug.cgi?id=1046303
bugzilla.suse.com/show_bug.cgi?id=1046305
bugzilla.suse.com/show_bug.cgi?id=1048942
bugzilla.suse.com/show_bug.cgi?id=1050244
bugzilla.suse.com/show_bug.cgi?id=1050536
bugzilla.suse.com/show_bug.cgi?id=1050545
bugzilla.suse.com/show_bug.cgi?id=1051510
bugzilla.suse.com/show_bug.cgi?id=1054914
bugzilla.suse.com/show_bug.cgi?id=1055117
bugzilla.suse.com/show_bug.cgi?id=1055186
bugzilla.suse.com/show_bug.cgi?id=1061840
bugzilla.suse.com/show_bug.cgi?id=1064802
bugzilla.suse.com/show_bug.cgi?id=1065600
bugzilla.suse.com/show_bug.cgi?id=1065729
bugzilla.suse.com/show_bug.cgi?id=1066129
bugzilla.suse.com/show_bug.cgi?id=1071995
bugzilla.suse.com/show_bug.cgi?id=1073513
bugzilla.suse.com/show_bug.cgi?id=1082555
bugzilla.suse.com/show_bug.cgi?id=1082635
bugzilla.suse.com/show_bug.cgi?id=1083647
bugzilla.suse.com/show_bug.cgi?id=1086323
bugzilla.suse.com/show_bug.cgi?id=1087092
bugzilla.suse.com/show_bug.cgi?id=1089644
bugzilla.suse.com/show_bug.cgi?id=1090631
bugzilla.suse.com/show_bug.cgi?id=1091041
bugzilla.suse.com/show_bug.cgi?id=1093205
bugzilla.suse.com/show_bug.cgi?id=1096254
bugzilla.suse.com/show_bug.cgi?id=1097583
bugzilla.suse.com/show_bug.cgi?id=1097584
bugzilla.suse.com/show_bug.cgi?id=1097585
bugzilla.suse.com/show_bug.cgi?id=1097586
bugzilla.suse.com/show_bug.cgi?id=1097587
bugzilla.suse.com/show_bug.cgi?id=1097588
bugzilla.suse.com/show_bug.cgi?id=1098291
bugzilla.suse.com/show_bug.cgi?id=1101674
bugzilla.suse.com/show_bug.cgi?id=1103990
bugzilla.suse.com/show_bug.cgi?id=1103991
bugzilla.suse.com/show_bug.cgi?id=1104353
bugzilla.suse.com/show_bug.cgi?id=1104427
bugzilla.suse.com/show_bug.cgi?id=1104745
bugzilla.suse.com/show_bug.cgi?id=1104967
bugzilla.suse.com/show_bug.cgi?id=1106434
bugzilla.suse.com/show_bug.cgi?id=1108043
bugzilla.suse.com/show_bug.cgi?id=1108382
bugzilla.suse.com/show_bug.cgi?id=1109158
bugzilla.suse.com/show_bug.cgi?id=1109837
bugzilla.suse.com/show_bug.cgi?id=1111666
bugzilla.suse.com/show_bug.cgi?id=1112178
bugzilla.suse.com/show_bug.cgi?id=1112374
bugzilla.suse.com/show_bug.cgi?id=1113722
bugzilla.suse.com/show_bug.cgi?id=1113994
bugzilla.suse.com/show_bug.cgi?id=1114279
bugzilla.suse.com/show_bug.cgi?id=1117169
bugzilla.suse.com/show_bug.cgi?id=1117665
bugzilla.suse.com/show_bug.cgi?id=1118661
bugzilla.suse.com/show_bug.cgi?id=1119086
bugzilla.suse.com/show_bug.cgi?id=1119113
bugzilla.suse.com/show_bug.cgi?id=1119461
bugzilla.suse.com/show_bug.cgi?id=1119465
bugzilla.suse.com/show_bug.cgi?id=1120902
bugzilla.suse.com/show_bug.cgi?id=1122363
bugzilla.suse.com/show_bug.cgi?id=1123034
bugzilla.suse.com/show_bug.cgi?id=1123080
bugzilla.suse.com/show_bug.cgi?id=1123105
bugzilla.suse.com/show_bug.cgi?id=1126390
bugzilla.suse.com/show_bug.cgi?id=1127155
bugzilla.suse.com/show_bug.cgi?id=1127354
bugzilla.suse.com/show_bug.cgi?id=1127371
bugzilla.suse.com/show_bug.cgi?id=1127988
bugzilla.suse.com/show_bug.cgi?id=1131107
bugzilla.suse.com/show_bug.cgi?id=1131304
bugzilla.suse.com/show_bug.cgi?id=1131489
bugzilla.suse.com/show_bug.cgi?id=1133140
bugzilla.suse.com/show_bug.cgi?id=1134476
bugzilla.suse.com/show_bug.cgi?id=1134983
bugzilla.suse.com/show_bug.cgi?id=1135642
bugzilla.suse.com/show_bug.cgi?id=1135854
bugzilla.suse.com/show_bug.cgi?id=1135873
bugzilla.suse.com/show_bug.cgi?id=1135966
bugzilla.suse.com/show_bug.cgi?id=1135967
bugzilla.suse.com/show_bug.cgi?id=1136261
bugzilla.suse.com/show_bug.cgi?id=1137040
bugzilla.suse.com/show_bug.cgi?id=1137069
bugzilla.suse.com/show_bug.cgi?id=1137223
bugzilla.suse.com/show_bug.cgi?id=1137236
bugzilla.suse.com/show_bug.cgi?id=1137799
bugzilla.suse.com/show_bug.cgi?id=1137861
bugzilla.suse.com/show_bug.cgi?id=1137865
bugzilla.suse.com/show_bug.cgi?id=1137959
bugzilla.suse.com/show_bug.cgi?id=1137982
bugzilla.suse.com/show_bug.cgi?id=1138039
bugzilla.suse.com/show_bug.cgi?id=1138190
bugzilla.suse.com/show_bug.cgi?id=1138539
bugzilla.suse.com/show_bug.cgi?id=1139073
bugzilla.suse.com/show_bug.cgi?id=1140090
bugzilla.suse.com/show_bug.cgi?id=1140155
bugzilla.suse.com/show_bug.cgi?id=1140729
bugzilla.suse.com/show_bug.cgi?id=1140845
bugzilla.suse.com/show_bug.cgi?id=1140883
bugzilla.suse.com/show_bug.cgi?id=1141013
bugzilla.suse.com/show_bug.cgi?id=1141340
bugzilla.suse.com/show_bug.cgi?id=1141543
bugzilla.suse.com/show_bug.cgi?id=1141600
bugzilla.suse.com/show_bug.cgi?id=1142076
bugzilla.suse.com/show_bug.cgi?id=1142635
bugzilla.suse.com/show_bug.cgi?id=1142667
bugzilla.suse.com/show_bug.cgi?id=1142924
bugzilla.suse.com/show_bug.cgi?id=1143706
bugzilla.suse.com/show_bug.cgi?id=1144338
bugzilla.suse.com/show_bug.cgi?id=1144375
bugzilla.suse.com/show_bug.cgi?id=1144449
bugzilla.suse.com/show_bug.cgi?id=1144653
bugzilla.suse.com/show_bug.cgi?id=1144903
bugzilla.suse.com/show_bug.cgi?id=1145099
bugzilla.suse.com/show_bug.cgi?id=1145661
bugzilla.suse.com/show_bug.cgi?id=1146042
bugzilla.suse.com/show_bug.cgi?id=1146612
bugzilla.suse.com/show_bug.cgi?id=1146664
bugzilla.suse.com/show_bug.cgi?id=1148133
bugzilla.suse.com/show_bug.cgi?id=1148410
bugzilla.suse.com/show_bug.cgi?id=1148712
bugzilla.suse.com/show_bug.cgi?id=1148859
bugzilla.suse.com/show_bug.cgi?id=1148868
bugzilla.suse.com/show_bug.cgi?id=1149083
bugzilla.suse.com/show_bug.cgi?id=1149119
bugzilla.suse.com/show_bug.cgi?id=1149224
bugzilla.suse.com/show_bug.cgi?id=1149446
bugzilla.suse.com/show_bug.cgi?id=1149448
bugzilla.suse.com/show_bug.cgi?id=1149555
bugzilla.suse.com/show_bug.cgi?id=1149651
bugzilla.suse.com/show_bug.cgi?id=1149652
bugzilla.suse.com/show_bug.cgi?id=1149713
bugzilla.suse.com/show_bug.cgi?id=1149853
bugzilla.suse.com/show_bug.cgi?id=1149940
bugzilla.suse.com/show_bug.cgi?id=1149959
bugzilla.suse.com/show_bug.cgi?id=1149963
bugzilla.suse.com/show_bug.cgi?id=1149976
bugzilla.suse.com/show_bug.cgi?id=1150025
bugzilla.suse.com/show_bug.cgi?id=1150033
bugzilla.suse.com/show_bug.cgi?id=1150112
bugzilla.suse.com/show_bug.cgi?id=1150305
bugzilla.suse.com/show_bug.cgi?id=1150381
bugzilla.suse.com/show_bug.cgi?id=1150423
bugzilla.suse.com/show_bug.cgi?id=1150457
bugzilla.suse.com/show_bug.cgi?id=1150466
bugzilla.suse.com/show_bug.cgi?id=1150562
bugzilla.suse.com/show_bug.cgi?id=1150727
bugzilla.suse.com/show_bug.cgi?id=1150846
bugzilla.suse.com/show_bug.cgi?id=1150860
bugzilla.suse.com/show_bug.cgi?id=1150861
bugzilla.suse.com/show_bug.cgi?id=1150875
bugzilla.suse.com/show_bug.cgi?id=1150933
bugzilla.suse.com/show_bug.cgi?id=1151021
bugzilla.suse.com/show_bug.cgi?id=1151067
bugzilla.suse.com/show_bug.cgi?id=1151192
bugzilla.suse.com/show_bug.cgi?id=1151225
bugzilla.suse.com/show_bug.cgi?id=1151350
bugzilla.suse.com/show_bug.cgi?id=1151508
bugzilla.suse.com/show_bug.cgi?id=1151548
bugzilla.suse.com/show_bug.cgi?id=1151610
bugzilla.suse.com/show_bug.cgi?id=1151661
bugzilla.suse.com/show_bug.cgi?id=1151662
bugzilla.suse.com/show_bug.cgi?id=1151667
bugzilla.suse.com/show_bug.cgi?id=1151671
bugzilla.suse.com/show_bug.cgi?id=1151680
bugzilla.suse.com/show_bug.cgi?id=1151807
bugzilla.suse.com/show_bug.cgi?id=1151891
bugzilla.suse.com/show_bug.cgi?id=1151900
bugzilla.suse.com/show_bug.cgi?id=1151955
bugzilla.suse.com/show_bug.cgi?id=1152024
bugzilla.suse.com/show_bug.cgi?id=1152025
bugzilla.suse.com/show_bug.cgi?id=1152026
bugzilla.suse.com/show_bug.cgi?id=1152033
bugzilla.suse.com/show_bug.cgi?id=1152161
bugzilla.suse.com/show_bug.cgi?id=1152187
bugzilla.suse.com/show_bug.cgi?id=1152325
bugzilla.suse.com/show_bug.cgi?id=1152457
bugzilla.suse.com/show_bug.cgi?id=1152460
bugzilla.suse.com/show_bug.cgi?id=1152466
bugzilla.suse.com/show_bug.cgi?id=1152525
bugzilla.suse.com/show_bug.cgi?id=1152624
bugzilla.suse.com/show_bug.cgi?id=1152665
bugzilla.suse.com/show_bug.cgi?id=1152685
bugzilla.suse.com/show_bug.cgi?id=1152696
bugzilla.suse.com/show_bug.cgi?id=1152697
bugzilla.suse.com/show_bug.cgi?id=1152782
bugzilla.suse.com/show_bug.cgi?id=1152788
bugzilla.suse.com/show_bug.cgi?id=1152790
bugzilla.suse.com/show_bug.cgi?id=1152791
bugzilla.suse.com/show_bug.cgi?id=1152885
bugzilla.suse.com/show_bug.cgi?id=1152972
bugzilla.suse.com/show_bug.cgi?id=1152974
bugzilla.suse.com/show_bug.cgi?id=1152975
bugzilla.suse.com/show_bug.cgi?id=1153108
bugzilla.suse.com/show_bug.cgi?id=1153112
bugzilla.suse.com/show_bug.cgi?id=1153236
bugzilla.suse.com/show_bug.cgi?id=1153263
bugzilla.suse.com/show_bug.cgi?id=1153476
bugzilla.suse.com/show_bug.cgi?id=1153509
bugzilla.suse.com/show_bug.cgi?id=1153607
bugzilla.suse.com/show_bug.cgi?id=1153628
bugzilla.suse.com/show_bug.cgi?id=1153646
bugzilla.suse.com/show_bug.cgi?id=1153681
bugzilla.suse.com/show_bug.cgi?id=1153713
bugzilla.suse.com/show_bug.cgi?id=1153717
bugzilla.suse.com/show_bug.cgi?id=1153718
bugzilla.suse.com/show_bug.cgi?id=1153719
bugzilla.suse.com/show_bug.cgi?id=1153811
bugzilla.suse.com/show_bug.cgi?id=1153969
bugzilla.suse.com/show_bug.cgi?id=1154043
bugzilla.suse.com/show_bug.cgi?id=1154048
bugzilla.suse.com/show_bug.cgi?id=1154058
bugzilla.suse.com/show_bug.cgi?id=1154108
bugzilla.suse.com/show_bug.cgi?id=1154124
bugzilla.suse.com/show_bug.cgi?id=1154189
bugzilla.suse.com/show_bug.cgi?id=1154242
bugzilla.suse.com/show_bug.cgi?id=1154268
bugzilla.suse.com/show_bug.cgi?id=1154354
bugzilla.suse.com/show_bug.cgi?id=1154355
bugzilla.suse.com/show_bug.cgi?id=1154372
bugzilla.suse.com/show_bug.cgi?id=1154521
bugzilla.suse.com/show_bug.cgi?id=1154526
bugzilla.suse.com/show_bug.cgi?id=1154578
bugzilla.suse.com/show_bug.cgi?id=1154601
bugzilla.suse.com/show_bug.cgi?id=1154607
bugzilla.suse.com/show_bug.cgi?id=1154608
bugzilla.suse.com/show_bug.cgi?id=1154610
bugzilla.suse.com/show_bug.cgi?id=1154611
bugzilla.suse.com/show_bug.cgi?id=1154651
bugzilla.suse.com/show_bug.cgi?id=1154737
bugzilla.suse.com/show_bug.cgi?id=1154747
bugzilla.suse.com/show_bug.cgi?id=1154848
bugzilla.suse.com/show_bug.cgi?id=1154858
bugzilla.suse.com/show_bug.cgi?id=1154905
bugzilla.suse.com/show_bug.cgi?id=1154956
bugzilla.suse.com/show_bug.cgi?id=1154959
bugzilla.suse.com/show_bug.cgi?id=1155021
bugzilla.suse.com/show_bug.cgi?id=1155061
bugzilla.suse.com/show_bug.cgi?id=1155178
bugzilla.suse.com/show_bug.cgi?id=1155179
bugzilla.suse.com/show_bug.cgi?id=1155184
bugzilla.suse.com/show_bug.cgi?id=1155186
bugzilla.suse.com/show_bug.cgi?id=1155671
bugzilla.suse.com/show_bug.cgi?id=1155689
bugzilla.suse.com/show_bug.cgi?id=1155692
bugzilla.suse.com/show_bug.cgi?id=1155836
bugzilla.suse.com/show_bug.cgi?id=1155897
bugzilla.suse.com/show_bug.cgi?id=1155982
bugzilla.suse.com/show_bug.cgi?id=1156187
bugzilla.suse.com/show_bug.cgi?id=1156258
bugzilla.suse.com/show_bug.cgi?id=1156429
bugzilla.suse.com/show_bug.cgi?id=1156466
bugzilla.suse.com/show_bug.cgi?id=1156471
bugzilla.suse.com/show_bug.cgi?id=1156494
bugzilla.suse.com/show_bug.cgi?id=1156609
bugzilla.suse.com/show_bug.cgi?id=1156700
bugzilla.suse.com/show_bug.cgi?id=1156729
bugzilla.suse.com/show_bug.cgi?id=1156882
bugzilla.suse.com/show_bug.cgi?id=1156928
bugzilla.suse.com/show_bug.cgi?id=1157032
bugzilla.suse.com/show_bug.cgi?id=1157038
bugzilla.suse.com/show_bug.cgi?id=1157044
bugzilla.suse.com/show_bug.cgi?id=1157045
bugzilla.suse.com/show_bug.cgi?id=1157046
bugzilla.suse.com/show_bug.cgi?id=1157049
bugzilla.suse.com/show_bug.cgi?id=1157070
bugzilla.suse.com/show_bug.cgi?id=1157115
bugzilla.suse.com/show_bug.cgi?id=1157143
bugzilla.suse.com/show_bug.cgi?id=1157145
bugzilla.suse.com/show_bug.cgi?id=1157158
bugzilla.suse.com/show_bug.cgi?id=1157160
bugzilla.suse.com/show_bug.cgi?id=1157162
bugzilla.suse.com/show_bug.cgi?id=1157173
bugzilla.suse.com/show_bug.cgi?id=1157178
bugzilla.suse.com/show_bug.cgi?id=1157180
bugzilla.suse.com/show_bug.cgi?id=1157182
bugzilla.suse.com/show_bug.cgi?id=1157183
bugzilla.suse.com/show_bug.cgi?id=1157184
bugzilla.suse.com/show_bug.cgi?id=1157191
bugzilla.suse.com/show_bug.cgi?id=1157193
bugzilla.suse.com/show_bug.cgi?id=1157197
bugzilla.suse.com/show_bug.cgi?id=1157298
bugzilla.suse.com/show_bug.cgi?id=1157304
bugzilla.suse.com/show_bug.cgi?id=1157307
bugzilla.suse.com/show_bug.cgi?id=1157324
bugzilla.suse.com/show_bug.cgi?id=1157333
bugzilla.suse.com/show_bug.cgi?id=1157386
bugzilla.suse.com/show_bug.cgi?id=1157424
bugzilla.suse.com/show_bug.cgi?id=1157463
bugzilla.suse.com/show_bug.cgi?id=1157499
bugzilla.suse.com/show_bug.cgi?id=1157678
bugzilla.suse.com/show_bug.cgi?id=1157698
bugzilla.suse.com/show_bug.cgi?id=1157778
bugzilla.suse.com/show_bug.cgi?id=1157908
bugzilla.suse.com/show_bug.cgi?id=1158049
bugzilla.suse.com/show_bug.cgi?id=1158063
bugzilla.suse.com/show_bug.cgi?id=1158064
bugzilla.suse.com/show_bug.cgi?id=1158065
bugzilla.suse.com/show_bug.cgi?id=1158066
bugzilla.suse.com/show_bug.cgi?id=1158067
bugzilla.suse.com/show_bug.cgi?id=1158068
www.suse.com/security/cve/CVE-2017-18595/
www.suse.com/security/cve/CVE-2019-0154/
www.suse.com/security/cve/CVE-2019-0155/
www.suse.com/security/cve/CVE-2019-10220/
www.suse.com/security/cve/CVE-2019-11135/
www.suse.com/security/cve/CVE-2019-14821/
www.suse.com/security/cve/CVE-2019-14835/
www.suse.com/security/cve/CVE-2019-14895/
www.suse.com/security/cve/CVE-2019-15030/
www.suse.com/security/cve/CVE-2019-15031/
www.suse.com/security/cve/CVE-2019-15916/
www.suse.com/security/cve/CVE-2019-16231/
www.suse.com/security/cve/CVE-2019-16233/
www.suse.com/security/cve/CVE-2019-16995/
www.suse.com/security/cve/CVE-2019-17055/
www.suse.com/security/cve/CVE-2019-17056/
www.suse.com/security/cve/CVE-2019-17666/
www.suse.com/security/cve/CVE-2019-18660/
www.suse.com/security/cve/CVE-2019-18683/
www.suse.com/security/cve/CVE-2019-18805/
www.suse.com/security/cve/CVE-2019-18809/
www.suse.com/security/cve/CVE-2019-19046/
www.suse.com/security/cve/CVE-2019-19049/
www.suse.com/security/cve/CVE-2019-19052/
www.suse.com/security/cve/CVE-2019-19056/
www.suse.com/security/cve/CVE-2019-19057/
www.suse.com/security/cve/CVE-2019-19058/
www.suse.com/security/cve/CVE-2019-19060/
www.suse.com/security/cve/CVE-2019-19062/
www.suse.com/security/cve/CVE-2019-19063/
www.suse.com/security/cve/CVE-2019-19065/
www.suse.com/security/cve/CVE-2019-19067/
www.suse.com/security/cve/CVE-2019-19068/
www.suse.com/security/cve/CVE-2019-19073/
www.suse.com/security/cve/CVE-2019-19074/
www.suse.com/security/cve/CVE-2019-19075/
www.suse.com/security/cve/CVE-2019-19078/
www.suse.com/security/cve/CVE-2019-19080/
www.suse.com/security/cve/CVE-2019-19081/
www.suse.com/security/cve/CVE-2019-19082/
www.suse.com/security/cve/CVE-2019-19083/
www.suse.com/security/cve/CVE-2019-19227/
www.suse.com/security/cve/CVE-2019-9456/
www.suse.com/security/cve/CVE-2019-9506/
www.suse.com/support/kb/doc/?id=7024251
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
86.7%