The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.
The following security bugs were fixed :
CVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).
CVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).
CVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).
CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).
CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).
CVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.
This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).
CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).
CVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).
CVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).
CVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).
CVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).
CVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).
CVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).
CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).
CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).
CVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).
CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).
CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).
CVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).
CVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free.
This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).
CVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).
CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).
The update package also includes non-security fixes. See advisory for details.
Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
{"id": "SUSE_SU-2020-2105-1.NASL", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2105-1)", "description": "The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c could result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3 (bnc#1172453).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem in versions This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\nThis flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\nCVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-10781: A zram sysfs resource consumption was fixed (bnc#1173074).\n\nCVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation, caused by a lack of certain domain_release calls (bnc#1171219).\n\nCVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one (bnc#1171983).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relies on kstrdup without considering the possibility of an internal '\\0' value, which allowed attackers to trigger an out-of-bounds read (bnc#1171982).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "published": "2020-08-04T00:00:00", "modified": "2022-05-12T00:00:00", "epss": [], "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.tenable.com/plugins/nessus/139308", "reporter": "This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://bugzilla.suse.com/show_bug.cgi?id=1173817", "https://www.suse.com/security/cve/CVE-2020-12656/", "https://bugzilla.suse.com/show_bug.cgi?id=1172344", "https://www.suse.com/security/cve/CVE-2020-10768/", "https://bugzilla.suse.com/show_bug.cgi?id=1173845", "https://bugzilla.suse.com/show_bug.cgi?id=1173843", "https://bugzilla.suse.com/show_bug.cgi?id=1172987", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12771", "https://bugzilla.suse.com/show_bug.cgi?id=1172988", "https://bugzilla.suse.com/show_bug.cgi?id=1173438", "https://bugzilla.suse.com/show_bug.cgi?id=1173068", "https://bugzilla.suse.com/show_bug.cgi?id=1172484", "https://bugzilla.suse.com/show_bug.cgi?id=1171982", "https://bugzilla.suse.com/show_bug.cgi?id=1172775", "https://bugzilla.suse.com/show_bug.cgi?id=1172759", "https://bugzilla.suse.com/show_bug.cgi?id=1172781", "https://bugzilla.suse.com/show_bug.cgi?id=1172017", "https://bugzilla.suse.com/show_bug.cgi?id=1174627", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10767", "https://bugzilla.suse.com/show_bug.cgi?id=1173085", "https://bugzilla.suse.com/show_bug.cgi?id=1172783", "https://bugzilla.suse.com/show_bug.cgi?id=1173860", "https://bugzilla.suse.com/show_bug.cgi?id=1172467", "https://bugzilla.suse.com/show_bug.cgi?id=1172719", "https://bugzilla.suse.com/show_bug.cgi?id=1172068", "https://bugzilla.suse.com/show_bug.cgi?id=1169514", "https://bugzilla.suse.com/show_bug.cgi?id=1170011", "https://bugzilla.suse.com/show_bug.cgi?id=1174345", "https://bugzilla.suse.com/show_bug.cgi?id=1170442", "https://bugzilla.suse.com/show_bug.cgi?id=1167651", "https://bugzilla.suse.com/show_bug.cgi?id=1171739", "https://bugzilla.suse.com/show_bug.cgi?id=1170891", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12656", "https://bugzilla.suse.com/show_bug.cgi?id=1170895", "https://bugzilla.suse.com/show_bug.cgi?id=1157169", "https://bugzilla.suse.com/show_bug.cgi?id=1172983", "https://bugzilla.suse.com/show_bug.cgi?id=1165975", "https://bugzilla.suse.com/show_bug.cgi?id=1171759", "https://bugzilla.suse.com/show_bug.cgi?id=1172374", "https://bugzilla.suse.com/show_bug.cgi?id=1172063", "https://bugzilla.suse.com/show_bug.cgi?id=1172543", "https://bugzilla.suse.com/show_bug.cgi?id=1168230", "https://bugzilla.suse.com/show_bug.cgi?id=1171529", "https://bugzilla.suse.com/show_bug.cgi?id=1152472", "https://bugzilla.suse.com/show_bug.cgi?id=1171530", "https://bugzilla.suse.com/show_bug.cgi?id=1162063", "https://bugzilla.suse.com/show_bug.cgi?id=1171189", "https://bugzilla.suse.com/show_bug.cgi?id=1174411", "https://www.suse.com/security/cve/CVE-2019-20812/", "https://bugzilla.suse.com/show_bug.cgi?id=1158983", "https://bugzilla.suse.com/show_bug.cgi?id=1172823", "https://bugzilla.suse.com/show_bug.cgi?id=1173894", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10781", "https://bugzilla.suse.com/show_bug.cgi?id=1162400", "https://bugzilla.suse.com/show_bug.cgi?id=1174264", "https://bugzilla.suse.com/show_bug.cgi?id=1172208", "https://www.suse.com/security/cve/CVE-2020-10766/", "https://www.suse.com/security/cve/CVE-2020-0305/", "https://bugzilla.suse.com/show_bug.cgi?id=1173625", "https://bugzilla.suse.com/show_bug.cgi?id=1172066", "https://bugzilla.suse.com/show_bug.cgi?id=1173838", "https://bugzilla.suse.com/show_bug.cgi?id=1172223", "https://bugzilla.suse.com/show_bug.cgi?id=1172365", "https://bugzilla.suse.com/show_bug.cgi?id=1172343", "https://bugzilla.suse.com/show_bug.cgi?id=1172067", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10135", "https://bugzilla.suse.com/show_bug.cgi?id=1174409", "https://bugzilla.suse.com/show_bug.cgi?id=1171191", "https://bugzilla.suse.com/show_bug.cgi?id=1172394", "https://bugzilla.suse.com/show_bug.cgi?id=1173830", "https://bugzilla.suse.com/show_bug.cgi?id=1165211", "https://bugzilla.suse.com/show_bug.cgi?id=1172201", "https://bugzilla.suse.com/show_bug.cgi?id=1172871", "https://bugzilla.suse.com/show_bug.cgi?id=1169194", "https://bugzilla.suse.com/show_bug.cgi?id=1170879", "https://bugzilla.suse.com/show_bug.cgi?id=1174513", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10766", "https://bugzilla.suse.com/show_bug.cgi?id=1172739", "https://bugzilla.suse.com/show_bug.cgi?id=1085030", "https://bugzilla.suse.com/show_bug.cgi?id=1173074", "https://bugzilla.suse.com/show_bug.cgi?id=1173746", "https://bugzilla.suse.com/show_bug.cgi?id=1171915", "https://bugzilla.suse.com/show_bug.cgi?id=1168838", "https://www.suse.com/security/cve/CVE-2019-19462/", "https://bugzilla.suse.com/show_bug.cgi?id=1171904", "https://bugzilla.suse.com/show_bug.cgi?id=1172391", "https://bugzilla.suse.com/show_bug.cgi?id=1172984", "https://bugzilla.suse.com/show_bug.cgi?id=1172537", "https://bugzilla.suse.com/show_bug.cgi?id=1170617", "https://bugzilla.suse.com/show_bug.cgi?id=1173206", "https://bugzilla.suse.com/show_bug.cgi?id=1171699", "https://www.suse.com/security/cve/CVE-2020-15780/", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15780", "https://bugzilla.suse.com/show_bug.cgi?id=1172841", "https://bugzilla.suse.com/show_bug.cgi?id=1172046", "https://bugzilla.suse.com/show_bug.cgi?id=1172782", "https://bugzilla.suse.com/show_bug.cgi?id=1172453", "https://bugzilla.suse.com/show_bug.cgi?id=1173573", "https://bugzilla.suse.com/show_bug.cgi?id=1172986", "https://bugzilla.suse.com/show_bug.cgi?id=1171988", "https://bugzilla.suse.com/show_bug.cgi?id=1174331", "https://bugzilla.suse.com/show_bug.cgi?id=1168959", "https://bugzilla.suse.com/show_bug.cgi?id=1173844", "https://bugzilla.suse.com/show_bug.cgi?id=1171732", "https://bugzilla.suse.com/show_bug.cgi?id=1174332", "https://www.suse.com/security/cve/CVE-2019-20810/", "https://bugzilla.suse.com/show_bug.cgi?id=1173825", "https://bugzilla.suse.com/show_bug.cgi?id=1173831", "https://bugzilla.suse.com/show_bug.cgi?id=1154492", "https://bugzilla.suse.com/show_bug.cgi?id=1172751", "https://www.suse.com/security/cve/CVE-2020-10751/", "https://bugzilla.suse.com/show_bug.cgi?id=1173823", "https://bugzilla.suse.com/show_bug.cgi?id=1173849", "https://bugzilla.suse.com/show_bug.cgi?id=1172061", "https://bugzilla.suse.com/show_bug.cgi?id=1171417", "https://bugzilla.suse.com/show_bug.cgi?id=962849", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0305", "https://bugzilla.suse.com/show_bug.cgi?id=1166985", "https://bugzilla.suse.com/show_bug.cgi?id=1172939", "https://bugzilla.suse.com/show_bug.cgi?id=1174407", "https://bugzilla.suse.com/show_bug.cgi?id=1173826", "https://www.suse.com/security/cve/CVE-2020-12888/", "https://bugzilla.suse.com/show_bug.cgi?id=1158242", "https://bugzilla.suse.com/show_bug.cgi?id=1158050", "https://www.suse.com/security/cve/CVE-2020-15393/", "https://bugzilla.suse.com/show_bug.cgi?id=1152489", "https://bugzilla.suse.com/show_bug.cgi?id=1173832", "https://bugzilla.suse.com/show_bug.cgi?id=1172458", "https://bugzilla.suse.com/show_bug.cgi?id=1173824", "https://bugzilla.suse.com/show_bug.cgi?id=1071995", "https://bugzilla.suse.com/show_bug.cgi?id=1174527", "https://www.suse.com/security/cve/CVE-2020-10781/", "https://bugzilla.suse.com/show_bug.cgi?id=1173428", "https://bugzilla.suse.com/show_bug.cgi?id=1170284", "https://bugzilla.suse.com/show_bug.cgi?id=1172393", "https://bugzilla.suse.com/show_bug.cgi?id=1173841", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10773", "https://bugzilla.suse.com/show_bug.cgi?id=1172956", "https://bugzilla.suse.com/show_bug.cgi?id=1174129", "https://bugzilla.suse.com/show_bug.cgi?id=1174333", "https://bugzilla.suse.com/show_bug.cgi?id=1065729", "https://bugzilla.suse.com/show_bug.cgi?id=1154353", "https://bugzilla.suse.com/show_bug.cgi?id=1171857", "https://bugzilla.suse.com/show_bug.cgi?id=1164777", "https://bugzilla.suse.com/show_bug.cgi?id=1173836", "https://bugzilla.suse.com/show_bug.cgi?id=1174263", "https://bugzilla.suse.com/show_bug.cgi?id=1172342", "https://bugzilla.suse.com/show_bug.cgi?id=1172990", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13143", "https://bugzilla.suse.com/show_bug.cgi?id=1174543", "https://www.suse.com/security/cve/CVE-2020-12769/", "https://bugzilla.suse.com/show_bug.cgi?id=1170774", "https://bugzilla.suse.com/show_bug.cgi?id=1161495", "https://bugzilla.suse.com/show_bug.cgi?id=1171219", "https://bugzilla.suse.com/show_bug.cgi?id=1167104", "https://bugzilla.suse.com/show_bug.cgi?id=1171150", "https://bugzilla.suse.com/show_bug.cgi?id=1172169", "https://bugzilla.suse.com/show_bug.cgi?id=1174018", "https://bugzilla.suse.com/show_bug.cgi?id=1174398", "https://bugzilla.suse.com/show_bug.cgi?id=1172064", "https://bugzilla.suse.com/show_bug.cgi?id=1153274", "https://bugzilla.suse.com/show_bug.cgi?id=1173820", "https://bugzilla.suse.com/show_bug.cgi?id=1156395", "https://www.suse.com/security/cve/CVE-2020-10135/", "https://bugzilla.suse.com/show_bug.cgi?id=1174462", "https://bugzilla.suse.com/show_bug.cgi?id=1172814", "https://bugzilla.suse.com/show_bug.cgi?id=1164648", "https://bugzilla.suse.com/show_bug.cgi?id=1172062", "https://bugzilla.suse.com/show_bug.cgi?id=1172940", "https://bugzilla.suse.com/show_bug.cgi?id=1173280", "https://bugzilla.suse.com/show_bug.cgi?id=1171868", "https://bugzilla.suse.com/show_bug.cgi?id=1172938", "https://bugzilla.suse.com/show_bug.cgi?id=1174072", "https://bugzilla.suse.com/show_bug.cgi?id=1173834", "https://bugzilla.suse.com/show_bug.cgi?id=1171246", "https://bugzilla.suse.com/show_bug.cgi?id=1173833", "https://bugzilla.suse.com/show_bug.cgi?id=1155518", "https://bugzilla.suse.com/show_bug.cgi?id=1159781", "https://bugzilla.suse.com/show_bug.cgi?id=1171220", "https://bugzilla.suse.com/show_bug.cgi?id=1173839", "https://bugzilla.suse.com/show_bug.cgi?id=1148868", "https://bugzilla.suse.com/show_bug.cgi?id=1174185", "https://www.suse.com/security/cve/CVE-2020-10711/", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14416", "https://bugzilla.suse.com/show_bug.cgi?id=1172366", "https://bugzilla.suse.com/show_bug.cgi?id=1173847", "https://bugzilla.suse.com/show_bug.cgi?id=1171513", "https://bugzilla.suse.com/show_bug.cgi?id=1164780", "https://bugzilla.suse.com/show_bug.cgi?id=1173514", "https://bugzilla.suse.com/show_bug.cgi?id=1174438", "https://bugzilla.suse.com/show_bug.cgi?id=1169681", "https://bugzilla.suse.com/show_bug.cgi?id=1172687", "https://bugzilla.suse.com/show_bug.cgi?id=1155798", "https://bugzilla.suse.com/show_bug.cgi?id=1172095", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12888", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10768", "https://bugzilla.suse.com/show_bug.cgi?id=1174116", "https://bugzilla.suse.com/show_bug.cgi?id=1174126", "https://bugzilla.suse.com/show_bug.cgi?id=1171828", "https://bugzilla.suse.com/show_bug.cgi?id=1173139", "https://bugzilla.suse.com/show_bug.cgi?id=1169021", "https://bugzilla.suse.com/show_bug.cgi?id=1169771", "https://bugzilla.suse.com/show_bug.cgi?id=1172170", "https://bugzilla.suse.com/show_bug.cgi?id=1168779", "https://www.suse.com/security/cve/CVE-2020-12771/", "https://bugzilla.suse.com/show_bug.cgi?id=1160947", "https://bugzilla.suse.com/show_bug.cgi?id=1173060", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10711", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13974", "https://bugzilla.suse.com/show_bug.cgi?id=1173776", "https://bugzilla.suse.com/show_bug.cgi?id=1162002", "https://bugzilla.suse.com/show_bug.cgi?id=1173941", "https://bugzilla.suse.com/show_bug.cgi?id=1174244", "https://bugzilla.suse.com/show_bug.cgi?id=1058115", "https://bugzilla.suse.com/show_bug.cgi?id=1158748", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12769", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20810", "https://bugzilla.suse.com/show_bug.cgi?id=1172999", "https://bugzilla.suse.com/show_bug.cgi?id=1173271", "https://bugzilla.suse.com/show_bug.cgi?id=1171743", "https://bugzilla.suse.com/show_bug.cgi?id=1173461", "https://bugzilla.suse.com/show_bug.cgi?id=1173552", "https://bugzilla.suse.com/show_bug.cgi?id=1172069", "https://bugzilla.suse.com/show_bug.cgi?id=1174396", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19462", "https://www.suse.com/security/cve/CVE-2020-10773/", "https://www.suse.com/security/cve/CVE-2020-14416/", "https://bugzilla.suse.com/show_bug.cgi?id=1173818", "https://bugzilla.suse.com/show_bug.cgi?id=1172989", "https://bugzilla.suse.com/show_bug.cgi?id=1162702", "https://bugzilla.suse.com/show_bug.cgi?id=1159867", "https://bugzilla.suse.com/show_bug.cgi?id=1171983", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15393", "https://bugzilla.suse.com/show_bug.cgi?id=1174127", "https://www.suse.com/security/cve/CVE-2020-10732/", "https://www.suse.com/security/cve/CVE-2020-13974/", "https://bugzilla.suse.com/show_bug.cgi?id=1174128", "https://bugzilla.suse.com/show_bug.cgi?id=1174356", "http://www.nessus.org/u?965229cb", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732", "https://bugzilla.suse.com/show_bug.cgi?id=1173837", "https://bugzilla.suse.com/show_bug.cgi?id=1167773", "https://bugzilla.suse.com/show_bug.cgi?id=1172065", "https://bugzilla.suse.com/show_bug.cgi?id=1172073", "https://bugzilla.suse.com/show_bug.cgi?id=1173284", "https://bugzilla.suse.com/show_bug.cgi?id=1165933", "https://bugzilla.suse.com/show_bug.cgi?id=1171688", "https://www.suse.com/security/cve/CVE-2020-13143/", "https://bugzilla.suse.com/show_bug.cgi?id=1158765", "https://bugzilla.suse.com/show_bug.cgi?id=1169094", "https://bugzilla.suse.com/show_bug.cgi?id=1172985", "https://www.suse.com/security/cve/CVE-2020-10767/", "https://bugzilla.suse.com/show_bug.cgi?id=1171662", "https://bugzilla.suse.com/show_bug.cgi?id=1172086", "https://bugzilla.suse.com/show_bug.cgi?id=1173827", "https://bugzilla.suse.com/show_bug.cgi?id=1173822", "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20812", "https://bugzilla.suse.com/show_bug.cgi?id=1158265", "https://bugzilla.suse.com/show_bug.cgi?id=1173828"], "cvelist": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "immutableFields": [], "lastseen": "2023-05-18T15:06:28", "viewCount": 30, "enchantments": {"dependencies": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431", "ALSA-2022:1988"]}, {"type": "amazon", "idList": ["ALAS-2020-1366", "ALAS-2020-1377", "ALAS-2020-1382", "ALAS-2020-1401", "ALAS-2020-1437", "ALAS-2020-1465", "ALAS2-2020-1425", "ALAS2-2020-1431", "ALAS2-2020-1465", "ALAS2-2020-1480"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-06-01", "ANDROID:2020-12-01"]}, {"type": "apple", "idList": ["APPLE:100C3E37B89C4B8E50DE097059456EC2", "APPLE:42A8665131AAD41DD01DD2DE9BBDEBC5", "APPLE:48DFAA81838B82F0614B9A03F99F251D", "APPLE:819AEF513AB880D6C4F6CA66CB3C0021", "APPLE:HT210346", "APPLE:HT210348", "APPLE:HT210351", "APPLE:HT210353"]}, {"type": "attackerkb", "idList": ["AKB:64124DE0-CCEB-4AC1-91D9-5E1834B667F5"]}, {"type": "centos", "idList": ["CESA-2020:2103", "CESA-2020:2664", "CESA-2020:4060"]}, {"type": "cert", "idList": ["VU:647177"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:2B547AA94018245E71F37CB94BA4EEBC", "CFOUNDRY:4C29708E9DB1757C4BE1AE571C33062C", "CFOUNDRY:5D359B30C62666D917EB31596D1BFDE4", "CFOUNDRY:ABBF4BD74406CA92477E7CFB1AD01190"]}, {"type": "cve", "idList": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0255", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2241-1:DE3AB", "DEBIAN:DLA-2241-2:3E557", "DEBIAN:DLA-2242-1:573AF", "DEBIAN:DLA-2323-1:C146F", "DEBIAN:DLA-2385-1:FDE93", "DEBIAN:DLA-2420-1:692E7", "DEBIAN:DLA-2420-2:175D1", "DEBIAN:DSA-4698-1:66813", "DEBIAN:DSA-4698-1:E1A7D", "DEBIAN:DSA-4699-1:122C4", "DEBIAN:DSA-4699-1:D5D43"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2019-19462", "DEBIANCVE:CVE-2019-20810", "DEBIANCVE:CVE-2019-20812", "DEBIANCVE:CVE-2020-0305", "DEBIANCVE:CVE-2020-10711", "DEBIANCVE:CVE-2020-10732", "DEBIANCVE:CVE-2020-10751", "DEBIANCVE:CVE-2020-10766", "DEBIANCVE:CVE-2020-10767", "DEBIANCVE:CVE-2020-10768", "DEBIANCVE:CVE-2020-10773", "DEBIANCVE:CVE-2020-10781", "DEBIANCVE:CVE-2020-12656", "DEBIANCVE:CVE-2020-12769", "DEBIANCVE:CVE-2020-12771", "DEBIANCVE:CVE-2020-12888", "DEBIANCVE:CVE-2020-13143", "DEBIANCVE:CVE-2020-13974", "DEBIANCVE:CVE-2020-14416", "DEBIANCVE:CVE-2020-15393", "DEBIANCVE:CVE-2020-15780"]}, {"type": "f5", "idList": ["F5:K02354867", "F5:K25225860"]}, {"type": "fedora", "idList": ["FEDORA:055473124314", "FEDORA:083D7313CFDA", "FEDORA:15484608781D", "FEDORA:62D0460BC99C", "FEDORA:68BA3606732B", "FEDORA:803AE30C6416", "FEDORA:8143631CA0A0", "FEDORA:9F68660D2A0F", "FEDORA:AAD0A60B6998"]}, {"type": "githubexploit", "idList": ["1E46B7EE-F59D-58E5-B8DD-D0465CBC37FE"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20200805-01-BLUETOOTH"]}, {"type": "ibm", "idList": ["056E8E90DE65417DDBD317AECA59E4BA53529394DA5008F22A756C161156DBF1", "1879325E67264056B58E8AD7F16855960BE3D80A459CF04AA2C576744065C438", "1B4C690B7DA33A4807087B34223ECB27C2AA91A91D536267A98B4BCEEB54A441", "1FDB55812AD3D9AB018A402C76AD1A7D7977943CA45EE64E54E9B459FD5AD0BA", "22DFDD1FF1BBF70D9C813ACA916818103631328A11AEED7718476AD8FD37F722", "2FE97BC0DB8A3B1BCF85FF8F69828770D4396C7CC3ABD37202D8089D2CADF87B", "36F5A24A0FE05876D471A20F32BE0669E453AF841B04CDD94792F8F80EF7F4D4", "64ADFD088203597B59C398AB3DEF28DC4F72D37A4C48C7FA81C6531EDA6A9877", "65AC1B828E41A5505E1A8E4F6E7E2E7A2BE86DE58C539C97379A40C7ED8BBD9F", "74EB94293C5F397767E62C9F6D734DE973B44B9B7EC427A98C99E92C3C3D6590", "7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4", "8B24753FF8758BF51E7C6001AC39E0EF90B14323A9756CCEF8AC68E99EF03367", "8E24EF903D56A888174BB1AB470E2DCC02807350FF9369DCD7234DA9B5758032", "9148A44BD9A1C1A13CCEBD8F0346557CF005830103920CDDC01519240525CB58", "93800CB903FCF930D2442012C501177682436E51AEBEA85D7632953A9A31B533", "B208854B100603393ABFE63FA8975A55F6379CCD86BE9A76E5EA76BC92BEB365", "C6EAD3F3307C853EF572B5AA0C97E7BC9E1E5795E6DA460CC6BFA63F04CB54C5", "ED8A3D1B7861E9FADE2E56F3710C2F426BD0F046968D24A2807B0DBC778A1AA1", "F0AFFAB5446BEF6A6B346CA7237A1583252E55B1EA002352E7DFDFFB5796363C"]}, {"type": "lenovo", "idList": ["LENOVO:PS500267-ENCRYPTION-KEY-NEGOTIATION-OF-BLUETOOTH-VULNERABILITY-NOSID", "LENOVO:PS500267-NOSID"]}, {"type": "mageia", "idList": ["MGASA-2020-0227", "MGASA-2020-0228", "MGASA-2020-0333"]}, {"type": "nessus", "idList": ["AL2_ALAS-2020-1425.NASL", "AL2_ALAS-2020-1431.NASL", "AL2_ALAS-2020-1465.NASL", "AL2_ALAS-2020-1480.NASL", "AL2_ALASKERNEL-5_4-2022-011.NASL", "AL2_ALASKERNEL-5_4-2022-012.NASL", "AL2_ALASKERNEL-5_4-2022-013.NASL", "AL2_ALASKERNEL-5_4-2022-014.NASL", "AL2_ALASKERNEL-5_4-2022-016.NASL", "ALA_ALAS-2020-1366.NASL", "ALA_ALAS-2020-1377.NASL", "ALA_ALAS-2020-1382.NASL", "ALA_ALAS-2020-1401.NASL", "ALA_ALAS-2020-1437.NASL", "ALMA_LINUX_ALSA-2020-4431.NASL", "ALMA_LINUX_ALSA-2022-1988.NASL", "CENTOS8_RHSA-2020-2102.NASL", "CENTOS8_RHSA-2020-4431.NASL", "CENTOS_RHSA-2020-2103.NASL", "CENTOS_RHSA-2020-2664.NASL", "CENTOS_RHSA-2020-4060.NASL", "DEBIAN_DLA-2241.NASL", "DEBIAN_DLA-2242.NASL", "DEBIAN_DLA-2323.NASL", "DEBIAN_DLA-2385.NASL", "DEBIAN_DLA-2420.NASL", "DEBIAN_DSA-4698.NASL", "DEBIAN_DSA-4699.NASL", "EULEROS_SA-2020-1592.NASL", "EULEROS_SA-2020-1674.NASL", "EULEROS_SA-2020-1698.NASL", "EULEROS_SA-2020-1713.NASL", "EULEROS_SA-2020-1807.NASL", "EULEROS_SA-2020-1892.NASL", "EULEROS_SA-2020-1920.NASL", "EULEROS_SA-2020-1938.NASL", "EULEROS_SA-2020-1958.NASL", "EULEROS_SA-2020-2150.NASL", "EULEROS_SA-2020-2222.NASL", "EULEROS_SA-2020-2250.NASL", "EULEROS_SA-2020-2353.NASL", "EULEROS_SA-2020-2443.NASL", "EULEROS_SA-2020-2549.NASL", "EULEROS_SA-2021-1056.NASL", "EULEROS_SA-2021-1079.NASL", "EULEROS_SA-2021-1200.NASL", "EULEROS_SA-2021-1311.NASL", "EULEROS_SA-2021-1454.NASL", "EULEROS_SA-2021-1604.NASL", "EULEROS_SA-2021-2040.NASL", "EULEROS_SA-2021-2140.NASL", "EULEROS_SA-2021-2336.NASL", "FEDORA_2020-125CCDC871.NASL", "FEDORA_2020-1B2DAE6219.NASL", "FEDORA_2020-5436586091.NASL", "FEDORA_2020-57BF620276.NASL", "FEDORA_2020-5A69DECC0C.NASL", "FEDORA_2020-C6B9FFF7F8.NASL", "NEWSTART_CGSL_NS-SA-2020-0030_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0073_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0108_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0008_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0078_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0140_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2021-0169_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0001_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0075_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0099_KERNEL.NASL", "NUTANIX_NXSA-AOS-5_15_3.NASL", "NUTANIX_NXSA-AOS-5_15_5.NASL", "NUTANIX_NXSA-AOS-5_17_1_3.NASL", "NUTANIX_NXSA-AOS-5_17_1_5.NASL", "NUTANIX_NXSA-AOS-5_18.NASL", "NUTANIX_NXSA-AOS-5_19_0_5.NASL", "NUTANIX_NXSA-AOS-5_19_1.NASL", "OPENSUSE-2020-1062.NASL", "OPENSUSE-2020-1153.NASL", "OPENSUSE-2020-1236.NASL", "OPENSUSE-2020-801.NASL", "OPENSUSE-2020-935.NASL", "OPENSUSE-2021-242.NASL", "ORACLELINUX_ELSA-2020-2082.NASL", "ORACLELINUX_ELSA-2020-2102.NASL", "ORACLELINUX_ELSA-2020-2103.NASL", "ORACLELINUX_ELSA-2020-2664.NASL", "ORACLELINUX_ELSA-2020-3218.NASL", "ORACLELINUX_ELSA-2020-5676.NASL", "ORACLELINUX_ELSA-2020-5755.NASL", "ORACLELINUX_ELSA-2020-5756.NASL", "ORACLELINUX_ELSA-2020-5801.NASL", "ORACLELINUX_ELSA-2020-5804.NASL", "ORACLELINUX_ELSA-2020-5805.NASL", "ORACLELINUX_ELSA-2020-5837.NASL", "ORACLELINUX_ELSA-2020-5841.NASL", "ORACLELINUX_ELSA-2020-5844.NASL", "ORACLELINUX_ELSA-2020-5845.NASL", "ORACLELINUX_ELSA-2020-5848.NASL", "ORACLELINUX_ELSA-2020-5866.NASL", "ORACLELINUX_ELSA-2020-5885.NASL", "ORACLELINUX_ELSA-2021-9002.NASL", "ORACLELINUX_ELSA-2021-9442.NASL", "ORACLELINUX_ELSA-2021-9473.NASL", "ORACLELINUX_ELSA-2022-1988.NASL", "ORACLEVM_OVMSA-2020-0032.NASL", "ORACLEVM_OVMSA-2020-0041.NASL", "ORACLEVM_OVMSA-2020-0044.NASL", "ORACLEVM_OVMSA-2021-0001.NASL", "ORACLEVM_OVMSA-2021-0030.NASL", "ORACLEVM_OVMSA-2021-0035.NASL", "PHOTONOS_PHSA-2020-1_0-0293_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0297_LINUX.NASL", "PHOTONOS_PHSA-2020-1_0-0303_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0242_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0246_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0256_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0288_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0089_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0100_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0108_LINUX.NASL", "REDHAT-RHSA-2020-2082.NASL", "REDHAT-RHSA-2020-2085.NASL", "REDHAT-RHSA-2020-2102.NASL", "REDHAT-RHSA-2020-2103.NASL", "REDHAT-RHSA-2020-2104.NASL", "REDHAT-RHSA-2020-2125.NASL", "REDHAT-RHSA-2020-2171.NASL", "REDHAT-RHSA-2020-2199.NASL", "REDHAT-RHSA-2020-2203.NASL", "REDHAT-RHSA-2020-2214.NASL", "REDHAT-RHSA-2020-2242.NASL", "REDHAT-RHSA-2020-2277.NASL", "REDHAT-RHSA-2020-2285.NASL", "REDHAT-RHSA-2020-2289.NASL", "REDHAT-RHSA-2020-2291.NASL", "REDHAT-RHSA-2020-2429.NASL", "REDHAT-RHSA-2020-2519.NASL", "REDHAT-RHSA-2020-2522.NASL", "REDHAT-RHSA-2020-2664.NASL", "REDHAT-RHSA-2020-2665.NASL", "REDHAT-RHSA-2020-2831.NASL", "REDHAT-RHSA-2020-2832.NASL", "REDHAT-RHSA-2020-2851.NASL", "REDHAT-RHSA-2020-2854.NASL", "REDHAT-RHSA-2020-3010.NASL", "REDHAT-RHSA-2020-3016.NASL", "REDHAT-RHSA-2020-3019.NASL", "REDHAT-RHSA-2020-3041.NASL", "REDHAT-RHSA-2020-3073.NASL", "REDHAT-RHSA-2020-3218.NASL", "REDHAT-RHSA-2020-3219.NASL", "REDHAT-RHSA-2020-3222.NASL", "REDHAT-RHSA-2020-3228.NASL", "REDHAT-RHSA-2020-3230.NASL", "REDHAT-RHSA-2020-3297.NASL", "REDHAT-RHSA-2020-4060.NASL", "REDHAT-RHSA-2020-4062.NASL", "REDHAT-RHSA-2020-4431.NASL", "REDHAT-RHSA-2020-4609.NASL", "REDHAT-RHSA-2022-1975.NASL", "REDHAT-RHSA-2022-1988.NASL", "SLACKWARE_SSA_2020-163-01.NASL", "SLACKWARE_SSA_2020-295-01.NASL", "SL_20200512_KERNEL_ON_SL6_X.NASL", "SL_20200512_KERNEL_ON_SL7_X.NASL", "SL_20200623_KERNEL_ON_SL7_X.NASL", "SL_20201001_KERNEL_ON_SL7_X.NASL", "SUSE_SU-2020-14442-1.NASL", "SUSE_SU-2020-1587-1.NASL", "SUSE_SU-2020-1596-1.NASL", "SUSE_SU-2020-1597-1.NASL", "SUSE_SU-2020-1599-1.NASL", "SUSE_SU-2020-1602-1.NASL", "SUSE_SU-2020-1603-1.NASL", "SUSE_SU-2020-1605-1.NASL", "SUSE_SU-2020-1663-1.NASL", "SUSE_SU-2020-1693-1.NASL", "SUSE_SU-2020-1699-1.NASL", "SUSE_SU-2020-1713-1.NASL", "SUSE_SU-2020-2106-1.NASL", "SUSE_SU-2020-2107-1.NASL", "SUSE_SU-2020-2119-1.NASL", "SUSE_SU-2020-2121-1.NASL", "SUSE_SU-2020-2122-1.NASL", "SUSE_SU-2020-2134-1.NASL", "SUSE_SU-2020-2152-1.NASL", "SUSE_SU-2020-2487-1.NASL", "SUSE_SU-2020-2575-1.NASL", "SUSE_SU-2020-2610-1.NASL", "SUSE_SU-2020-2623-1.NASL", "SUSE_SU-2021-0438-1.NASL", "SUSE_SU-2022-2721-1.NASL", "SUSE_SU-2022-2840-1.NASL", "UBUNTU_USN-4389-1.NASL", "UBUNTU_USN-4390-1.NASL", "UBUNTU_USN-4391-1.NASL", "UBUNTU_USN-4411-1.NASL", "UBUNTU_USN-4412-1.NASL", "UBUNTU_USN-4413-1.NASL", "UBUNTU_USN-4414-1.NASL", "UBUNTU_USN-4419-1.NASL", "UBUNTU_USN-4425-1.NASL", "UBUNTU_USN-4426-1.NASL", "UBUNTU_USN-4427-1.NASL", "UBUNTU_USN-4439-1.NASL", "UBUNTU_USN-4440-1.NASL", "UBUNTU_USN-4462-1.NASL", "UBUNTU_USN-4463-1.NASL", "UBUNTU_USN-4465-1.NASL", "UBUNTU_USN-4483-1.NASL", "UBUNTU_USN-4485-1.NASL", "UBUNTU_USN-4525-1.NASL", "UBUNTU_USN-4526-1.NASL", "UBUNTU_USN-4657-1.NASL", "UBUNTU_USN-4658-1.NASL", "UBUNTU_USN-4659-1.NASL", "UBUNTU_USN-4680-1.NASL", "UBUNTU_USN-4752-1.NASL", "UBUNTU_USN-5361-1.NASL", "VIRTUOZZO_VZA-2020-037.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704698", "OPENVAS:1361412562310704699", "OPENVAS:1361412562310844461", "OPENVAS:1361412562310844464", "OPENVAS:1361412562310844465", "OPENVAS:1361412562310844482", "OPENVAS:1361412562310844483", "OPENVAS:1361412562310844484", "OPENVAS:1361412562310844485", "OPENVAS:1361412562310844496", "OPENVAS:1361412562310853206", "OPENVAS:1361412562310853260", "OPENVAS:1361412562310877859", "OPENVAS:1361412562310877862", "OPENVAS:1361412562310877884", "OPENVAS:1361412562310877888", "OPENVAS:1361412562310877909", "OPENVAS:1361412562310877952", "OPENVAS:1361412562310877960", "OPENVAS:1361412562310877974", "OPENVAS:1361412562310877977", "OPENVAS:1361412562310883236", "OPENVAS:1361412562310883257", "OPENVAS:1361412562310892241", "OPENVAS:1361412562310892242", "OPENVAS:1361412562311220201592", "OPENVAS:1361412562311220201674", "OPENVAS:1361412562311220201698", "OPENVAS:1361412562311220201713"]}, {"type": "oracle", "idList": ["ORACLE:CPUAPR2021", "ORACLE:CPUJUL2022"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-2082", "ELSA-2020-2102", "ELSA-2020-2103", "ELSA-2020-2427", "ELSA-2020-2430", "ELSA-2020-2664", "ELSA-2020-3010", "ELSA-2020-3218", "ELSA-2020-4060", "ELSA-2020-4431", "ELSA-2020-5676", "ELSA-2020-5755", "ELSA-2020-5756", "ELSA-2020-5792", "ELSA-2020-5801", "ELSA-2020-5804", "ELSA-2020-5805", "ELSA-2020-5837", "ELSA-2020-5841", "ELSA-2020-5844", "ELSA-2020-5845", "ELSA-2020-5848", "ELSA-2020-5866", "ELSA-2020-5885", "ELSA-2021-9002", "ELSA-2021-9442", "ELSA-2021-9473", "ELSA-2022-1988"]}, {"type": "osv", "idList": ["OSV:ASB-A-156766097", "OSV:ASB-A-169505740", "OSV:ASB-A-169505929", "OSV:ASB-A-170658976", "OSV:DLA-2241-1", "OSV:DLA-2242-1", "OSV:DLA-2323-1", "OSV:DLA-2385-1", "OSV:DLA-2420-1", "OSV:DSA-4698-1", "OSV:DSA-4699-1"]}, {"type": "photon", "idList": ["PHSA-2020-0052", "PHSA-2020-0069", "PHSA-2020-0089", "PHSA-2020-0100", "PHSA-2020-0108", "PHSA-2020-0120", "PHSA-2020-0127", "PHSA-2020-0153", "PHSA-2020-0212", "PHSA-2020-0219", "PHSA-2020-0242", "PHSA-2020-0246", "PHSA-2020-0254", "PHSA-2020-0256", "PHSA-2020-0274", "PHSA-2020-0279", "PHSA-2020-0293", "PHSA-2020-0297", "PHSA-2020-0303", "PHSA-2020-0305", "PHSA-2020-0309", "PHSA-2020-0314", "PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0293", "PHSA-2020-1.0-0297", "PHSA-2020-1.0-0303", "PHSA-2020-1.0-0305", "PHSA-2020-1.0-0309", "PHSA-2020-2.0-0242", "PHSA-2020-2.0-0246", "PHSA-2020-2.0-0256", "PHSA-2020-2.0-0288", "PHSA-2020-3.0-0052", "PHSA-2020-3.0-0069", "PHSA-2020-3.0-0089", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0108", "PHSA-2020-3.0-0118", "PHSA-2020-3.0-0120", "PHSA-2020-3.0-0127", "PHSA-2020-3.0-0153", "PHSA-2021-0436"]}, {"type": "redhat", "idList": ["RHSA-2020:2082", "RHSA-2020:2085", "RHSA-2020:2102", "RHSA-2020:2103", "RHSA-2020:2104", "RHSA-2020:2125", "RHSA-2020:2171", "RHSA-2020:2199", "RHSA-2020:2203", "RHSA-2020:2214", "RHSA-2020:2242", "RHSA-2020:2277", "RHSA-2020:2285", "RHSA-2020:2289", "RHSA-2020:2291", "RHSA-2020:2429", "RHSA-2020:2519", "RHSA-2020:2522", "RHSA-2020:2664", "RHSA-2020:2665", "RHSA-2020:2831", "RHSA-2020:2832", "RHSA-2020:2851", "RHSA-2020:2854", "RHSA-2020:3010", "RHSA-2020:3016", "RHSA-2020:3019", "RHSA-2020:3041", "RHSA-2020:3073", "RHSA-2020:3194", "RHSA-2020:3218", "RHSA-2020:3219", "RHSA-2020:3222", "RHSA-2020:3228", "RHSA-2020:3230", "RHSA-2020:3297", "RHSA-2020:4060", "RHSA-2020:4062", "RHSA-2020:4431", "RHSA-2020:4609", "RHSA-2020:5633", "RHSA-2020:5635", "RHSA-2022:1975", "RHSA-2022:1988", "RHSA-2022:4814", "RHSA-2022:4956", "RHSA-2022:5201", "RHSA-2022:5392", "RHSA-2022:5483"]}, {"type": "redhatcve", "idList": ["RH:CVE-2019-19462", "RH:CVE-2019-20810", "RH:CVE-2019-20812", "RH:CVE-2020-0305", "RH:CVE-2020-10135", "RH:CVE-2020-10711", "RH:CVE-2020-10732", "RH:CVE-2020-10751", "RH:CVE-2020-10766", "RH:CVE-2020-10767", "RH:CVE-2020-10768", "RH:CVE-2020-10773", "RH:CVE-2020-10781", "RH:CVE-2020-12656", "RH:CVE-2020-12769", "RH:CVE-2020-12771", "RH:CVE-2020-12888", "RH:CVE-2020-13143", "RH:CVE-2020-13974", "RH:CVE-2020-14416", "RH:CVE-2020-15393", "RH:CVE-2020-15780"]}, {"type": "rocky", "idList": ["RLSA-2022:1975", "RLSA-2022:1988"]}, {"type": "slackware", "idList": ["SSA-2020-163-01", "SSA-2020-295-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2020:0801-1", "OPENSUSE-SU-2020:0935-1", "OPENSUSE-SU-2020:1062-1", "OPENSUSE-SU-2020:1153-1", "OPENSUSE-SU-2020:1236-1", "OPENSUSE-SU-2021:0242-1"]}, {"type": "threatpost", "idList": ["THREATPOST:17E00AD621A0ECD9F90FE97E083BF4AC"]}, {"type": "ubuntu", "idList": ["LSN-0069-1", "USN-4389-1", "USN-4390-1", "USN-4391-1", "USN-4411-1", "USN-4412-1", "USN-4413-1", "USN-4414-1", "USN-4419-1", "USN-4425-1", "USN-4426-1", "USN-4427-1", "USN-4439-1", "USN-4440-1", "USN-4462-1", "USN-4463-1", "USN-4465-1", "USN-4483-1", "USN-4485-1", "USN-4525-1", "USN-4526-1", "USN-4657-1", "USN-4658-1", "USN-4658-2", "USN-4659-1", "USN-4659-2", "USN-4680-1", "USN-4752-1", "USN-5361-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2019-19462", "UB:CVE-2019-20810", "UB:CVE-2019-20812", "UB:CVE-2020-0305", "UB:CVE-2020-10135", "UB:CVE-2020-10711", "UB:CVE-2020-10732", "UB:CVE-2020-10751", "UB:CVE-2020-10766", "UB:CVE-2020-10767", "UB:CVE-2020-10768", "UB:CVE-2020-10773", "UB:CVE-2020-10781", "UB:CVE-2020-12656", "UB:CVE-2020-12769", "UB:CVE-2020-12771", "UB:CVE-2020-12888", "UB:CVE-2020-13143", "UB:CVE-2020-13974", "UB:CVE-2020-14416", "UB:CVE-2020-15393", "UB:CVE-2020-15780"]}, {"type": "veracode", "idList": ["VERACODE:25398", "VERACODE:25748", "VERACODE:25938", "VERACODE:25939", "VERACODE:25942", "VERACODE:25977", "VERACODE:26831", "VERACODE:26927", "VERACODE:27151", "VERACODE:27184", "VERACODE:27771", "VERACODE:27775", "VERACODE:27776", "VERACODE:27802", "VERACODE:35826"]}, {"type": "virtuozzo", "idList": ["VZA-2020-036", "VZA-2020-037", "VZA-2020-048", "VZA-2020-055", "VZA-2020-056"]}]}, "score": {"value": 0.3, "vector": "NONE"}, "backreferences": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:4431"]}, {"type": "amazon", "idList": ["ALAS-2020-1366", "ALAS-2020-1377"]}, {"type": "androidsecurity", "idList": ["ANDROID:2020-08-01", "ANDROID:2021-01-01"]}, {"type": "apple", "idList": ["APPLE:100C3E37B89C4B8E50DE097059456EC2", "APPLE:42A8665131AAD41DD01DD2DE9BBDEBC5", "APPLE:48DFAA81838B82F0614B9A03F99F251D", "APPLE:819AEF513AB880D6C4F6CA66CB3C0021", "APPLE:HT210346", "APPLE:HT210348", "APPLE:HT210351", "APPLE:HT210353"]}, {"type": "centos", "idList": ["CESA-2020:2103"]}, {"type": "cert", "idList": ["VU:647177"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:5D359B30C62666D917EB31596D1BFDE4"]}, {"type": "cve", "idList": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2242-1:573AF", "DEBIAN:DSA-4698-1:66813", "DEBIAN:DSA-4699-1:122C4"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2019-19462", "DEBIANCVE:CVE-2019-20810", "DEBIANCVE:CVE-2019-20812", "DEBIANCVE:CVE-2020-0305", "DEBIANCVE:CVE-2020-10711", "DEBIANCVE:CVE-2020-10732", "DEBIANCVE:CVE-2020-10751", "DEBIANCVE:CVE-2020-10766", "DEBIANCVE:CVE-2020-10767", "DEBIANCVE:CVE-2020-10768", "DEBIANCVE:CVE-2020-10773", "DEBIANCVE:CVE-2020-10781", "DEBIANCVE:CVE-2020-12656", "DEBIANCVE:CVE-2020-12769", "DEBIANCVE:CVE-2020-12771", "DEBIANCVE:CVE-2020-12888", "DEBIANCVE:CVE-2020-13143", "DEBIANCVE:CVE-2020-13974", "DEBIANCVE:CVE-2020-14416", "DEBIANCVE:CVE-2020-15393", "DEBIANCVE:CVE-2020-15780"]}, {"type": "f5", "idList": ["F5:K02354867"]}, {"type": "fedora", "idList": ["FEDORA:055473124314", "FEDORA:083D7313CFDA", "FEDORA:15484608781D", "FEDORA:62D0460BC99C", "FEDORA:68BA3606732B", "FEDORA:803AE30C6416", "FEDORA:8143631CA0A0", "FEDORA:9F68660D2A0F", "FEDORA:AAD0A60B6998"]}, {"type": "githubexploit", "idList": ["1E46B7EE-F59D-58E5-B8DD-D0465CBC37FE"]}, {"type": "huawei", "idList": ["HUAWEI-SA-20200805-01-BLUETOOTH"]}, {"type": "ibm", "idList": ["22DFDD1FF1BBF70D9C813ACA916818103631328A11AEED7718476AD8FD37F722", "74EB94293C5F397767E62C9F6D734DE973B44B9B7EC427A98C99E92C3C3D6590", "7BEBE6C769A16D13746B813CF456C36F85AE1B1A1CBD26E71A53BD6E5B34E2F4"]}, {"type": "lenovo", "idList": ["LENOVO:PS500267-NOSID"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/ORACLE_LINUX-CVE-2020-10742/", "MSF:ILITIES/UBUNTU-CVE-2020-28588/"]}, {"type": "nessus", "idList": ["AL2_ALAS-2020-1425.NASL", "AL2_ALAS-2020-1431.NASL", "ALA_ALAS-2020-1366.NASL", "ALA_ALAS-2020-1377.NASL", "CENTOS_RHSA-2020-2103.NASL", "EULEROS_SA-2020-1592.NASL", "FEDORA_2020-5436586091.NASL", "FEDORA_2020-57BF620276.NASL", "FEDORA_2020-5A69DECC0C.NASL", "FEDORA_2020-C6B9FFF7F8.NASL", "NEWSTART_CGSL_NS-SA-2020-0030_KERNEL.NASL", "ORACLELINUX_ELSA-2020-2082.NASL", "ORACLELINUX_ELSA-2020-2102.NASL", "ORACLELINUX_ELSA-2020-2103.NASL", "ORACLELINUX_ELSA-2020-5676.NASL", "PHOTONOS_PHSA-2020-1_0-0293_LINUX.NASL", "PHOTONOS_PHSA-2020-2_0-0242_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0089_LINUX.NASL", "PHOTONOS_PHSA-2020-3_0-0100_LINUX.NASL", "REDHAT-RHSA-2020-2082.NASL", "REDHAT-RHSA-2020-2085.NASL", "REDHAT-RHSA-2020-2102.NASL", "REDHAT-RHSA-2020-2103.NASL", "REDHAT-RHSA-2020-2104.NASL", "REDHAT-RHSA-2020-2171.NASL", "REDHAT-RHSA-2020-2199.NASL", "REDHAT-RHSA-2020-2214.NASL", "REDHAT-RHSA-2020-2242.NASL", "REDHAT-RHSA-2020-2277.NASL", "REDHAT-RHSA-2020-2285.NASL", "REDHAT-RHSA-2020-2289.NASL", "REDHAT-RHSA-2020-2429.NASL", "REDHAT-RHSA-2020-3010.NASL", "REDHAT-RHSA-2020-3016.NASL", "REDHAT-RHSA-2020-3019.NASL", "REDHAT-RHSA-2020-3041.NASL", "SLACKWARE_SSA_2020-163-01.NASL", "SL_20200512_KERNEL_ON_SL6_X.NASL", "SL_20200512_KERNEL_ON_SL7_X.NASL", "UBUNTU_USN-4389-1.NASL", "UBUNTU_USN-4425-1.NASL", "UBUNTU_USN-4426-1.NASL", "UBUNTU_USN-4427-1.NASL", "VIRTUOZZO_VZA-2020-037.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310877859", "OPENVAS:1361412562310877862", "OPENVAS:1361412562310877884", "OPENVAS:1361412562310877888", "OPENVAS:1361412562310877909", "OPENVAS:1361412562310883236", "OPENVAS:1361412562311220201592"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-2082", "ELSA-2020-2102", "ELSA-2020-2103", "ELSA-2020-2427", "ELSA-2020-2430"]}, {"type": "photon", "idList": ["PHSA-2020-1.0-0274", "PHSA-2020-1.0-0279", "PHSA-2020-1.0-0293", "PHSA-2020-1.0-0297", "PHSA-2020-1.0-0303", "PHSA-2020-1.0-0305", "PHSA-2020-1.0-0309", "PHSA-2020-2.0-0242", "PHSA-2020-2.0-0246", "PHSA-2020-2.0-0256", "PHSA-2020-3.0-0069", "PHSA-2020-3.0-0089", "PHSA-2020-3.0-0100", "PHSA-2020-3.0-0108", "PHSA-2020-3.0-0127", "PHSA-2020-3.0-0153"]}, {"type": "redhat", "idList": ["RHSA-2020:2082", "RHSA-2020:2429"]}, {"type": "redhatcve", "idList": ["RH:CVE-2019-20810", "RH:CVE-2019-20812", "RH:CVE-2020-0305", "RH:CVE-2020-10135", "RH:CVE-2020-10711", "RH:CVE-2020-10732", "RH:CVE-2020-10751", "RH:CVE-2020-10766", "RH:CVE-2020-10767", "RH:CVE-2020-10768", "RH:CVE-2020-10773", "RH:CVE-2020-10781", "RH:CVE-2020-12656", "RH:CVE-2020-12769", "RH:CVE-2020-12771", "RH:CVE-2020-12888", "RH:CVE-2020-13143", "RH:CVE-2020-14416", "RH:CVE-2020-15393", "RH:CVE-2020-15780"]}, {"type": "slackware", "idList": ["SSA-2020-163-01", "SSA-2020-295-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2020:0801-1"]}, {"type": "threatpost", "idList": ["THREATPOST:17E00AD621A0ECD9F90FE97E083BF4AC"]}, {"type": "ubuntu", "idList": ["USN-4389-1", "USN-4425-1", "USN-4426-1", "USN-4427-1", "USN-4680-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2019-19462", "UB:CVE-2019-20810", "UB:CVE-2019-20812", "UB:CVE-2020-0305", "UB:CVE-2020-10135", "UB:CVE-2020-10711", "UB:CVE-2020-10732", "UB:CVE-2020-10751", "UB:CVE-2020-10766", "UB:CVE-2020-10767", "UB:CVE-2020-10768", "UB:CVE-2020-10773", "UB:CVE-2020-10781", "UB:CVE-2020-12656", "UB:CVE-2020-12769", "UB:CVE-2020-12771", "UB:CVE-2020-12888", "UB:CVE-2020-13143", "UB:CVE-2020-13974", "UB:CVE-2020-14416", "UB:CVE-2020-15393", "UB:CVE-2020-15780"]}, {"type": "virtuozzo", "idList": ["VZA-2020-037"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2019-19462", "epss": 0.00044, "percentile": 0.0825, "modified": "2023-05-07"}, {"cve": "CVE-2019-20810", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2019-20812", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2020-0305", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-10135", "epss": 0.00105, "percentile": 0.41392, "modified": "2023-05-07"}, {"cve": "CVE-2020-10711", "epss": 0.00437, "percentile": 0.70958, "modified": "2023-05-07"}, {"cve": "CVE-2020-10732", "epss": 0.0005, "percentile": 0.16969, "modified": "2023-05-07"}, {"cve": "CVE-2020-10751", "epss": 0.0005, "percentile": 0.16969, "modified": "2023-05-07"}, {"cve": "CVE-2020-10766", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-10767", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-10768", "epss": 0.00044, "percentile": 0.10248, "modified": "2023-05-07"}, {"cve": "CVE-2020-10773", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-10781", "epss": 0.00042, "percentile": 0.05667, "modified": "2023-05-07"}, {"cve": "CVE-2020-12656", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2020-12769", "epss": 0.00042, "percentile": 0.05739, "modified": "2023-05-07"}, {"cve": "CVE-2020-12771", "epss": 0.00054, "percentile": 0.19762, "modified": "2023-05-07"}, {"cve": "CVE-2020-12888", "epss": 0.00047, "percentile": 0.14112, "modified": "2023-05-07"}, {"cve": "CVE-2020-13143", "epss": 0.00663, "percentile": 0.76665, "modified": "2023-05-07"}, {"cve": "CVE-2020-13974", "epss": 0.00077, "percentile": 0.31514, "modified": "2023-05-07"}, {"cve": "CVE-2020-14416", "epss": 0.00046, "percentile": 0.12718, "modified": "2023-05-07"}, {"cve": "CVE-2020-15393", "epss": 0.00045, "percentile": 0.121, "modified": "2023-05-07"}, {"cve": "CVE-2020-15780", "epss": 0.00047, "percentile": 0.14112, "modified": "2023-05-07"}], "vulnersScore": 0.3}, "_state": {"dependencies": 1684442002, "score": 1698840310, "epss": 0}, "_internal": {"score_hash": "4ce7cf91aa885b5dca4c69651bb4ed12"}, "pluginID": "139308", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2105-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139308);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\n \"CVE-2019-19462\",\n \"CVE-2019-20810\",\n \"CVE-2019-20812\",\n \"CVE-2020-0305\",\n \"CVE-2020-10135\",\n \"CVE-2020-10711\",\n \"CVE-2020-10732\",\n \"CVE-2020-10751\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-10773\",\n \"CVE-2020-10781\",\n \"CVE-2020-12656\",\n \"CVE-2020-12769\",\n \"CVE-2020-12771\",\n \"CVE-2020-12888\",\n \"CVE-2020-13143\",\n \"CVE-2020-13974\",\n \"CVE-2020-14416\",\n \"CVE-2020-15393\",\n \"CVE-2020-15780\"\n );\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2105-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 15 SP2 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2019-19462: relay_open in kernel/relay.c in the Linux kernel\nallowed local users to cause a denial of service (such as relay\nblockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c because it did not call\nsnd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-20812: An issue was discovered in the\nprb_calc_retire_blk_tmo() function in net/packet/af_packet.c could\nresult in a denial of service (CPU consumption and soft lockup) in a\ncertain failure case involving TPACKET_V3 (bnc#1172453).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth® BR/EDR Core Specification v5.2\nand earlier may have allowed an unauthenticated user to complete\nauthentication without pairing credentials via adjacent access. An\nunauthenticated, adjacent attacker could impersonate a Bluetooth\nBR/EDR master or slave to pair with a previously paired remote device\nto successfully complete the authentication procedure without knowing\nthe link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the\nSELinux subsystem in versions This flaw occurs while importing the\nCommercial IP Security Option (CIPSO) protocol's category bitmap into\nthe SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\nThis flaw allowed a remote network user to crash the system kernel,\nresulting in a denial of service (bnc#1171191).\n\nCVE-2020-10732: A flaw was found in the implementation of Userspace\ncore dumps. This flaw allowed an attacker with a local account to\ncrash a trivial program and exfiltrate private kernel data\n(bnc#1171220).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook\nimplementation, where it incorrectly assumed that an skb would only\ncontain a single netlink message. The hook would incorrectly only\nvalidate the first netlink message in the skb and allow or deny the\nrest of the messages within the skb with the granted permission\nwithout further processing (bnc#1171189).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local\naccount to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction\nBarrier was disabled in certain circumstances, leaving the system open\nto a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where\nindirect branch speculation could be enabled even though it was\ndiabled before (bnc#1172783).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the\ncmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-10781: A zram sysfs resource consumption was fixed\n(bnc#1173074).\n\nCVE-2020-12656: Fixed a memory leak in gss_mech_free in the\nrpcsec_gss_krb5 implementation, caused by a lack of certain\ndomain_release calls (bnc#1171219).\n\nCVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c\nallowed attackers to cause a panic via concurrent calls to dw_spi_irq\nand dw_spi_transfer_one (bnc#1171983).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in\ndrivers/md/bcache/btree.c has a deadlock if a coalescing operation\nfails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-13143: gadget_dev_desc_UDC_store in\ndrivers/usb/gadget/configfs.c relies on kstrdup without considering\nthe possibility of an internal '\\0' value, which allowed attackers to\ntrigger an out-of-bounds read (bnc#1171982).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c,\nif k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in\nthe slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c\n(bnc#1162002).\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect\n(bnc#1173514).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152472\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152489\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1153274\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154353\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1154492\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155518\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1155798\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1156395\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1157169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158050\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158242\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158265\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158748\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158765\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1160947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161495\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162400\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162702\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164648\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164777\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165211\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165933\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165975\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166985\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167651\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167773\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168230\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168779\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169021\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169094\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169681\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170774\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170879\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170891\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170895\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171150\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171246\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171417\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171513\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171662\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171699\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171828\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171857\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171915\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171982\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172017\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172046\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172061\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172062\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172063\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172064\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172065\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172066\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172067\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172068\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172069\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172073\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172086\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172095\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172169\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172170\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172201\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172208\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172342\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172365\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172366\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172374\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172391\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172393\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172394\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172467\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172537\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172543\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172739\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172814\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172823\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172841\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172938\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172939\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172940\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172956\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172983\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172984\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172985\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172986\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172987\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172988\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172989\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172990\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173068\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173085\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173139\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173206\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173271\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173461\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173552\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173625\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173776\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173817\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173822\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173823\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173824\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173827\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173828\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173830\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173831\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173832\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173834\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173836\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173837\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173841\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173843\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173844\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173847\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173849\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173860\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173894\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173941\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174018\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174072\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174116\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174126\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174127\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174128\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174129\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174185\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174263\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174264\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174331\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174332\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174333\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174396\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174398\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174407\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174411\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174513\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174527\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174627\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=962849\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-19462/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20810/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-20812/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-0305/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10135/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10711/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10732/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10751/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10766/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10767/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10768/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10773/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-10781/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12656/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12769/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12771/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-12888/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13143/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-13974/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-14416/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15393/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2020-15780/\");\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202105-1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?965229cb\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-WE-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP2 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise High Availability 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-SP2-2020-2105=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-13974\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/04\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-preempt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP2\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-base-5.3.18-24.9.1.9.2.6\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-default-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-obs-build-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-obs-build-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"kernel-syms-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"reiserfs-kmp-default-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"2\", reference:\"reiserfs-kmp-default-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", cpu:\"x86_64\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-base-5.3.18-24.9.1.9.2.6\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-devel-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-default-devel-debuginfo-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-obs-build-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-obs-build-debugsource-5.3.18-24.9.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"2\", reference:\"kernel-syms-5.3.18-24.9.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "naslFamily": "SuSE Local Security Checks", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-preempt", "p-cpe:/a:novell:suse_linux:kernel-preempt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-preempt-debugsource", "p-cpe:/a:novell:suse_linux:kernel-preempt-devel", "p-cpe:/a:novell:suse_linux:kernel-preempt-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "solution": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-WE-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Development-Tools-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP2-2020-2105=1\n\nSUSE Linux Enterprise High Availability 15-SP2 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-SP2-2020-2105=1", "nessusSeverity": "High", "cvssScoreSource": "CVE-2020-15780", "vendor_cvss2": {"score": 7.2, "vector": "CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "vendor_cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "vpr": {"risk factor": "Medium", "score": "6.7"}, "exploitAvailable": true, "exploitEase": "Exploits are available", "patchPublicationDate": "2020-08-03T00:00:00", "vulnerabilityPublicationDate": "2019-11-30T00:00:00", "exploitableWith": []}
{"suse": [{"lastseen": "2022-11-08T23:04:28", "description": "An update that solves 16 vulnerabilities and has 117 fixes\n is now available.\n\nDescription:\n\n\n\n The openSUSE Leap 15.2 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c\n did not call snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n - CVE-2020-10711: A NULL pointer dereference flaw was found in the Linux\n kernel's SELinux subsystem. This flaw occurs while importing the\n Commercial IP Security Option (CIPSO) protocol's category bitmap into\n the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\n While processing the CIPSO restricted bitmap tag in the\n 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to\n indicate that the category bitmap is present, even if it has not been\n allocated. This issue leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This flaw allowed a\n remote network user to crash the system kernel, resulting in a denial of\n service (bnc#1171191).\n - CVE-2020-10732: A flaw was found in the implementation of Userspace core\n dumps. This flaw allowed an attacker with a local account to crash a\n trivial program and exfiltrate private kernel data (bnc#1171220).\n - CVE-2020-10751: SELinux LSM hook implementation before version 5.7,\n where it incorrectly assumed that an skb would only contain a single\n netlink message. The hook would incorrectly only validate the first\n netlink message in the skb and allow or deny the rest of the messages\n within the skb with the granted permission without further processing\n (bnc#1171189).\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler\n logical bug allowed an attacker to turn off the SSBD protection.\n (bnc#1172781).\n - CVE-2020-10767: Fixed that Indirect Branch Prediction Barrier is\n force-disabled when STIBP is unavailable or enhanced IBRS is available.\n (bnc#1172782).\n - CVE-2020-10768: Fixed that indirect branch speculation can be enabled\n after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command\n (bnc#1172783).\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x.\n (bnc#1172999).\n - CVE-2020-12656: Fixed a memory leak in gss_mech_free in the\n rpcsec_gss_krb5 implementation due to lack of certain domain_release\n calls (bnc#1171219).\n - CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed\n attackers to cause a panic via concurrent calls to dw_spi_irq and\n dw_spi_transfer_one, aka CID-19b61392c5a8 (bnc#1171983).\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts to access\n disabled memory space (bnc#1171868).\n - CVE-2020-13143: gadget_dev_desc_UDC_store in\n drivers/usb/gadget/configfs.c relied on kstrdup without considering the\n possibility of an internal '\\0' value, which allowed attackers to\n trigger an out-of-bounds read, aka CID-15753588bcd4 (bnc#1171982).\n - CVE-2020-13974: tty/vt/keyboard.c had an integer overflow if k_ascii is\n called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n - CVE-2020-14416: A race condition in tty->disc_data handling in the slip\n and slcan line discipline could lead to a use-after-free, aka\n CID-0ace17d56824. This affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c (bnc#1162002).\n\n The following non-security bugs were fixed:\n\n - ACPICA: Fixes for acpiExec namespace init file (git-fixes).\n - ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe()\n (git-fixes).\n - ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx handling\n (git-fixes).\n - ACPI: PM: Avoid using power resources if there are none for D0\n (git-fixes).\n - ACPI: sysfs: Fix reference count leak in\n acpi_sysfs_add_hotplug_profile() (git-fixes).\n - af_unix: add compat_ioctl support (git-fixes).\n - agp/intel: Reinforce the barrier after GTT updates (git-fixes).\n - ALSA: emu10k1: delete an unnecessary condition (git-fixes).\n - ALSA: es1688: Add the missed snd_card_free() (git-fixes).\n - ALSA: fireface: fix configuration error for nominal sampling transfer\n frequency (git-fixes).\n - ALSA: firewire-lib: fix invalid assignment to union data for directional\n parameter (git-fixes).\n - ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).\n - ALSA: hda: add member to store ratio for stripe control (git-fixes).\n - ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up\n (git-fixes).\n - ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n - ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround\n (bsc#1172017).\n - ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines\n (git-fixes).\n - ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).\n - ALSA: hda/realtek - Add more fixup entries for Clevo machines\n (git-fixes).\n - ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n - ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme\n (git-fixes).\n - ALSA: hda/realtek - Fix unused variable warning w/o\n CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).\n - ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).\n - ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).\n - ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio\n option (git-fixes).\n - ALSA: pcm: disallow linking stream to itself (git-fixes).\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n - ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).\n - ALSA: usb-audio: Add duplex sound support for USB devices using implicit\n feedback (git-fixes).\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).\n - ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt\n Dock (git-fixes).\n - ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).\n - ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats()\n (git-fixes).\n - ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).\n - ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing\n crosspoints (git-fixes).\n - ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).\n - ALSA: usb-audio: Fix racy list management in output queue (git-fixes).\n - ALSA: usb-audio: Improve frames size computation (git-fixes).\n - ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC\n (git-fixes).\n - ALSA: usb-audio: Print more information in stream proc files (git-fixes).\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio\n (git-fixes).\n - ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen\n (git-fixes).\n - ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).\n - ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).\n - amd-xgbe: Use __napi_schedule() in BH context\n (networking-stable-20_04_17).\n - arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).\n - ARM: oxnas: make ox820_boot_secondary static (git-fixes).\n - asm-gemeric/tlb: remove stray function declarations (bsc#1156395).\n - ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).\n - ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet\n (git-fixes).\n - ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need\n pmc_plt_clk_0 quirk (bsc#1171246).\n - ASoC: intel - fix the card names (git-fixes).\n - ASoC: max9867: fix volume controls (git-fixes).\n - ASoC: meson: add missing free_irq() in error path (git-fixes).\n - ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).\n - ASoC: SOF: core: fix error return code in sof_probe_continue()\n (git-fixes).\n - ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).\n - ath10k: Remove ath10k_qmi_register_service_notifier() declaration\n (git-fixes).\n - ath10k: remove the max_sched_scan_reqs value (git-fixes).\n - ath10k: Skip handling del_server during driver exit (git-fixes).\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).\n - ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).\n - ath9k_htc: Silence undersized packet warnings (git-fixes).\n - ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).\n - ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).\n - b43legacy: Fix case where channel status is corrupted (git-fixes).\n - bfq: Avoid false bfq queue merging (bsc#1171513).\n - bfq: Fix check detecting whether waker queue should be selected\n (bsc#1168838).\n - bfq: Use only idle IO periods for think time calculations (bsc#1171513).\n - bfq: Use 'ttime' local variable (bsc#1171513).\n - blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).\n - blk-iocost: fix incorrect vtime comparison in iocg_is_idle()\n (bsc#1173206).\n - bluetooth: btmtkuart: Improve exception handling in btmtuart_probe()\n (git-fixes).\n - bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).\n - bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371\n bsc#1153274).\n - bpf: Fix map permissions check (bsc#1155518).\n - bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).\n - bpf: Restrict bpf_probe_read{, str}() only to archs where they work\n (bsc#1172344).\n - bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).\n - bpf, sockmap: Check update requirements after locking (git-fixes).\n - bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).\n - brcmfmac: fix wrong location to get firmware feature (git-fixes).\n - btrfs: fix log context list corruption after rename whiteout error\n (bsc#1172342).\n - btrfs: fix partial loss of prealloc extent past i_size after fsync\n (bsc#1172343).\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent\n runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: reloc: fix reloc root leak and NULL pointer dereference\n (bsc#1171417 bsc#1160947 bsc#1172366).\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n - ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).\n - ceph: allow rename operation under different quota realms (bsc#1172988).\n - ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).\n - ceph: convert mdsc->cap_dirty to a per-session list (bsc#1172984\n bsc#1167104).\n - ceph: document what protects i_dirty_item and i_flushing_item\n (bsc#1172940).\n - ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).\n - ceph: do not return -ESTALE if there's still an open file (bsc#1171915).\n - ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).\n - ceph: fix potential race in ceph_check_caps (bsc#1172940).\n - ceph: flush release queue when handling caps for unknown inode\n (bsc#1172939).\n - ceph: make sure mdsc->mutex is nested in s->s_mutex to fix dead lock\n (bsc#1172989).\n - ceph: normalize 'delta' parameter usage in check_quota_exceeded\n (bsc#1172987).\n - ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).\n - ceph: request expedited service on session's last cap flush (bsc#1172985\n bsc#1167104).\n - ceph: reset i_requested_max_size if file write is not wanted\n (bsc#1172983).\n - ceph: skip checking caps when session reconnecting and releasing reqs\n (bsc#1172990).\n - ceph: split up __finish_cap_flush (bsc#1172940).\n - ceph: throw a warning if we destroy session with mutex still locked\n (bsc#1172940).\n - char/random: Add a newline at the end of the file (jsc#SLE-12424).\n - clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).\n - clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).\n - clk: clk-flexgen: fix clock-critical handling (git-fixes).\n - clk: mediatek: assign the initial value to clk_init_data of mtk_mux\n (git-fixes).\n - clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers\n (git-fixes).\n - clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).\n - clk: meson: meson8b: Fix the vclk_div{1, 2, 4, 6, 12}_en gate bits\n (git-fixes).\n - clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).\n - clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).\n - clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical\n (git-fixes).\n - clk: sprd: return correct type of value for _sprd_pll_recalc_rate\n (git-fixes).\n - clk: sunxi: Fix incorrect usage of round_down() (git-fixes).\n - clk: ti: am33xx: fix RTC clock parent (git-fixes).\n - clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).\n - component: Silence bind error on -EPROBE_DEFER (git-fixes).\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References:\n bsc#1172739\n - coredump: fix crash when umh is disabled (git-fixes).\n - coredump: fix null pointer dereference on coredump (git-fixes).\n - crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).\n - crypto: algboss - do not wait during notifier callback (git-fixes).\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is\n fully iterated (git-fixes).\n - crypto: ccp -- do not \"select\" CONFIG_DMADEVICES (git-fixes).\n - crypto: chelsio/chtls: properly set tp->lsndtime (git-fixes).\n - crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n - crypto: stm32/crc32 - fix multi-instance (git-fixes).\n - crypto: stm32/crc32 - fix run-time self test issue (git-fixes).\n - cxgb4: fix adapter crash due to wrong MC size\n (networking-stable-20_04_27).\n - cxgb4: fix large delays in PTP synchronization\n (networking-stable-20_04_27).\n - Delete\n patches.suse/seltests-powerpc-Add-a-selftest-for-memcpy_mcsafe.patch\n (bsc#1171699).\n - dma-coherent: fix integer overflow in the reserved-memory dma allocation\n (git-fixes).\n - dma-debug: fix displaying of dma allocation type (git-fixes).\n - dma-direct: fix data truncation in dma_direct_get_required_mask()\n (git-fixes).\n - dmaengine: dmatest: Fix process hang when reading 'wait' parameter\n (git-fixes).\n - dmaengine: dmatest: Restore default for channel (git-fixes).\n - dmaengine: mmp_tdma: Do not ignore slave config validation errors\n (git-fixes).\n - dmaengine: mmp_tdma: Reset channel error on release (git-fixes).\n - dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).\n - dmaengine: pch_dma.c: Avoid data race between probe and irq handler\n (git-fixes).\n - dmaengine: tegra210-adma: Fix an error handling path in\n 'tegra_adma_probe()' (git-fixes).\n - dm verity fec: fix hash block number in verity_fec_decode (git fixes\n (block drivers)).\n - dm writecache: fix data corruption when reloading the target (git fixes\n (block drivers)).\n - drivers/net/ibmvnic: Update VNIC protocol version reporting\n (bsc#1065729).\n - drivers: phy: sr-usb: do not use internal fsm for USB2 phy init\n (git-fixes).\n - drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static\n (git-fixes).\n - drm/amd/display: add basic atomic check for cursor plane (git-fixes).\n - drm/amd/display: drop cursor position check in atomic test (git-fixes).\n - drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).\n - drm/amdgpu: force fbdev into vram (bsc#1152472) \t* context changes\n - drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).\n - drm/amdgpu: simplify padding calculations (v2) (git-fixes).\n - drm/amd/powerplay: avoid using pm_en before it is initialized revised\n (git-fixes).\n - drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).\n - drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) \t* context\n changes\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).\n - drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).\n - drm: encoder_slave: fix refcouting error for modules (git-fixes).\n - drm/etnaviv: fix perfmon domain interation (git-fixes).\n - drm/etnaviv: rework perfmon query infrastructure (git-fixes).\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is\n (bsc#1152489)\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled\n (git-fixes).\n - drm/i915: extend audio CDCLK>=2*BCLK constraint to more platforms\n (git-fixes).\n - drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)\n - drm/i915: fix port checks for MST support on gen >= 11 (git-fixes).\n - drm/i915/gem: Avoid iterating an empty list (git-fixes).\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of\n (bsc#1152489)\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of\n inheritance (git-fixes).\n - drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489)\n * context changes\n - drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).\n - drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only\n (git-fixes).\n - drm/i915: Propagate error from completed fences (git-fixes).\n - drm/i915: Whitelist context-local timestamp in the gen9 cmdparser\n (git-fixes).\n - drm/i915: work around false-positive maybe-uninitialized warning\n (git-fixes).\n - drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).\n - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper()\n (git-fixes).\n - drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).\n - drm/vkms: Hold gem object while still in-use (git-fixes).\n - dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg()\n (git-fixes).\n - e1000e: Disable TSO for buffer overrun workaround (git-fixes).\n - e1000e: Do not wake up the system via WOL if device wakeup is disabled\n (git-fixes).\n - EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).\n - EDAC/ghes: Setup DIMM label from DMI and use it in error reports\n (bsc#1168779).\n - EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable\n (bsc#1152489).\n - EDAC/synopsys: Do not dump uninitialized pinf->col (bsc#1152489).\n - efi/efivars: Add missing kobject_put() in sysfs entry creation error\n path (git-fixes).\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness\n (jsc#SLE-12424).\n - efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).\n - efi/tpm: Verify event log header before parsing (bsc#1173461).\n - eventpoll: fix missing wakeup for ovflist in ep_poll_callback\n (bsc#1159867).\n - evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).\n - evm: Fix a small race in init_desc() (git-fixes).\n - evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).\n - evm: Fix RCU list related warnings (git-fixes).\n - extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()'\n (git-fixes).\n - fanotify: fix ignore mask logic for events on child and on dir\n (bsc#1172719).\n - fdt: add support for rng-seed (jsc#SLE-12424).\n - fdt: Update CRC check for rng-seed (jsc#SLE-12424).\n - firmware: imx: scu: Fix corruption of header (git-fixes).\n - firmware: imx: scu: Fix possible memory leak in imx_scu_probe()\n (git-fixes).\n - firmware: imx-scu: Support one TX and one RX (git-fixes).\n - firmware: imx: warn on unexpected RX (git-fixes).\n - firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).\n - firmware: xilinx: Fix an error handling path in\n 'zynqmp_firmware_probe()' (git-fixes).\n - Fix a regression of AF_ALG crypto interface hang with aes_s390\n (bsc#1167651)\n - fpga: dfl: afu: Corrected error handling levels (git-fixes).\n - fs: Do not check if there is a fsnotify watcher on pseudo inodes\n (bsc#1158765).\n - fsnotify: Rearrange fast path to minimise overhead when there is no\n watcher (bsc#1158765).\n - genetlink: clean up family attributes allocations (git-fixes).\n - genetlink: fix memory leaks in genl_family_rcv_msg_dumpit()\n (bsc#1154353).\n - gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).\n - gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).\n - gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip\n de-registration (git-fixes).\n - gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).\n - gpiolib: Document that GPIO line names are not globally unique\n (git-fixes).\n - gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).\n - gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).\n - gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).\n - habanalabs: Align protection bits configuration of all TPCs (git-fixes).\n - HID: alps: Add AUI1657 device ID (git-fixes).\n - HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead\n (git-fixes).\n - HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).\n - HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).\n - HID: intel-ish-hid: avoid bogus uninitialized-variable warning\n (git-fixes).\n - HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).\n - HID: multitouch: enable multi-input as a quirk for some devices\n (git-fixes).\n - HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A\n keyboard-dock (git-fixes).\n - HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).\n - hsr: check protocol version in hsr_newlink()\n (networking-stable-20_04_17).\n - i2c: acpi: put device when verifying client fails (git-fixes).\n - i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).\n - i2c: designware-pci: Add support for Elkhart Lake PSE I2C\n (jsc#SLE-12734).\n - i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).\n - i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).\n - i2c: dev: Fix the race between the release of i2c_dev and cdev\n (git-fixes).\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n - i2c: mux: demux-pinctrl: Fix an error handling path in\n 'i2c_demux_pinctrl_probe()' (git-fixes).\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280\n ltc#185369).\n - ibmvnic: Flush existing work items before device removal (bsc#1065729).\n - ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n - ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).\n - ice: Fix inability to set channels when down (jsc#SLE-7926).\n - ieee80211: Fix incorrect mask for default PE duration (git-fixes).\n - iio: adc: stm32-adc: fix device used to request dma (git-fixes).\n - iio: adc: stm32-adc: Use dma_request_chan() instead\n dma_request_slave_channel() (git-fixes).\n - iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).\n - iio: adc: stm32-dfsdm: Use dma_request_chan() instead\n dma_request_slave_channel() (git-fixes).\n - iio: adc: ti-ads8344: Fix channel selection (git-fixes).\n - iio: buffer: Do not allow buffers without any channels enabled to be\n activated (git-fixes).\n - iio:chemical:pms7003: Fix timestamp alignment and prevent data leak\n (git-fixes).\n - iio:chemical:sps30: Fix timestamp alignment (git-fixes).\n - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()'\n (git-fixes).\n - iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).\n - iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).\n - iio: vcnl4000: Fix i2c swapped word reading (git-fixes).\n - ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init()\n (bsc#1172223).\n - ima: Directly assign the ima_default_policy pointer to ima_rules\n (bsc#1172223)\n - ima: Directly free *entry in ima_alloc_init_template() if digests is\n NULL (bsc#1172223).\n - ima: Remove __init annotation from ima_pcrread() (git-fixes).\n - include/asm-generic/topology.h: guard cpumask_of_node() macro argument\n (bsc#1148868).\n - Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).\n - Input: edt-ft5x06 - fix get_default register write access (git-fixes).\n - Input: evdev - call input_flush_device() on release(), not flush()\n (git-fixes).\n - Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).\n - Input: mms114 - fix handling of mms345l (git-fixes).\n - Input: synaptics - add a second working PNP_ID for Lenovo T470s\n (git-fixes).\n - Input: synaptics-rmi4 - fix error return code in rmi_driver_probe()\n (git-fixes).\n - Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n - Input: usbtouchscreen - add support for BonXeon TP (git-fixes).\n - Input: xpad - add custom init packet for Xbox One S controllers\n (git-fixes).\n - iocost: check active_list of all the ancestors in iocg_activate()\n (bsc#1173206).\n - iocost: do not let vrate run wild while there's no saturation signal\n (bsc1173206).\n - iocost: over-budget forced IOs should schedule async delay (bsc#1173206).\n - iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).\n - iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).\n - iommu/amd: Do not loop forever when trying to increase address space\n (bsc#1172063).\n - iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system\n (bsc#1172393).\n - iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).\n - iommu/amd: Fix race in increase_address_space()/fetch_pte()\n (bsc#1172065).\n - iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).\n - iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).\n - iommu/qcom: Fix local_base status check (bsc#1172067).\n - iommu/virtio: Reverse arguments to list_add (bsc#1172068).\n - ipv4: Update fib_select_default to handle nexthop objects\n (networking-stable-20_04_27).\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n - ipvs: Improve robustness to the ipvs sysctl (git-fixes).\n - irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).\n - irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).\n - irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).\n - irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).\n - iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).\n - iwlwifi: mvm: limit maximum queue appropriately (git-fixes).\n - iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).\n - jbd2: fix data races at struct journal_head (bsc#1173438).\n - kabi: ppc64le: prevent struct dma_map_ops to become defined\n (jsc#SLE-12424).\n - kabi/severities: Ingnore get_dev_data() The function is internal to the\n AMD IOMMU driver and must not be called by any third party.\n - kABI workaround for struct hdac_bus changes (git-fixes).\n - ktest: Add timeout for ssh sync testing (git-fixes).\n - KVM: Check validity of resolved slot when searching memslots\n (bsc#1172069).\n - KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated\n (bsc#1171904).\n - KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n - l2tp: Allow management of tunnels and session in user namespace\n (networking-stable-20_04_17).\n - libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).\n - libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).\n - lib: devres: add a helper function for ioremap_uc (git-fixes).\n - libertas_tf: avoid a null dereference in pointer priv (git-fixes).\n - lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).\n - libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n - libnvdimm: cover up nd_region changes (bsc#1162400).\n - libnvdimm/dax: Pick the right alignment default when creating dax\n devices (bsc#1171759).\n - libnvdimm/label: Remove the dpa align check (bsc#1171759).\n - libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).\n - libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).\n - libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n - libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).\n - libnvdimm/pfn_dev: Add a build check to make sure we notice when struct\n page size change (bsc#1171743).\n - libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock\n (bsc#1171759).\n - libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid\n (bsc#1171743).\n - libnvdimm/pmem: Advance namespace seed for specific probe errors\n (bsc#1171743).\n - libnvdimm/region: Fix build error (bsc#1162400).\n - libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).\n - libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).\n - libnvdimm/region: Rewrite _probe_success() to _advance_seeds()\n (bsc#1171743).\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n - lib: Uplevel the pmem \"region\" ida to a global allocator (bc#1162400).\n - list: Add hlist_unhashed_lockless() (bsc#1173438).\n - livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n - livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n - livepatch: Prevent module-specific KLP rela sections from referencing\n vmlinux symbols (bsc#1071995).\n - livepatch: Remove .klp.arch (bsc#1071995).\n - locktorture: Allow CPU-hotplug to be disabled via --bootargs\n (bsc#1173068).\n - lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).\n - lpfc: fix axchg pointer reference after free and double frees\n (bsc#1171530).\n - lpfc: Fix pointer checks and comments in LS receive refactoring\n (bsc#1171530).\n - lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).\n - lpfc: Synchronize NVME transport and lpfc driver devloss_tmo\n (bcs#1173060).\n - mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).\n - mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in\n zynqmp_ipi_mbox_probe() (git-fixes).\n - Make the \"Reducing compressed framebufer size\" message be\n DRM_INFO_ONCE() (git-fixes).\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n - media: cedrus: Program output format during each run (git-fixes).\n - media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).\n - media: platform: fcp: Set appropriate DMA parameters (git-fixes).\n - media: Revert \"staging: imgu: Address a compiler warning on alignment\"\n (git-fixes).\n - media: staging: ipu3: Fix stale list entries on parameter queue failure\n (git-fixes).\n - media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).\n - mei: release me_cl object reference (git-fixes).\n - mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).\n - mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).\n - mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).\n - mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).\n - misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).\n - misc: rtsx: Add short delay after exit from ASPM (git-fixes).\n - mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n - mm: adjust vm_committed_as_batch according to vm overcommit policy\n (bnc#1173271).\n - mmc: block: Fix use-after-free issue for rpmb (git-fixes).\n - mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of\n DEFINE_SIMPLE_ATTRIBUTE (git-fixes).\n - mmc: fix compilation of user API (git-fixes).\n - mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error\n (git-fixes).\n - mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).\n - mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).\n - mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card()\n (git-fixes).\n - mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card()\n (git-fixes).\n - mmc: tmio: Further fixup runtime PM management at remove (git-fixes).\n - mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe()\n (git-fixes).\n - mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).\n - mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).\n - mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400\n bsc#1170895 ltc#184375 ltc#185686).\n - mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).\n - mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).\n - mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).\n - mt76: mt76x02u: Add support for newer versions of the XBox One wifi\n adapter (git-fixes).\n - mtd: Fix mtd not registered due to nvmem name collision (git-fixes).\n - mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).\n - mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).\n - mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).\n - mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).\n - mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).\n - mtd: rawnand: ingenic: Fix the probe error path (git-fixes).\n - mtd: rawnand: marvell: Fix probe error path (git-fixes).\n - mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).\n - mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet\n registered (git-fixes).\n - mtd: rawnand: mtk: Fix the probe error path (git-fixes).\n - mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).\n - mtd: rawnand: orion: Fix the probe error path (git-fixes).\n - mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).\n - mtd: rawnand: oxnas: Release all devices in the _remove() path\n (git-fixes).\n - mtd: rawnand: pasemi: Fix the probe error path (git-fixes).\n - mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).\n - mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).\n - mtd: rawnand: socrates: Fix the probe error path (git-fixes).\n - mtd: rawnand: sunxi: Fix the probe error path (git-fixes).\n - mtd: rawnand: timings: Fix default tR_max and tCCS_min timings\n (git-fixes).\n - mtd: rawnand: tmio: Fix the probe error path (git-fixes).\n - mtd: rawnand: xway: Fix the probe error path (git-fixes).\n - mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).\n - mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial\n flash (jsc#SLE-12737).\n - mwifiex: avoid -Wstringop-overflow warning (git-fixes).\n - mwifiex: Fix memory corruption in dump_station (git-fixes).\n - net: bcmgenet: correct per TX/RX ring statistics\n (networking-stable-20_04_27).\n - net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL\n (networking-stable-20_04_27).\n - net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n - net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled\n (networking-stable-20_04_27).\n - net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n - net: dsa: declare lockless TX feature for slave ports (bsc#1154353).\n - net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode\n (networking-stable-20_04_17).\n - net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).\n - net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).\n - netfilter: connlabels: prefer static lock initialiser (git-fixes).\n - netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n - netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no\n actions (git-fixes).\n - netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).\n - netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy\n (git-fixes).\n - netfilter: not mark a spinlock as __read_mostly (git-fixes).\n - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin\n (networking-stable-20_04_17).\n - net: ipv6: do not consider routes via gateways for anycast address check\n (networking-stable-20_04_17).\n - net/mlx4_en: avoid indirect call in TX completion\n (networking-stable-20_04_27).\n - net/mlx5e: Add missing release firmware call\n (networking-stable-20_04_17).\n - net/mlx5e: Fix pfnum in devlink port attribute\n (networking-stable-20_04_17).\n - net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).\n - net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).\n - net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).\n - net/mlx5: Fix crash upon suspend/resume (bsc#1172365).\n - net/mlx5: Fix frequent ioread PCI access during recovery\n (networking-stable-20_04_17).\n - net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node\n (networking-stable-20_04_27).\n - net: openvswitch: ovs_ct_exit to be done under ovs_lock\n (networking-stable-20_04_27).\n - net: phy: propagate an error back to the callers of phy_sfp_probe\n (bsc#1154353).\n - net: qrtr: send msgs from local of same id as broadcast\n (networking-stable-20_04_17).\n - net: revert default NAPI poll timeout to 2 jiffies\n (networking-stable-20_04_17).\n - net: revert \"net: get rid of an signed integer overflow in\n ip_idents_reserve()\" (bnc#1158748 (network regression)).\n - net: tun: record RX queue in skb before do_xdp_generic()\n (networking-stable-20_04_17).\n - net: vmxnet3: fix possible buffer overflow caused by bad DMA value in\n vmxnet3_get_rss() (bsc#1172484).\n - net/x25: Fix x25_neigh refcnt leak when receiving frame\n (networking-stable-20_04_27).\n - NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).\n - nfs: add minor version to nfs_server_key for fscache (bsc#1172467).\n - nfsd4: make drc_slab global, not per-net (git-fixes).\n - nfsd: always check return value of find_any_file (bsc#1172208).\n - NFS: Fix fscache super_cookie index_key from changing after umount\n (git-fixes).\n - nfs: fix NULL deference in nfs4_get_valid_delegation.\n - nfs: fscache: use timespec64 in inode auxdata (git-fixes).\n - nfs: set invalid blocks after NFSv4 writes (git-fixes).\n - NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION\n (git-fixes).\n - NFSv4: Fix fscache cookie aux_data to ensure change_attr is included\n (git-fixes).\n - ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).\n - ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).\n - ntb: intel: fix static declaration (jsc#SLE-12710).\n - nvdimm: Avoid race between probe and reading device attributes\n (bsc#1170442).\n - nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).\n - nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).\n - nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n - objtool: Allow no-op CFI ops in alternatives (bsc#1169514).\n - objtool: Clean instruction state before each function validation\n (bsc#1169514).\n - objtool: Fix !CFI insn_state propagation (bsc#1169514).\n - objtool: Fix ORC vs alternatives (bsc#1169514).\n - objtool: Ignore empty alternatives (bsc#1169514).\n - objtool: Remove check preventing branches within alternative\n (bsc#1169514).\n - objtool: Rename struct cfi_state (bsc#1169514).\n - objtool: Uniquely identify alternative instruction groups (bsc#1169514).\n - p54usb: add AirVasT USB stick device-id (git-fixes).\n - panic: do not print uninitialized taint_flags (bsc#1172814).\n - PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).\n - PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link\n (git-fixes).\n - PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n - PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n - PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n - PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n - pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.\n - PCI: Fix pci_register_host_bridge() device_register() error handling\n (git-fixes).\n - PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).\n - PCI: mobiveil: Add callback function for interrupt initialization\n (bsc#1161495).\n - PCI: mobiveil: Add callback function for link up check (bsc#1161495).\n - PCI: mobiveil: Add Header Type field check (bsc#1161495).\n - PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).\n - PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host\n (bsc#1161495).\n - PCI: mobiveil: Collect the interrupt related operations into a function\n (bsc#1161495).\n - PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).\n - PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT\n (bsc#1161495).\n - PCI: mobiveil: Introduce a new structure mobiveil_root_port\n (bsc#1161495).\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).\n - PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space\n (bsc#1161495).\n - PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver\n (bsc#1161495).\n - PCI: mobiveil: Move the host initialization into a function\n (bsc#1161495).\n - PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).\n - PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n - PCI: Program MPS for RCiEP devices (git-fixes).\n - PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port\n (git-fixes).\n - PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n - PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths\n (git-fixes).\n - PCI: vmd: Filter resource type bits from shadow register (git-fixes).\n - pcm_native: result of put_user() needs to be checked (git-fixes).\n - perf/core: Fix endless multiplex timer (git-fixes).\n - perf/core: fix parent pid/tid in task exit events (git-fixes).\n - pinctrl: freescale: imx: Fix an error handling path in\n 'imx_pinctrl_probe()' (git-fixes).\n - pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak\n in case of error in 'imx_pinctrl_probe()' (git-fixes).\n - pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()'\n (git-fixes).\n - pinctrl: intel: Add Intel Tiger Lake pin controller support\n (jsc#SLE-12737).\n - pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).\n - pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries\n (git-fixes).\n - pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210\n (git-fixes).\n - pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE\n GPIOs (git-fixes).\n - pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).\n - pinctrl: stmfx: stmfx_pinconf_set does not require to get direction\n anymore (git-fixes).\n - pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA\n (git-fixes).\n - platform/x86: dell-laptop: do not register micmute LED if there is no\n token (git-fixes).\n - platform/x86: intel-vbtn: Also handle tablet-mode switch on \"Detachable\"\n and \"Portable\" chassis-types (git-fixes).\n - platform/x86: intel-vbtn: Do not advertise switches to userspace if they\n are not there (git-fixes).\n - platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 /\n \"Laptop\" chasis-type (git-fixes).\n - platform/x86: intel-vbtn: Split keymap into buttons and switches parts\n (git-fixes).\n - platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).\n - PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).\n - pnp: Use list_for_each_entry() instead of open coding (git-fixes).\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n - powerpc/64s/exception: Fix machine check no-loss idle wakeup\n (bsc#1156395).\n - powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).\n - powerpc/64s: Save FSCR to init_task.thread.fscr after feature init\n (bsc#1065729).\n - powerpc/book3s64: Export has_transparent_hugepage() related functions\n (bsc#1171759).\n - powerpc/bpf: Enable bpf_probe_read{, str}() on powerpc again\n (bsc#1172344).\n - powerpc/fadump: Account for memory_limit while reserving memory\n (jsc#SLE-9099 git-fixes).\n - powerpc/fadump: consider reserved ranges while reserving memory\n (jsc#SLE-9099 git-fixes).\n - powerpc/fadump: use static allocation for reserved memory ranges\n (jsc#SLE-9099 git-fixes).\n - powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).\n - powerpc/powernv: Fix a warning message (bsc#1156395).\n - powerpc/setup_64: Set cache-line-size based on cache-block-size\n (bsc#1065729).\n - powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n - power: reset: qcom-pon: reg write mask depends on pon generation\n (git-fixes).\n - power: supply: bq24257_charger: Replace depends on REGMAP_I2C with\n select (git-fixes).\n - power: supply: core: fix HWMON temperature labels (git-fixes).\n - power: supply: core: fix memory leak in HWMON error path (git-fixes).\n - power: supply: lp8788: Fix an error handling path in\n 'lp8788_charger_probe()' (git-fixes).\n - power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).\n - printk: queue wake_up_klogd irq_work only if per-CPU areas are ready\n (bsc#1172095).\n - proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).\n - pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).\n - r8152: support additional Microsoft Surface Ethernet Adapter variant\n (git-fixes).\n - r8169: Revive default chip version for r8168 (bsc#1173085).\n - raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n - random: fix data races at timer_rand_state (bsc#1173438).\n - rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).\n - rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).\n - rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff()\n (bsc#1172046).\n - rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).\n - rcutorture: Add 100-CPU configuration (bsc#1173068).\n - rcutorture: Add worst-case call_rcu() forward-progress results\n (bsc#1173068).\n - rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).\n - rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).\n - rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).\n - rcutorture: Summarize summary of build and run results (bsc#1173068).\n - rcutorture: Test TREE03 with the threadirqs kernel boot parameter\n (bsc#1173068).\n - rcu: Use *_ONCE() to protect lockless ->expmask accesses (bsc#1171828).\n - rcu: Use WRITE_ONCE() for assignments to ->pprev for hlist_nulls\n (bsc#1173438).\n - RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).\n - RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).\n - RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work\n (jsc#SLE-8446).\n - RDMA/nl: Do not permit empty devices names during\n RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).\n - RDMA/srpt: Fix disabling device management (jsc#SLE-8449).\n - RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated\n (jsc#SLE-8449).\n - remoteproc: Add missing '\\n' in log messages (git-fixes).\n - remoteproc: Fall back to using parent memory pool if no dedicated\n available (git-fixes).\n - remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).\n - remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).\n - Revert \"drm/amd/display: disable dcn20 abm feature for bring up\"\n (git-fixes).\n - Revert \"fs/seq_file.c: seq_read(): add info message about buggy .next\n functions\" (bsc#1172751) The message floods dmesg and its benefit is\n marginal in default kernel.\n - Revert \"pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a\n resource leak in case of error in 'imx_pinctrl_probe()'\" (git-fixes).\n - rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n - rpm/modules.fips: * add aes-ce-ccm and des3_ede-x86_64 (boo#173030) *\n add aes_ti and aes_neon_bs (boo#1172956)\n - rtc: mc13xxx: fix a double-unlock issue (git-fixes).\n - rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).\n - rtw88: fix an issue about leak system resources (git-fixes).\n - rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).\n - s390/pci: Log new handle in clp_disable_fh() (git-fixes).\n - sched/cfs: change initial value of runnable_avg (bsc#1158765).\n - sched/core: Check cpus_mask, not cpus_ptr in __set_cpus_allowed_ptr(),\n to fix mask corruption (bnc#1155798 (CPU scheduler functional and\n performance backports)).\n - sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).\n - sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes\n (sched)).\n - sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and\n performance backports)).\n - sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional\n and performance backports)).\n - sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched/deadline: Initialize ->dl_boosted (bsc#1172823).\n - sched/deadline: Initialize ->dl_boosted (git fixes (sched)).\n - sched: etf: do not assume all sockets are full blown\n (networking-stable-20_04_27).\n - sched/fair: find_idlest_group(): Remove unused sd_flag parameter\n (bnc#1155798 (CPU scheduler functional and performance backports)).\n - sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n - sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n - sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched: Offload wakee task activation if it the wakee is descheduling\n (bnc#1158748, bnc#1159781).\n - sched: Optimize ttwu() spinning on p->on_cpu (bnc#1158748, bnc#1159781).\n - sched/pelt: Sync util/runnable_sum with PELT window when propagating\n (bnc#1155798 (CPU scheduler functional and performance backports)).\n - scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n - scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM\n (bsc#1172759 ltc#184814).\n - scsi: lpfc: Change default queue allocation for reduced memory\n consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Copyright updates for 12.6.0.4 patches (bsc#1171530).\n - scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).\n - scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).\n - scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func\n (bsc#1171530).\n - scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Fix noderef and address space warnings (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).\n - scsi: lpfc: Maintain atomic consistency of queue_claimed flag\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).\n - scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780\n bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Remove re-binding of nvme rport during registration\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780\n bsc#1165211 jsc#SLE-8654).\n - scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with\n __BIG_ENDIAN_BITFIELD macro (bsc#1173206).\n - scsi: qla2xxx: Delete all sessions before unregister local nvme port\n (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n - scsi: qla2xxx: Do not log message when reading port speed via sysfs\n (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV\n (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n - scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).\n - scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).\n - scsi: zfcp: add diagnostics buffer for exchange config data\n (bsc#1158050).\n - scsi: zfcp: auto variables for dereferenced structs in open port handler\n (bsc#1158050).\n - scsi: zfcp: diagnostics buffer caching and use for exchange port data\n (bsc#1158050).\n - scsi: zfcp: enhance handling of FC Endpoint Security errors\n (bsc#1158050).\n - scsi: zfcp: expose fabric name as common fc_host sysfs attribute\n (bsc#1158050).\n - scsi: zfcp: Fence adapter status propagation for common statuses\n (bsc#1158050).\n - scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects\n (bsc#1158050).\n - scsi: zfcp: Fence fc_host updates during link-down handling\n (bsc#1158050).\n - scsi: zfcp: fix fc_host attributes that should be unknown on local link\n down (bsc#1158050).\n - scsi: zfcp: fix wrong data and display format of SFP+ temperature\n (bsc#1158050).\n - scsi: zfcp: implicitly refresh config-data diagnostics when reading\n sysfs (bsc#1158050).\n - scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs\n (bsc#1158050).\n - scsi: zfcp: introduce sysfs interface for diagnostics of local SFP\n transceiver (bsc#1158050).\n - scsi: zfcp: introduce sysfs interface to read the local B2B-Credit\n (bsc#1158050).\n - scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).\n - scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).\n - scsi: zfcp: Move allocation of the shost object to after xconf- and\n xport-data (bsc#1158050).\n - scsi: zfcp: Move fc_host updates during xport data handling into fenced\n function (bsc#1158050).\n - scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter\n variable (bsc#1158050).\n - scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).\n - scsi: zfcp: Move shost modification after QDIO (re-)open into fenced\n function (bsc#1158050).\n - scsi: zfcp: Move shost updates during xconfig data handling into fenced\n function (bsc#1158050).\n - scsi: zfcp: proper indentation to reduce confusion in\n zfcp_erp_required_act (bsc#1158050).\n - scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).\n - scsi: zfcp: signal incomplete or error for sync exchange config/port\n data (bsc#1158050).\n - scsi: zfcp: support retrieval of SFP Data via Exchange Port Data\n (bsc#1158050).\n - scsi: zfcp: trace FC Endpoint Security of FCP devices and connections\n (bsc#1158050).\n - scsi: zfcp: wire previously driver-specific sysfs attributes also to\n fc_host (bsc#1158050).\n - selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o\n (bsc#1155518).\n - selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).\n - selftests/bpf: Fix invalid memory reads in core_relo selftest\n (bsc#1155518).\n - selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).\n - selftests/bpf, flow_dissector: Close TAP device FD after the test\n (bsc#1155518).\n - selftests/timens: handle a case when alarm clocks are not supported\n (bsc#1164648,jsc#SLE-11493).\n - serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).\n - slimbus: core: Fix mismatch in of_node_get/put (git-fixes).\n - soc: mediatek: cmdq: return send msg error code (git-fixes).\n - soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).\n - soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new\n data (git-fixes).\n - soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request\n (git-fixes).\n - soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS\n (git-fixes).\n - soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).\n - soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).\n - spi: bcm2835aux: Fix controller unregister order (git-fixes).\n - spi: bcm2835: Fix controller unregister order (git-fixes).\n - spi: bcm-qspi: Handle clock probe deferral (git-fixes).\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).\n - SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).\n - spi: dt-bindings: spi-controller: Fix #address-cells for slave mode\n (git-fixes).\n - spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).\n - spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).\n - spi: dw: Fix controller unregister order (git-fixes).\n - spi: dw: Fix native CS being unset (git-fixes).\n - spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).\n - spi: dw-pci: Add runtime power management support (jsc#SLE-12735).\n - spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n - spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI\n (jsc#SLE-12735).\n - spi: dw: use \"smp_mb()\" to avoid sending spi data error (git-fixes).\n - spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).\n - spi: Fix controller unregister order (git-fixes).\n - spi: fsl: do not map irq during probe (git-fixes).\n - spi: fsl: use platform_get_irq() instead of of_irq_to_resource()\n (git-fixes).\n - spi: pxa2xx: Fix controller unregister order (git-fixes).\n - spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).\n - spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource\n (git-fixes).\n - spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_*\n macros (git-fixes).\n - spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).\n - spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).\n - spi: spi-fsl-dspi: Replace interruptible wait queue with a simple\n completion (git-fixes).\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).\n - staging: iio: ad2s1210: Fix SPI reading (git-fixes).\n - staging: kpc2000: fix error return code in kp2000_pcie_probe()\n (git-fixes).\n - staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).\n - staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).\n - sun6i: dsi: fix gcc-4.8 (bsc#1152489)\n - SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).\n - supported.conf: Add pinctrl-tigerlake as supported\n - supported.conf: Mark two hwtracing helper modules as externally\n supported (bsc#1170879)\n - svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).\n - tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n - team: fix hang in team_mode_get() (networking-stable-20_04_27).\n - thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support\n (jsc#SLE-12668).\n - tick/sched: Annotate lockless access to last_jiffies_update\n (bsc#1173438).\n - timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).\n - torture: Allow \"CFLIST\" to specify default list of scenarios\n (bsc#1173068).\n - torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).\n - torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).\n - torture: Handle systems lacking the mpstat command (bsc#1173068).\n - torture: Hoist calls to lscpu to higher-level kvm.sh script\n (bsc#1173068).\n - torture: Make results-directory date format completion-friendly\n (bsc#1173068).\n - torture: Use gawk instead of awk for systime() function (bsc#1173068).\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).\n - tty: n_gsm: Fix SOF skipping (git-fixes).\n - tty: n_gsm: Fix waking up upper tty layer when room available\n (git-fixes).\n - tty: serial: add missing spin_lock_init for SiFive serial console\n (git-fixes).\n - tun: correct header offsets in napi frags mode (git-fixes).\n - Update config files: Add CONFIG_PINCTRL_TIGERLAKE=m\n - Update patch reference for intel_th patch (jsc#SLE-12705)\n - Update the patch reference for ish-hid fix (jsc#SLE-12683)\n - usb: core: Fix misleading driver bug report (git-fixes).\n - usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B\n (git-fixes).\n - usb: dwc2: gadget: move gadget resume after the core is in L0 state\n (git-fixes).\n - usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n - usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n - usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).\n - usb: gadget: audio: Fix a missing error return value in audio_bind()\n (git-fixes).\n - usb: gadget: fix illegal array access in binding with UDC (git-fixes).\n - usb: gadget: fix potential double-free in m66592_probe (git-fixes).\n - usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n - usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n - usb: gadget: legacy: fix redundant initialization warnings (git-fixes).\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer before null\n check (git-fixes).\n - usb: gadget: net2272: Fix a memory leak in an error handling path in\n 'net2272_plat_probe()' (git-fixes).\n - usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in\n s3c2410_udc_nuke (git-fixes).\n - usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe()\n (git-fixes).\n - usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n - usb: musb: Fix runtime PM imbalance on error (git-fixes).\n - usb: musb: start session in resume for host port (git-fixes).\n - usb: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe()\n (git-fixes).\n - usb: serial: option: add Telit LE910C1-EUX compositions (git-fixes).\n - usb: serial: qcserial: add DW5816e QDL support (git-fixes).\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors\n (git-fixes).\n - usb: usbfs: correct kernel->user page attribute mismatch (git-fixes).\n - usb: usbfs: fix mmap dma mismatch (git-fixes).\n - vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).\n - vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).\n - vfio/mdev: Fix reference count leak in add_mdev_supported_type\n (git-fixes).\n - vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).\n - vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn()\n (git-fixes).\n - video: fbdev: w100fb: Fix a potential double free (git-fixes).\n - virtio-blk: handle block_device_operations callbacks after hot unplug\n (git fixes (block drivers)).\n - vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n - vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n - vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n - vmxnet3: update to version 4 (bsc#1172484).\n - vmxnet3: use correct hdr reference when packet is encapsulated\n (bsc#1172484).\n - vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n - vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).\n - vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console\n (git-fixes).\n - vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n - vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR\n (networking-stable-20_04_27).\n - w1: omap-hdq: cleanup to add missing newline for some dev_dbg\n (git-fixes).\n - watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).\n - wireguard: device: avoid circular netns references (git-fixes).\n - wireguard: noise: do not assign initiation time in if condition\n (git-fixes).\n - wireguard: noise: read preshared key while taking lock (bsc#1169021\n jsc#SLE-12250).\n - wireguard: noise: separate receive counter from send counter\n (bsc#1169021 jsc#SLE-12250).\n - wireguard: queueing: preserve flow hash across packet scrubbing\n (bsc#1169021 jsc#SLE-12250).\n - wireguard: receive: account for napi_gro_receive never returning\n GRO_DROP (git-fixes).\n - wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021\n jsc#SLE-12250).\n - work around mvfs bug (bsc#1162063).\n - workqueue: do not use wq_select_unbound_cpu() for bound works\n (git-fixes).\n - workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).\n - x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).\n - x86: Fix early boot crash on gcc-10, third try (bsc#1152489).\n - x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).\n - x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).\n - x86/resctrl: Fix invalid attempt at removing the default resource group\n (bsc#1152489).\n - x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks\n (bsc#1058115).\n - xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish\n (networking-stable-20_04_27).\n - xfrm: fix error in comment (git fixes (block drivers)).\n - xfs: clean up the error handling in xfs_swap_extents (git-fixes).\n - xfs: do not commit sunit/swidth updates to disk if that would cause\n repair failures (bsc#1172169).\n - xfs: do not fail unwritten extent conversion on writeback due to edquot\n (bsc#1158242).\n - xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).\n - xfs: force writes to delalloc regions to unwritten (bsc#1158242).\n - xfs: measure all contiguous previous extents for prealloc size\n (bsc#1158242).\n - xfs: preserve default grace interval during quotacheck (bsc#1172170).\n - xfs: refactor agfl length computation function (bsc#1172169).\n - xfs: split the sunit parameter update into two parts (bsc#1172169).\n - wireguard: selftests: initalize ipv6 members to NULL to squelch clang\n warning (git-fixes).\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.2:\n\n zypper in -t patch openSUSE-2020-935=1", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-07-07T00:00:00", "type": "suse", "title": "Security update for the Linux Kernel (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2020-07-07T00:00:00", "id": "OPENSUSE-SU-2020:0935-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z6FEYXFXT2CJAAJJVCMBHT3BT2ZBZC3G/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-11-06T19:35:18", "description": "An update that solves 19 vulnerabilities and has 92 fixes\n is now available.\n\nDescription:\n\n\n\n The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where\n it did not check the length of variable elements in a beacon head,\n leading to a buffer overflow (bnc#1152107 1173659).\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c\n did not call snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n - CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c\n where Incorrect access permissions for the efivar_ssdt ACPI variable\n could be used by attackers to bypass lockdown or secure boot\n restrictions, aka CID-1957a85b0032 (bnc#1173567).\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible\n use-after-free due to a race condition. This could lead to local\n escalation of privilege with System execution privileges needed. User\n interaction is not needed for exploitation (bnc#1174462).\n - CVE-2020-10135: Legacy pairing and secure-connections pairing\n authentication in Bluetooth\u00ae BR/EDR Core Specification v5.2 and earlier\n may have allowed an unauthenticated user to complete authentication\n without pairing credentials via adjacent access. An unauthenticated,\n adjacent attacker could impersonate a Bluetooth BR/EDR master or slave\n to pair with a previously paired remote device to successfully complete\n the authentication procedure without knowing the link key (bnc#1171988).\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler\n logical bug allowed an attacker to turn off the SSBD protection.\n (bnc#1172781).\n - CVE-2020-10767: Fixed indirect Branch Prediction Barrier is\n force-disabled when STIBP is unavailable or enhanced IBRS is available.\n (bnc#1172782).\n - CVE-2020-10768: Fixed indirect branch speculation can be enabled after\n it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.\n (bnc#1172783).\n - CVE-2020-10769: A buffer over-read flaw was found in\n crypto_authenc_extractkeys in crypto/authenc.c in the IPsec\n Cryptographic algorithm's module, authenc. When a payload longer than 4\n bytes, and is not following 4-byte alignment boundary guidelines, it\n causes a buffer over-read threat, leading to a system crash. This flaw\n allowed a local attacker with user privileges to cause a denial of\n service (bnc#1173265).\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x.\n (bnc#1172999).\n - CVE-2020-10781: A zram sysfs resource consumption was fixed.\n (bnc#1173074).\n - CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a\n deadlock if a coalescing operation fails (bnc#1171732).\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts to access\n disabled memory space (bnc#1171868).\n - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\n k_ascii was called several times in a row, aka CID-b86dab054059.\n (bnc#1172775).\n - CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n - CVE-2020-14331: Fixed an out of bounds write to the vgacon scrollback\n buffer (bsc#1174205).\n - CVE-2020-14416: A race condition in tty->disc_data handling in the slip\n and slcan line discipline could lead to a use-after-free, aka\n CID-0ace17d56824. This affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c (bnc#1162002).\n - CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a\n memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c\n where injection of malicious ACPI tables via configfs could be used by\n attackers to bypass lockdown and secure boot restrictions, aka\n CID-75b0cea7bf30 (bnc#1173573).\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make\n observations that help to obtain sensitive information about the\n internal state of the network RNG, aka CID-f227e3ec3b5c. This is related\n to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\n The following non-security bugs were fixed:\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx handling\n (bsc#1111666).\n - ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n - ACPI: PM: Avoid using power resources if there are none for D0\n (bsc#1051510).\n - ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n - ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n - ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n - ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n - ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up\n (bsc#1111666).\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n - ALSA: hda/hdmi - enable runtime pm for newer AMD display audio\n (bsc#1111666).\n - ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n - ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines\n (bsc#1111666).\n - ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n - ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems\n (bsc#1111666).\n - ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n - ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n - ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n - ALSA: hda/realtek - change to suitable link model for ASUS platform\n (bsc#1111666).\n - ALSA: hda/realtek - Check headset type by unplug and resume\n (bsc#1111666).\n - ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC\n (bsc#1111666).\n - ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC\n (bsc#1111666).\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with\n ALC256 (bsc#1111666).\n - ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with\n ALC269VC (bsc#1111666).\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401)\n series with ALC289 (bsc#1111666).\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502)\n series with ALC289 (bsc#1111666).\n - ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534\n (bsc#1111666).\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n - ALSA: hda/realtek: Fix add a \"ultra_low_power\" function for intel\n reference board (alc256) (bsc#1111666).\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung\n Notebook Pen S (bsc#1111666).\n - ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n - ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id\n (bsc#1111666).\n - ALSA: hda/realtek - Fix unused variable warning w/o\n CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n - ALSA: hda/realtek - Introduce polarity for micmute LED GPIO\n (bsc#1111666).\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus\n G14(GA401) series with ALC289 (bsc#1111666).\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms\n (git-fixes).\n - ALSA: lx6464es - add support for LX6464ESe pci express variant\n (bsc#1111666).\n - ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n - ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n - ALSA: usb-audio: Add duplex sound support for USB devices using implicit\n feedback (bsc#1111666).\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n - ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n - ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt\n Dock (bsc#1111666).\n - ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n - ALSA: usb-audio: Fix inconsistent card PM state after resume\n (bsc#1111666).\n - ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n - ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n - ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n - ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n - ALSA: usb-audio: Use the new macro for HP Dock rename quirks\n (bsc#1111666).\n - amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).\n - arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n - ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb\n (bsc#1111666).\n - ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n - b43: Fix connection problem with WPA3 (bsc#1111666).\n - b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n - bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n - be2net: fix link failure after ethtool offline test (git-fixes).\n - block: Fix use-after-free in blkdev_get() (bsc#1174843).\n - block: nr_sects_write(): Disable preemption on seqcount write\n (bsc#1173818).\n - block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n - block: sed-opal: fix sparse warning: convert __be64 data (git fixes\n (block drivers)).\n - Bluetooth: Add SCO fallback for invalid LMP parameters error\n (bsc#1111666).\n - bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n - bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n - bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails\n (git-fixes).\n - bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n - bnxt_en: fix NULL dereference in case SR-IOV configuration fails\n (git-fixes).\n - bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n - bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features()\n (networking-stable-20_05_12).\n - bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n - brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers\n (bsc#1174438).\n - btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n - btrfs: Always use a cached extent_state in\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n - btrfs: change timing for qgroup reserved space for ordered extents to\n fix reserved space leak (bsc#1172247).\n - btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n - btrfs: file: reserve qgroup space after the hole punch range is locked\n (bsc#1172247).\n - btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof\n (bsc#1174438).\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write\n (bsc#1174438).\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow\n (bsc#1174438).\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO\n (bsc#1174438).\n - btrfs: inode: move qgroup reserved space release to the callers of\n insert_reserved_file_extent() (bsc#1172247).\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent()\n (bsc#1172247).\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n - btrfs: qgroup: allow to unreserve range without releasing other ranges\n (bsc#1120163).\n - btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after\n disable (bsc#1172247).\n - btrfs: qgroup: fix data leak caused by race between writeback and\n truncate (bsc#1172247).\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve\n retry-after-EDQUOT (bsc#1120163).\n - btrfs: qgroup: try to flush qgroup space when we get -EDQUOT\n (bsc#1120163).\n - btrfs: Return EAGAIN if we can't start no snpashot write in\n check_can_nocow (bsc#1174438).\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n - btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n - btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n - bus: hisi_lpc: Add .remove method to avoid driver unbind crash\n (bsc#1174658).\n - bus: hisi_lpc: Do not fail probe for unrecognised child devices\n (bsc#1174658).\n - bus: hisi_lpc: Unregister logical PIO range to avoid potential\n use-after-free (bsc#1174658).\n - bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads\n (bsc#1111666).\n - carl9170: remove P2P_GO support (bsc#1111666).\n - cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n - ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).\n - ceph: request expedited service on session's last cap flush\n (bsc#1167104).\n - cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages\n (bsc#1173857).\n - char/random: Add a newline at the end of the file (jsc#SLE-12423).\n - cifs: get rid of unused parameter in reconn_setup_dfs_targets()\n (bsc#1144333).\n - cifs: handle hostnames that resolve to same ip in failover (bsc#1144333\n bsc#1161016).\n - cifs: set up next DFS target before generic_ip_connect() (bsc#1144333\n bsc#1161016).\n - clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n - clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n - clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n - clocksource: dw_apb_timer: Make CPU-affiliation being optional\n (bsc#1111666).\n - compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block\n drivers)).\n - compat_ioctl: block: handle Persistent Reservations (git fixes (block\n drivers)).\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References:\n bsc#1174549\n - copy_{to,from}_user(): consolidate object size checks (git fixes).\n - crypto: algboss - do not wait during notifier callback (bsc#1111666).\n - crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).\n - crypto: caam - update xts sector size for large input length\n (bsc#1111666).\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is\n fully iterated (bsc#1111666).\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is\n fully iterated (git-fixes).\n - crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n - crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).\n - crypto: rockchip - fix scatterlist nents error (git-fixes).\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n - crypto: talitos - check AES key size (git-fixes).\n - crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n - crypto: talitos - fix IPsec cipher in length (git-fixes).\n - crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n - crypto: virtio: Fix src/dst scatterlist calculation in\n __virtio_crypto_skcipher_do_req() (git-fixes).\n - debugfs: Check module state before warning in {full/open}_proxy_open()\n (bsc#1173746).\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n - dlm: remove BUG() before panic() (bsc#1174844).\n - dmaengine: tegra210-adma: Fix an error handling path in\n 'tegra_adma_probe()' (bsc#1111666).\n - dm btree: increase rebalance threshold in __rebalance2() (git fixes\n (block drivers)).\n - dm cache: fix a crash due to incorrect work item cancelling (git fixes\n (block drivers)).\n - dm crypt: fix benbi IV constructor crash if used in authenticated mode\n (git fixes (block drivers)).\n - dm: fix potential for q->make_request_fn NULL pointer (git fixes (block\n drivers)).\n - dm space map common: fix to ensure new block isn't already in use (git\n fixes (block drivers)).\n - dm: various cleanups to md->queue initialization code (git fixes).\n - dm verity fec: fix hash block number in verity_fec_decode (git fixes\n (block drivers)).\n - dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block\n drivers)).\n - dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n - driver-core, libnvdimm: Let device subsystems add local lockdep coverage\n (bsc#1171753)\n - Drivers: hv: Change flag to write log level in panic msg to false\n (bsc#1170617, bsc#1170618).\n - drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static\n (bsc#1051510).\n - drm: amd/display: fix Kconfig help text (bsc#1113956) \t* only fix\n DEBUG_KERNEL_DC\n - drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n - drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context\n changes\n - drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n - drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n - drm/i915/icl+: Fix hotplug interrupt disabling after storm detection\n (bsc#1112178)\n - drm/i915: Whitelist context-local timestamp in the gen9 cmdparser\n (bsc#1111666).\n - drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) *\n context changes\n - drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel\n (bsc#1111666).\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer\n S1003 (bsc#1111666).\n - drm/qxl: Use correct notify port address when creating cursor ring\n (bsc#1113956)\n - drm/radeon: fix double free (bsc#1113956)\n - drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n - drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n - drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n - drm/vkms: Hold gem object while still in-use (bsc#1113956) * context\n changes\n - e1000: Distribute switch variables for initialization (bsc#1111666).\n - e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n - e1000e: Do not wake up the system via WOL if device wakeup is disabled\n (bsc#1051510).\n - e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n - EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n - efi/memreserve: deal with memreserve entries in unmapped memory\n (bsc#1174685).\n - efi/random: Increase size of firmware supplied randomness\n (jsc#SLE-12423).\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness\n (jsc#SLE-12423).\n - efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n - efi: Reorder pr_notice() with add_device_randomness() call\n (jsc#SLE-12423).\n - evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n - evm: Fix a small race in init_desc() (bsc#1051510).\n - ext4: fix a data race at inode->i_blocks (bsc#1171835).\n - ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n - ext4: fix partial cluster initialization when splitting extent\n (bsc#1173839).\n - ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n - ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error\n handlers (bsc#1173833).\n - extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()'\n (bsc#1051510).\n - fanotify: fix ignore mask logic for events on child and on dir\n (bsc#1172719).\n - fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n - fdt: add support for rng-seed (jsc#SLE-12423).\n - fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n - firmware: imx: scu: Fix corruption of header (git-fixes).\n - firmware: imx: scu: Fix possible memory leak in imx_scu_probe()\n (bsc#1111666).\n - fix multiplication overflow in copy_fdtable() (bsc#1173825).\n - Fix Patch-mainline tag in the previous zram fix patch\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks\n (networking-stable-20_05_12).\n - gpiolib: Document that GPIO line names are not globally unique\n (bsc#1051510).\n - gpu: host1x: Detach driver on unregister (bsc#1111666).\n - gpu: ipu-v3: pre: do not trigger update if buffer address does not\n change (bsc#1111666).\n - HID: hiddev: fix mess in hiddev_open() (git-fixes).\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n - HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n - HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n - HISI LPC: Stop using MFD APIs (bsc#1174658).\n - hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).\n - hwmon: (acpi_power_meter) Fix potential memory leak in\n acpi_power_meter_add() (bsc#1111666).\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute\n (bsc#1111666).\n - hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n - i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665\n (bsc#1111666).\n - i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n - i2c: mlxcpld: check correct size of maximum RECV_LEN packet\n (bsc#1111666).\n - i40e: reduce stack usage in i40e_set_fc (git-fixes).\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down\n (bsc#1174409).\n - IB/hfi1: Do not destroy link_wq when the device is shut down\n (bsc#1174409).\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280\n ltc#185369).\n - ibmvnic: Flush existing work items before device removal (bsc#1065729).\n - ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n - iio: buffer: Do not allow buffers without any channels enabled to be\n activated (bsc#1051510).\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak\n (bsc#1111666).\n - iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n - iio:magnetometer:ak8974: Fix alignment and data leak issues\n (bsc#1111666).\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe()\n (bsc#1111666).\n - iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n - iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n - ima: Directly assign the ima_default_policy pointer to ima_rules\n (bsc#1051510).\n - ima: Fix ima digest hash table key calculation (bsc#1051510).\n - include/asm-generic/topology.h: guard cpumask_of_node() macro argument\n (bsc#1148868).\n - input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list\n (bsc#1111666).\n - input: i8042 - Remove special PowerPC handling (git-fixes).\n - input: synaptics - add a second working PNP_ID for Lenovo T470s\n (bsc#1111666).\n - intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n - intel_th: Fix a NULL dereference when hub driver is not loaded\n (bsc#1111666).\n - io-mapping: indicate mapping failure (git-fixes).\n - ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n - ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n - jbd2: avoid leaking transaction credits when unreserving handle\n (bsc#1173845).\n - jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n - kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n - kabi: ppc64le: prevent struct dma_map_ops to become defined\n (jsc#SLE-12423).\n - kABI: protect struct mlx5_cmd_work_ent (kabi).\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n - kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n - kvm: nVMX: Do not reread VMCS-agnostic state when switching VMCS\n (bsc#1114279).\n - kvm: nVMX: Skip IBPB when switching between vmcs01 and vmcs02\n (bsc#1114279).\n - kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n - kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n - kvm: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated\n (bsc#1171904).\n - kvm: x86: only do L1TF workaround on affected processors (bsc#1171904).\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n - libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n - libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n - lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n - lib: logic_pio: Avoid possible overlap for unregistering regions\n (bsc#1174658).\n - lib: logic_pio: Fix RCU usage (bsc#1174658).\n - libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock\n (bsc#1171753).\n - libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant\n (bsc#1171753).\n - libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl()\n (bsc#1171753).\n - libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n - libnvdimm/dax: Pick the right alignment default when creating dax\n devices (bsc#1171759).\n - libnvdimm/label: Remove the dpa align check (bsc#1171759).\n - libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n - libnvdimm/pfn_dev: Add a build check to make sure we notice when struct\n page size change (bsc#1171743).\n - libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock\n (bsc#1171759).\n - libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid\n (bsc#1171743).\n - libnvdimm/pmem: Advance namespace seed for specific probe errors\n (bsc#1171743).\n - libnvdimm/region: Initialize bad block for volatile namespaces\n (bnc#1151927 5.3.6).\n - libnvdimm/region: Rewrite _probe_success() to _advance_seeds()\n (bsc#1171743).\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n - livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n - livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n - livepatch: Prevent module-specific KLP rela sections from referencing\n vmlinux symbols (bsc#1071995).\n - livepatch: Remove .klp.arch (bsc#1071995).\n - loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n - lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n - lpfc: Synchronize NVME transport and lpfc driver devloss_tmo\n (bcs#1173060).\n - mac80211: add option for setting control flags (bsc#1111666).\n - mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX\n (bsc#1111666).\n - mailbox: imx: Disable the clock on devm_mbox_controller_register()\n failure (git-fixes).\n - md: Avoid namespace collision with bitmap API (git fixes (block\n drivers)).\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n - md: use memalloc scope APIs in mddev_suspend()/mddev_resume()\n (bsc#1166985)).\n - media: cec: silence shift wrapping warning in __cec_s_log_addrs()\n (git-fixes).\n - media: si2157: Better check for running tuner in init (bsc#1111666).\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue\n (git-fixes).\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n - mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly\n (networking-stable-20_05_12).\n - mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed\n (git-fixes).\n - mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n - mlxsw: spectrum: Prevent force of 56G (git-fixes).\n - mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead\n (git-fixes).\n - mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON()\n (git-fixes).\n - mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n - mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky\n (git-fixes).\n - mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n - mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n - mmc: fix compilation of user API (bsc#1051510).\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type\n (bsc#1111666).\n - mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk\n (bsc#1111666).\n - Move kabi patch into the right place\n - Move upstreamed lpfc patches into sorted section\n - mvpp2: remove misleading comment (git-fixes).\n - net: be more gentle about silly gso requests coming from user\n (networking-stable-20_06_07).\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n - net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n - net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n - net: dsa: mt7530: fix roaming from DSA user ports\n (networking-stable-20_05_27).\n - net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it\n (git-fixes).\n - net: ena: add missing ethtool TX timestamping indication (git-fixes).\n - net: ena: avoid memory access violation by validating req_id properly\n (git-fixes).\n - net: ena: do not wake up tx queue when down (git-fixes).\n - net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n - net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n - net: ena: fix continuous keep-alive resets (git-fixes).\n - net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n - net: ena: fix default tx interrupt moderation interval (git-fixes).\n - net: ena: fix incorrect default RSS key (git-fixes).\n - net: ena: fix incorrectly saving queue numbers when setting RSS\n indirection table (git-fixes).\n - net: ena: fix issues in setting interrupt moderation params in ethtool\n (git-fixes).\n - net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n - net: ena: fix retrieval of nonadaptive interrupt moderation intervals\n (git-fixes).\n - net: ena: fix uses of round_jiffies() (git-fixes).\n - net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n - net: ena: reimplement set/get_coalesce() (git-fixes).\n - net: ena: rss: do not allocate key when not supported (git-fixes).\n - net: ena: rss: fix failure to get indirection table (git-fixes).\n - net: ena: rss: store hash function as values and not bits (git-fixes).\n - netfilter: connlabels: prefer static lock initialiser (git-fixes).\n - netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n - netfilter: not mark a spinlock as __read_mostly (git-fixes).\n - net: fix a potential recursive NETDEV_FEAT_CHANGE\n (networking-stable-20_05_16).\n - net: hns3: add autoneg and change speed support for fibre port\n (bsc#1174070).\n - net: hns3: add support for FEC encoding control (bsc#1174070).\n - net: hns3: add support for multiple media type (bsc#1174070).\n - net: hns3: fix a not link up issue when fibre port supports autoneg\n (bsc#1174070).\n - net: hns3: fix for FEC configuration (bsc#1174070).\n - net: hns3: fix port capbility updating issue (bsc#1174070).\n - net: hns3: fix port setting handle for fibre port (bsc#1174070).\n - net: hns3: fix selftest fail issue for fibre port with autoneg on\n (bsc#1174070).\n - net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n - net: inet_csk: Fix so_reuseport bind-address cache in tb->fast*\n (networking-stable-20_05_27).\n - net: ipip: fix wrong address family in init error path\n (networking-stable-20_05_27).\n - net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set\n (git-fixes).\n - net: macsec: preserve ingress frame ordering\n (networking-stable-20_05_12).\n - net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n - net/mlx4_core: fix a memory leak bug (git-fixes).\n - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()\n (networking-stable-20_05_12).\n - net/mlx5: Add command entry handling completion\n (networking-stable-20_05_27).\n - net/mlx5: Avoid panic when setting vport rate (git-fixes).\n - net/mlx5: Continue driver initialization despite debugfs failure\n (git-fixes).\n - net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n - net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n - net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n - net/mlx5e: Update netdev txq on completions during closure\n (networking-stable-20_05_27).\n - net/mlx5: Fix command entry leak in Internal Error State\n (networking-stable-20_05_12).\n - net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n - net/mlx5: Fix forced completion access non initialized command entry\n (networking-stable-20_05_12).\n - net: mvmdio: allow up to four clocks to be specified for orion-mdio\n (git-fixes).\n - net: mvpp2: prs: Do not override the sign bit in SRAM parser shift\n (git-fixes).\n - net: phy: fix aneg restart in phy_ethtool_set_eee\n (networking-stable-20_05_16).\n - netprio_cgroup: Fix unlimited memory leak of v2 cgroups\n (networking-stable-20_05_16).\n - net: qede: stop adding events on an already destroyed workqueue\n (git-fixes).\n - net: qed: fix excessive QM ILT lines consumption (git-fixes).\n - net: qed: fix NVMe login fails over VFs (git-fixes).\n - net: qrtr: Fix passing invalid reference to qrtr_local_enqueue()\n (networking-stable-20_05_27).\n - net: revert \"net: get rid of an signed integer overflow in\n ip_idents_reserve()\" (networking-stable-20_05_27).\n - net sched: fix reporting the first-time use timestamp\n (networking-stable-20_05_27).\n - net: stricter validation of untrusted gso packets\n (networking-stable-20_05_12).\n - net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict()\n (networking-stable-20_05_12).\n - net/tls: Fix sk_psock refcnt leak when in tls_data_ready()\n (networking-stable-20_05_12).\n - net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n - net: usb: qmi_wwan: add Telit 0x1050 composition\n (networking-stable-20_06_07).\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n - net: vmxnet3: fix possible buffer overflow caused by bad DMA value in\n vmxnet3_get_rss() (bsc#1172484).\n - nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n - NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid()\n (bsc#1170592).\n - NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n - nilfs2: fix null pointer dereference at nilfs_segctor_do_construct()\n (bsc#1173857).\n - nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n - nvdimm: Avoid race between probe and reading device attributes\n (bsc#1170442).\n - nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558\n bsc#1159058).\n - nvme: do not update multipath disk information if the controller is down\n (bcs#1171558 bsc#1159058).\n - nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983\n bsc#1172538).\n - nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983\n bsc#1172538).\n - nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed\n (bsc#1158983 bsc#1172538).\n - objtool: Clean instruction state before each function validation\n (bsc#1169514).\n - objtool: Ignore empty alternatives (bsc#1169514).\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n - ocfs2: load global_inode_alloc (bsc#1172963).\n - ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n - overflow: Fix -Wtype-limits compilation warnings (git fixes).\n - overflow.h: Add arithmetic shift helper (git fixes).\n - p54usb: add AirVasT USB stick device-id (bsc#1051510).\n - padata: ensure the reorder timer callback runs on the correct CPU\n (git-fixes).\n - padata: reorder work kABI fixup (git-fixes).\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership\n (bsc#1174356).\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n - PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n - PCI: Fix pci_register_host_bridge() device_register() error handling\n (bsc#1051510).\n - PCI: Fix \"try\" semantics of bus and slot reset (git-fixes).\n - PCI: Generalize multi-function power dependency device links\n (bsc#1111666).\n - PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871,\n bsc#1172872).\n - PCI: hv: Fix the PCI HyperV probe failure path to release resource\n properly (bsc#1172871, bsc#1172872).\n - PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n - PCI: hv: Move hypercall related definitions into tlfs header\n (bsc#1172871, bsc#1172872).\n - PCI: hv: Move retarget related structures into tlfs header (bsc#1172871,\n bsc#1172872).\n - PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871,\n bsc#1172872).\n - PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871,\n bsc#1172872).\n - PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n - PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n - PCI: Program MPS for RCiEP devices (bsc#1051510).\n - PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port\n (bsc#1051510).\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n - pcm_native: result of put_user() needs to be checked (bsc#1111666).\n - perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n - perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus\n precise RIP validity (git-fixes).\n - perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n - perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family\n (10h) (git-fixes).\n - perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static\n (git-fixes).\n - perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3\n PMCs (git-fixes stable).\n - perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n - perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf\n events (git-fixes stable).\n - perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n - perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n - perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts()\n (git-fixes).\n - perf/x86/intel: Add proper condition to run sched_task callbacks\n (git-fixes).\n - perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n - perf/x86/intel: Fix PT PMI handling (git-fixes).\n - perf/x86/intel: Move branch tracing setup to the Intel-specific source\n file (git-fixes).\n - perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n - perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n - perf/x86/intel/uncore: Handle invalid event coding for free-running\n counter (git-fixes).\n - perf/x86/uncore: Fix event group support (git-fixes).\n - pid: Improve the comment about waiting in zap_pid_ns_processes (git\n fixes)).\n - pinctrl: freescale: imx: Fix an error handling path in\n 'imx_pinctrl_probe()' (bsc#1051510).\n - pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()'\n (bsc#1051510).\n - pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE\n GPIOs (bsc#1051510).\n - platform/x86: dell-laptop: do not register micmute LED if there is no\n token (bsc#1111666).\n - platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32()\n (bsc#1111666).\n - PM / Domains: Allow genpd users to specify default active wakeup\n behavior (git-fixes).\n - pnp: Use list_for_each_entry() instead of open coding (git fixes).\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n - powerpc/64s: Save FSCR to init_task.thread.fscr after feature init\n (bsc#1065729).\n - powerpc/book3s64: Export has_transparent_hugepage() related functions\n (bsc#1171759).\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable\n pkey (bsc#1065729).\n - powerpc/fadump: fix race between pstore write and fadump crash trigger\n (bsc#1168959 ltc#185010).\n - powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.patch\n - powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n - powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n - power: supply: bq24257_charger: Replace depends on REGMAP_I2C with\n select (bsc#1051510).\n - power: supply: lp8788: Fix an error handling path in\n 'lp8788_charger_probe()' (bsc#1051510).\n - power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n - power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n - pppoe: only process PADT targeted at local interfaces\n (networking-stable-20_05_16).\n - propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n - qed: reduce maximum stack frame size (git-fixes).\n - qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n - r8152: support additional Microsoft Surface Ethernet Adapter variant\n (networking-stable-20_05_27).\n - raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n - RDMA/efa: Fix setting of wrong bit in get/set_feature commands\n (bsc#1111666)\n - RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n - RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n - RDMA/efa: Unified getters/setters for device structs bitmask access\n (bsc#1111666)\n - README.BRANCH: Add Takashi Iwai as primary maintainer.\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps\n (bsc#1111666).\n - Revert \"bcache: ignore pending signals when creating gc and allocator\n thread\" (git fixes (block drivers)).\n - Revert commit e918e570415c (\"tpm_tis: Remove the HID IFX0102\")\n (bsc#1111666).\n - Revert \"dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues\" (git\n fixes (block drivers)).\n - Revert \"ipv6: add mtu lock check in __ip6_rt_update_pmtu\"\n (networking-stable-20_05_16).\n - Revert pciehp patches that broke booting (bsc#1174887)\n - Revert \"thermal: mediatek: fix register index error\" (bsc#1111666).\n - Revert \"tools lib traceevent: Remove unneeded qsort and uses memmove\"\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n - s390: fix syscall_get_error for compat processes (git-fixes).\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n - s390/qdio: lock device while installing IRQ handler (git-fixes).\n - s390/qdio: put thinint indicator after early error (git-fixes).\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n - sch_choke: avoid potential panic in choke_reset()\n (networking-stable-20_05_12).\n - sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n - scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n - scsi: aacraid: fix a signedness bug (bsc#1174296).\n - scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n - scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM\n (bsc#1172759 ltc#184814).\n - scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Add support to display if adapter dumps are available\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Allow applications to issue Common Set Features mailbox\n command (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset()\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n - scsi: lpfc: Fix interrupt assignments when multiple vectors are\n supported on same CPU (bsc#1158983).\n - scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix language in 0373 message to reflect non-error message\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix less-than-zero comparison of unsigned value\n (bsc#1158983).\n - scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix NVMe rport deregister and registration during ADISC\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n - scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n - scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n - scsi: qedf: Add port_id getter (bsc#1150660).\n - scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs()\n (bsc#1174296).\n - scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request\n (bsc#1158983).\n - sctp: Do not add the shutdown timer if its already been added\n (networking-stable-20_05_27).\n - sctp: Start shutdown on association restart if in SHUTDOWN-SENT state\n and socket is closed (networking-stable-20_05_27).\n - spi: dw: use \"smp_mb()\" to avoid sending spi data error (bsc#1051510).\n - spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n - spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n - spi: spidev: fix a race between spidev_release and spidev_remove\n (bsc#1111666).\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate\n (bsc#1111666).\n - staging: comedi: verify array index is correct before using it\n (bsc#1111666).\n - staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n - staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n - SUNRPC: The TCP back channel mustn't disappear while requests are\n outstanding (bsc#1152624).\n - tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes\n (bsc#1173284).\n - timers: Add a function to start/reduce a timer\n (networking-stable-20_05_27).\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init\n (bsc#1111666).\n - tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n - tracing: Fix event trigger to accept redundant spaces (git-fixes).\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n - tty: n_gsm: Fix SOF skipping (bsc#1051510).\n - tty: n_gsm: Fix waking up upper tty layer when room available\n (bsc#1051510).\n - tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040\n (networking-stable-20_05_12).\n - ubifs: remove broken lazytime support (bsc#1173826).\n - usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n - usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n - usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n - usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n - usb: dwc2: gadget: move gadget resume after the core is in L0 state\n (bsc#1051510).\n - usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n - usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).\n - usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n - usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n - usb: ehci: reopen solution for Synopsys HC bug (git-fixes).\n - usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer before null\n check (bsc#1051510).\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk\n (bsc#1111666).\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable()\n (bsc#1111666).\n - usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in\n s3c2410_udc_nuke (bsc#1051510).\n - usb: host: ehci-exynos: Fix error check in exynos_ehci_probe()\n (bsc#1111666).\n - usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe()\n (bsc#1051510).\n - usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n - usb: musb: start session in resume for host port (bsc#1051510).\n - usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n - usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n - usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n - usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n - usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n - usb: serial: option: add GosunCn GM500 series (bsc#1111666).\n - usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n - usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n - usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors\n (bsc#1051510).\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors\n (git-fixes).\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n - vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n - virtio-blk: handle block_device_operations callbacks after hot unplug\n (git fixes (block drivers)).\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc\n serial (git-fixes).\n - vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n - vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n - vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n - vmxnet3: avoid format strint overflow warning (bsc#1172484).\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n - vmxnet3: Remove always false conditional statement (bsc#1172484).\n - vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).\n - vmxnet3: remove unused flag \"rxcsum\" from struct vmxnet3_adapter\n (bsc#1172484).\n - vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n - vmxnet3: update to version 4 (bsc#1172484).\n - vmxnet3: use correct hdr reference when packet is encapsulated\n (bsc#1172484).\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n - vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid\n options (git-fixes).\n - w1: omap-hdq: cleanup to add missing newline for some dev_dbg\n (bsc#1051510).\n - watchdog: sp805: fix restart handler (bsc#1111666).\n - wil6210: add general initialization/size checks (bsc#1111666).\n - wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n - wil6210: ignore HALP ICR if already handled (bsc#1111666).\n - wil6210: make sure Rx ring sizes are correlated (git-fixes).\n - work around mvfs bug (bsc#1162063).\n - x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n - x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n - x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS\n (git-fixes).\n - x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n - x86/{mce,mm}: Unmap the entire page if the whole page is affected and\n poisoned (bsc#1172257).\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n - xfrm: fix error in comment (git fixes).\n - xhci: Fix enumeration issue when setting max packet size for FS devices\n (git-fixes).\n - xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n - vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2020-1153=1", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-08-06T00:00:00", "type": "suse", "title": "Security update for the Linux Kernel (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-16746", "CVE-2019-20810", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14331", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780", "CVE-2020-16166"], "modified": "2020-08-06T00:00:00", "id": "OPENSUSE-SU-2020:1153-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5TP74A7GFRKHFHFASPUDW72EHCZZEIBB/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-11-08T04:09:41", "description": "An update that solves two vulnerabilities and has 55 fixes\n is now available.\n\nDescription:\n\n\n\n The openSUSE Leap 15.2 was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a\n memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n - CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\n deadlock if a coalescing operation fails (bnc#1171732).\n\n The following non-security bugs were fixed:\n\n - ACPI: configfs: Disallow loading ACPI tables when locked down\n (git-fixes).\n - ACPI: sysfs: Fix pm_profile_attr type (git-fixes).\n - aio: fix async fsync creds (bsc#1173828).\n - ALSA: hda: Add NVIDIA codec IDs 9a & 9d through a0 to patch table\n (git-fixes).\n - ALSA: hda/hdmi: fix failures at PCM open on Intel ICL and later\n (git-fixes).\n - ALSA: hda/hdmi: improve debug traces for stream lookups (git-fixes).\n - ALSA: hda - let hs_mic be picked ahead of hp_mic (git-fixes).\n - ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems\n (git-fixes).\n - ALSA: hda/realtek - Add quirk for MSI GE63 laptop (git-fixes).\n - ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC\n (git-fixes).\n - ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC\n (git-fixes).\n - ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with\n ALC269VC (git-fixes).\n - ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id\n (git-fixes).\n - ALSA: isa/wavefront: prevent out of bounds write in ioctl (git-fixes).\n - ALSA: opl3: fix infoleak in opl3 (git-fixes).\n - ALSA: usb-audio: Add implicit feedback quirk for RTX6001 (git-fixes).\n - ALSA: usb-audio: Add implicit feedback quirk for SSL2+ (git-fixes).\n - ALSA: usb-audio: add quirk for Denon DCD-1500RE (git-fixes).\n - ALSA: usb-audio: add quirk for MacroSilicon MS2109 (git-fixes).\n - ALSA: usb-audio: add quirk for Samsung USBC Headset (AKG) (git-fixes).\n - ALSA: usb-audio: Fix OOB access of mixer element list (git-fixes).\n - ALSA: usb-audio: Fix packet size calculation (bsc#1173847).\n - ALSA: usb-audio: Fix potential use-after-free of streams (git-fixes).\n - ALSA: usb-audio: Replace s/frame/packet/ where appropriate (git-fixes).\n - amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).\n - ASoC: core: only convert non DPCM link to DPCM link (git-fixes).\n - ASoC: davinci-mcasp: Fix dma_chan refcnt leak when getting dma type\n (git-fixes).\n - ASoC: fsl_asrc_dma: Fix dma_chan leak when config DMA channel failed\n (git-fixes).\n - ASoC: fsl_ssi: Fix bclk calculation for mono channel (git-fixes).\n - ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT8-A tablet\n (git-fixes).\n - ASoC: max98373: reorder max98373_reset() in resume (git-fixes).\n - ASoc: q6afe: add support to get port direction (git-fixes).\n - ASoC: q6asm: handle EOS correctly (git-fixes).\n - ASoC: qcom: q6asm-dai: kCFI fix (git-fixes).\n - ASoC: rockchip: Fix a reference count leak (git-fixes).\n - ASoC: SOF: Do nothing when DSP PM callbacks are not set (git-fixes).\n - ASoC: SOF: nocodec: conditionally set dpcm_capture/dpcm_playback flags\n (git-fixes).\n - ASoC: tegra: tegra_wm8903: Support nvidia, headset property (git-fixes).\n - ASoC: ti: omap-mcbsp: Fix an error handling path in 'asoc_mcbsp_probe()'\n (git-fixes).\n - ata/libata: Fix usage of page address by page_address in\n ata_scsi_mode_select_xlat function (git-fixes).\n - ath10k: fix kernel null pointer dereference (git-fixes).\n - ath10k: Fix the race condition in firmware dump work queue (git-fixes).\n - b43: Fix connection problem with WPA3 (git-fixes).\n - b43_legacy: Fix connection problem with WPA3 (git-fixes).\n - backlight: lp855x: Ensure regulators are disabled on probe failure\n (git-fixes).\n - batman-adv: Revert \"disable ethtool link speed detection when auto\n negotiation off\" (git-fixes).\n - bdev: fix bdev inode reference count disbalance regression (bsc#1174244)\n - block/bio-integrity: do not free 'buf' if bio_integrity_add_page()\n failed (bsc#1173817).\n - block: Fix use-after-free in blkdev_get() (bsc#1173834).\n - block: nr_sects_write(): Disable preemption on seqcount write\n (bsc#1173818).\n - Bluetooth: Add SCO fallback for invalid LMP parameters error (git-fixes).\n - Bluetooth: btbcm: Add 2 missing models to subver tables (git-fixes).\n - bnxt_en: Fix AER reset logic on 57500 chips (bsc#1171150).\n - bnxt_en: fix firmware message length endianness (bsc#1173894).\n - bnxt_en: Fix return code to \"flash_device\" (bsc#1173894).\n - bnxt_en: Re-enable SRIOV during resume (jsc#SLE-8371 bsc#1153274).\n - bnxt_en: Return from timer if interface is not in open state\n (jsc#SLE-8371 bsc#1153274).\n - bnxt_en: Simplify bnxt_resume() (jsc#SLE-8371 bsc#1153274).\n - bpf: Document optval > PAGE_SIZE behavior for sockopt hooks\n (bsc#1155518).\n - bpf: Do not return EINVAL from {get,set}sockopt when optlen > PAGE_SIZE\n (bsc#1155518).\n - bpf: Fix an error code in check_btf_func() (bsc#1154353).\n - bpf: Restrict bpf_trace_printk()'s %s usage and add %pks, %pus specifier\n (bsc#1172344).\n - bpf, xdp, samples: Fix null pointer dereference in *_user code\n (bsc#1155518).\n - brcmfmac: expose RPi firmware config files through modinfo (bsc#1169094).\n - bus: ti-sysc: Ignore clockactivity unless specified as a quirk\n (git-fixes).\n - carl9170: remove P2P_GO support (git-fixes).\n - cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n - clk: qcom: msm8916: Fix the address location of pll->config_reg\n (git-fixes).\n - clk: samsung: exynos5433: Add IGNORE_UNUSED flag to sclk_i2s1\n (git-fixes).\n - clk: sifive: allocate sufficient memory for struct __prci_data\n (git-fixes).\n - clk: ti: composite: fix memory leak (git-fixes).\n - clk: zynqmp: fix memory leak in zynqmp_register_clocks (git-fixes).\n - clocksource: dw_apb_timer: Make CPU-affiliation being optional\n (git-fixes).\n - cpufreq: Fix up cpufreq_boost_set_sw() (git-fixes).\n - cpufreq: intel_pstate: Only mention the BIOS disabling turbo mode once\n (git-fixes).\n - cpufreq: powernv: Fix frame-size-overflow in powernv_cpufreq_work_fn\n (git-fixes).\n - cpuidle: Fix three reference count leaks (git-fixes).\n - crypto: algif_skcipher - Cap recv SG list at ctx->used (git-fixes).\n - crypto - Avoid free() namespace collision (git-fixes).\n - Crypto/chcr: fix for ccm(aes) failed test (git-fixes).\n - crypto: omap-sham - add proper load balancing support for multicore\n (git-fixes).\n - debugfs: Check module state before warning in {full/open}_proxy_open()\n (bsc#1173746).\n - devlink: fix return value after hitting end in region read\n (networking-stable-20_05_12).\n - devmap: Use bpf_map_area_alloc() for allocating hash buckets\n (bsc#1154353).\n - dm writecache: reject asynchronous pmem devices (bsc#1156395).\n - dpaa2-eth: prevent array underflow in update_cls_rule()\n (networking-stable-20_05_16).\n - dpaa2-eth: properly handle buffer size restrictions\n (networking-stable-20_05_16).\n - dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n - drivers: base: Fix NULL pointer exception in __platform_driver_probe()\n if a driver developer is foolish (git-fixes).\n - Drivers: hv: Change flag to write log level in panic msg to false\n (bsc#1170617).\n - drm: amd/display: fix Kconfig help text (bsc#1152489) \t* context changes\n - drm/amd/display: Revalidate bandwidth before commiting DC updates\n (git-fixes).\n - drm/amd: fix potential memleak in err branch (git-fixes).\n - drm/amdgpu: add fw release for sdma v5_0 (git-fixes).\n - drm/amdgpu: drop redundant cg/pg ungate on runpm enter (git-fixes).\n - drm/amdgpu: fix gfx hang during suspend with video playback (v2)\n (git-fixes).\n - drm/amdgpu: fix the hw hang during perform system reboot and reset\n (git-fixes).\n - drm/amdgpu: Init data to avoid oops while reading pp_num_states\n (git-fixes).\n - drm/amdgpu: move kfd suspend after ip_suspend_phase1 (git-fixes).\n - drm/amdgpu: Replace invalid device ID with a valid device ID\n (bsc#1152472)\n - drm/amd/powerpay: Disable gfxoff when setting manual mode on picasso and\n raven (git-fixes).\n - drm: bridge: adv7511: Extend list of audio sample rates (git-fixes).\n - drm/connector: notify userspace on hotplug after register complete\n (bsc#1152489) \t* context changes\n - drm/i915/gt: Do not schedule normal requests immediately along\n (bsc#1152489)\n - drm/i915/gvt: Fix two CFL MMIO handling caused by regression.\n (bsc#1152489)\n - drm/i915/gvt: Fix two CFL MMIO handling caused by regression (git-fixes).\n - drm/i915/icl+: Fix hotplug interrupt disabling after storm detection\n (bsc#1152489)\n - drm/msm: Check for powered down HW in the devfreq callbacks (bsc#1152489)\n - drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1152489)\n - drm/msm/dpu: fix error return code in dpu_encoder_init (git-fixes).\n - drm/msm/mdp5: Fix mdp5_init error path for failed mdp5_kms allocation\n (git-fixes).\n - drm/nouveau/disp/gm200-: fix NV_PDISP_SOR_HDMI2_CTRL(n) selection\n (git-fixes).\n - drm/qxl: Use correct notify port address when creating cursor ring\n (bsc#1152472)\n - drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1152472)\n - drm: rcar-du: Fix build error (bsc#1152472)\n - drm: sun4i: hdmi: Remove extra HPD polling (bsc#1152489)\n - drm: sun4i: hdmi: Remove extra HPD polling (git-fixes).\n - e1000: Distribute switch variables for initialization (git-fixes).\n - e1000e: Relax condition to trigger reset for ME workaround (git-fixes).\n - ext4: avoid utf8_strncasecmp() with unstable name (bsc#1173843).\n - ext4: fix error pointer dereference (bsc#1173837).\n - ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1173836).\n - ext4: fix partial cluster initialization when splitting extent\n (bsc#1173839).\n - ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n - ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error\n handlers (bsc#1173833).\n - ext4: stop overwrite the errcode in ext4_setup_super (bsc#1173841).\n - fat: do not allow to mount if the FAT length == 0 (bsc#1173831).\n - Fix boot crash with MD (bsc#1173860)\n - fix multiplication overflow in copy_fdtable() (bsc#1173825).\n - fork: prevent accidental access to clone3 features (bsc#1174018).\n - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks\n (networking-stable-20_05_12).\n - geneve: allow changing DF behavior after creation (git-fixes).\n - geneve: change from tx_error to tx_dropped on missing metadata\n (git-fixes).\n - gfs2: fix glock reference problem in gfs2_trans_remove_revoke\n (bsc#1173823).\n - gfs2: Multi-block allocations in gfs2_page_mkwrite (bsc#1173822).\n - gpio: pca953x: fix handling of automatic address incrementing\n (git-fixes).\n - HID: Add quirks for Trust Panora Graphic Tablet (git-fixes).\n - hinic: fix a bug of ndo_stop (networking-stable-20_05_16).\n - hinic: fix wrong para of wait_for_completion_timeout\n (networking-stable-20_05_16).\n - hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).\n - hwmon: (acpi_power_meter) Fix potential memory leak in\n acpi_power_meter_add() (git-fixes).\n - hwmon: (k10temp) Add AMD family 17h model 60h PCI match (git-fixes).\n - hwmon: (max6697) Make sure the OVERT mask is set correctly (git-fixes).\n - hwmon: (pmbus) fix a typo in Kconfig SENSORS_IR35221 option (git-fixes).\n - i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (git-fixes).\n - i2c: core: check returned size of emulated smbus block read (git-fixes).\n - i2c: fsi: Fix the port number field in status register (git-fixes).\n - i2c: mlxcpld: check correct size of maximum RECV_LEN packet (git-fixes).\n - i2c: piix4: Detect secondary SMBus controller on AMD AM4 chipsets\n (git-fixes).\n - i2c: pxa: clear all master action bits in i2c_pxa_stop_message()\n (git-fixes).\n - i2c: pxa: fix i2c_pxa_scream_blue_murder() debug output (git-fixes).\n - IB/rdmavt: Free kernel completion queue when done (bsc#1173625).\n - iio: bmp280: fix compensation of humidity (git-fixes).\n - input: i8042 - Remove special PowerPC handling (git-fixes).\n - ionic: add pcie_print_link_status (bsc#1167773).\n - ionic: export features for vlans to use (bsc#1167773).\n - ionic: no link check while resetting queues (bsc#1167773).\n - ionic: remove support for mgmt device (bsc#1167773).\n - ionic: tame the watchdog timer on reconfig (bsc#1167773).\n - ionic: wait on queue start until after IFF_UP (bsc#1167773).\n - io_uring: use kvfree() in io_sqe_buffer_register() (bsc#1173832).\n - ipmi: use vzalloc instead of kmalloc for user creation (git-fixes).\n - iwlwifi: mvm: fix aux station leak (git-fixes).\n - ixgbe: do not check firmware errors (bsc#1170284).\n - jbd2: avoid leaking transaction credits when unreserving handle\n (bsc#1173845).\n - jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n - kABI fixup mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).\n - kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n - kABI: protect struct fib_dump_filter (kabi).\n - kABI: protect struct mlx5_cmd_work_ent (kabi).\n - libceph: do not omit recovery_deletes in target_copy() (git-fixes).\n - loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n - media: dvbdev: Fix tuner->demod media controller link (git-fixes).\n - media: dvbsky: add support for eyeTV Geniatech T2 lite (bsc#1173776).\n - media: dvbsky: add support for Mygica T230C v2 (bsc#1173776).\n - media: imx: imx7-mipi-csis: Cleanup and fix subdev pad format handling\n (git-fixes).\n - media: mtk-vpu: avoid unaligned access to DTCM buffer (git-fixes).\n - media: ov5640: fix use of destroyed mutex (git-fixes).\n - media: si2157: Better check for running tuner in init (git-fixes).\n - media: si2168: add support for Mygica T230C v2 (bsc#1173776).\n - media: staging: imgu: do not hold spinlock during freeing mmu page table\n (git-fixes).\n - media: staging/intel-ipu3: Implement lock for stream on/off operations\n (git-fixes).\n - media: vicodec: Fix error codes in probe function (git-fixes).\n - mfd: wm8994: Fix driver operation if loaded as modules (git-fixes).\n - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly\n (networking-stable-20_05_12).\n - mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (git-fixes).\n - mmc: via-sdmmc: Respect the cmd->busy_timeout from the mmc core\n (git-fixes).\n - mm: fix NUMA node file count error in replace_page_cache() (bsc#1173844).\n - mm/memory_hotplug: refrain from adding memory into an impossible node\n (bsc#1173552).\n - mvpp2: remove module bugfix (bsc#1154353).\n - namei: only return -ECHILD from follow_dotdot_rcu() (bsc#1173824).\n - neigh: send protocol value in neighbor create notification\n (networking-stable-20_05_12).\n - net: core: device_rename: Use rwsem instead of a seqcount (bsc#1162702).\n - net: do not return invalid table id error when we fall back to PF_UNSPEC\n (networking-stable-20_05_27).\n - net: dsa: Do not leave DSA master with NULL netdev_ops\n (networking-stable-20_05_12).\n - net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n - net: dsa: mt7530: fix roaming from DSA user ports\n (networking-stable-20_05_27).\n - net: ethernet: ti: cpsw: fix ASSERT_RTNL() warning during suspend\n (networking-stable-20_05_27).\n - net: fix a potential recursive NETDEV_FEAT_CHANGE\n (networking-stable-20_05_16).\n - __netif_receive_skb_core: pass skb by reference\n (networking-stable-20_05_27).\n - net: inet_csk: Fix so_reuseport bind-address cache in tb->fast*\n (networking-stable-20_05_27).\n - net: ipip: fix wrong address family in init error path\n (networking-stable-20_05_27).\n - net: macb: fix an issue about leak related system resources\n (networking-stable-20_05_12).\n - net: macsec: preserve ingress frame ordering\n (networking-stable-20_05_12).\n - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()\n (networking-stable-20_05_12).\n - net/mlx5: Add command entry handling completion\n (networking-stable-20_05_27).\n - net/mlx5: Disable reload while removing the device (jsc#SLE-8464).\n - net/mlx5: DR, Fix freeing in dr_create_rc_qp() (jsc#SLE-8464).\n - net/mlx5e: Fix inner tirs handling (networking-stable-20_05_27).\n - net/mlx5e: kTLS, Destroy key object after destroying the TIS\n (networking-stable-20_05_27).\n - net/mlx5e: Update netdev txq on completions during closure\n (networking-stable-20_05_27).\n - net/mlx5: Fix command entry leak in Internal Error State\n (networking-stable-20_05_12).\n - net/mlx5: Fix error flow in case of function_setup failure\n (networking-stable-20_05_27).\n - net/mlx5: Fix forced completion access non initialized command entry\n (networking-stable-20_05_12).\n - net/mlx5: Fix memory leak in mlx5_events_init\n (networking-stable-20_05_27).\n - net: mvpp2: cls: Prevent buffer overflow in mvpp2_ethtool_cls_rule_del()\n (networking-stable-20_05_12).\n - net: mvpp2: fix RX hashing for non-10G ports\n (networking-stable-20_05_27).\n - net: mvpp2: prevent buffer overflow in mvpp22_rss_ctx()\n (networking-stable-20_05_12).\n - net: nlmsg_cancel() if put fails for nhmsg (networking-stable-20_05_27).\n - net: phy: fix aneg restart in phy_ethtool_set_eee\n (networking-stable-20_05_16).\n - netprio_cgroup: Fix unlimited memory leak of v2 cgroups\n (networking-stable-20_05_16).\n - net: qrtr: Fix passing invalid reference to qrtr_local_enqueue()\n (networking-stable-20_05_27).\n - net sched: fix reporting the first-time use timestamp\n (networking-stable-20_05_27).\n - net_sched: sch_skbprio: add message validation to skbprio_change()\n (networking-stable-20_05_12).\n - net/smc: tolerate future SMCD versions (bsc#1172543 LTC#186069).\n - net: stmmac: fix num_por initialization (networking-stable-20_05_16).\n - net: stricter validation of untrusted gso packets\n (networking-stable-20_05_12).\n - net: tc35815: Fix phydev supported/advertising mask\n (networking-stable-20_05_12).\n - net: tcp: fix rx timestamp behavior for tcp_recvmsg\n (networking-stable-20_05_16).\n - net/tls: fix race condition causing kernel panic\n (networking-stable-20_05_27).\n - net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict()\n (networking-stable-20_05_12).\n - net/tls: Fix sk_psock refcnt leak when in tls_data_ready()\n (networking-stable-20_05_12).\n - net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n - nexthop: Fix attribute checking for groups (networking-stable-20_05_27).\n - nfp: abm: fix a memory leak bug (networking-stable-20_05_12).\n - nfp: abm: fix error return code in nfp_abm_vnic_alloc()\n (networking-stable-20_05_16).\n - nfsd4: fix nfsdfs reference count loop (git-fixes).\n - nfsd: apply umask on fs without ACL support (git-fixes).\n - nfsd: fix nfsdfs inode reference count leak (git-fixes).\n - NFSv4 fix CLOSE not waiting for direct IO compeletion (git-fixes).\n - PCI: aardvark: Do not blindly enable ASPM L0s and do not write to\n read-only register (git-fixes).\n - PCI: Add ACS quirk for Intel Root Complex Integrated Endpoints\n (git-fixes).\n - PCI: Add Loongson vendor ID (git-fixes).\n - PCI/ASPM: Allow ASPM on links to PCIe-to-PCI/PCI-X Bridges (git-fixes).\n - PCI: Avoid FLR for AMD Matisse HD Audio & USB 3.0 (git-fixes).\n - PCI: Avoid FLR for AMD Starship USB 3.0 (git-fixes).\n - PCI: Do not disable decoding when mmio_always_on is set (git-fixes).\n - PCI: dwc: Fix inner MSI IRQ domain registration (git-fixes).\n - PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871).\n - PCI: hv: Decouple the func definition in hv_dr_state from VSP message\n (bsc#1172871).\n - PCI: hv: Fix the PCI HyperV probe failure path to release resource\n properly (bsc#1172871).\n - PCI: hv: Introduce hv_msi_entry (bsc#1172871).\n - PCI: hv: Move hypercall related definitions into tlfs header\n (bsc#1172871).\n - PCI: hv: Move retarget related structures into tlfs header (bsc#1172871).\n - PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871).\n - PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871).\n - PCI: pci-bridge-emul: Fix PCIe bit conflicts (git-fixes).\n - PCI: vmd: Add device id for VMD device 8086:9A0B (git-fixes).\n - pinctrl: rockchip: fix memleak in rockchip_dt_node_to_map (git-fixes).\n - pinctrl: tegra: Use noirq suspend/resume callbacks (git-fixes).\n - platform/x86: asus_wmi: Reserve more space for struct bias_args\n (git-fixes).\n - platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32()\n (git-fixes).\n - platform/x86: intel-hid: Add a quirk to support HP Spectre X2 (2015)\n (git-fixes).\n - pNFS/flexfiles: Fix list corruption if the mirror count changes\n (git-fixes).\n - pppoe: only process PADT targeted at local interfaces\n (networking-stable-20_05_16).\n - proc: Use new_inode not new_inode_pseudo (bsc#1173830).\n - pwm: img: Call pm_runtime_put() in pm_runtime_get_sync() failed case\n (git-fixes).\n - RDMA/core: Check that type_attrs is not NULL prior access (jsc#SLE-8449).\n - regualtor: pfuze100: correct sw1a/sw2 on pfuze3000 (git-fixes).\n - remoteproc: qcom_q6v5_mss: map/unmap mpss segments before/after use\n (git-fixes).\n - Revert commit e918e570415c (\"tpm_tis: Remove the HID IFX0102\")\n (git-fixes).\n - Revert \"i2c: tegra: Fix suspending in active runtime PM state\"\n (git-fixes).\n - Revert \"ipv6: add mtu lock check in __ip6_rt_update_pmtu\"\n (networking-stable-20_05_16).\n - ring-buffer: Zero out time extend if it is nested and not absolute\n (git-fixes).\n - sata_rcar: handle pm_runtime_get_sync failure cases (git-fixes).\n - sch_choke: avoid potential panic in choke_reset()\n (networking-stable-20_05_12).\n - sched: Fix loadavg accounting race (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n - sched: Fix race against ptrace_freeze_trace() (bsc#1174345).\n - sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n - scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Add support to display if adapter dumps are available\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Allow applications to issue Common Set Features mailbox\n command (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix inconsistent indenting (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix interrupt assignments when multiple vectors are\n supported on same CPU (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix language in 0373 message to reflect non-error message\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix NVMe rport deregister and registration during ADISC\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1172687 bsc#1171530).\n - scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request\n (bsc#1158983).\n - sctp: Do not add the shutdown timer if its already been added\n (networking-stable-20_05_27).\n - sctp: Start shutdown on association restart if in SHUTDOWN-SENT state\n and socket is closed (networking-stable-20_05_27).\n - selftests/bpf: Make sure optvals > PAGE_SIZE are bypassed (bsc#1155518).\n - signal: Avoid corrupting si_pid and si_uid in do_notify_parent\n (bsc#1171529).\n - slimbus: ngd: get drvdata from correct device (git-fixes).\n - socionext: account for napi_gro_receive never returning GRO_DROP\n (bsc#1154353).\n - spi: dw: Enable interrupts in accordance with DMA xfer mode (git-fixes).\n - spi: dw: Fix Rx-only DMA transfers (git-fixes).\n - spi: dw: Return any value retrieved from the dma_transfer callback\n (git-fixes).\n - spi: pxa2xx: Apply CS clk quirk to BXT (git-fixes).\n - spi: sprd: switch the sequence of setting WDG_LOAD_LOW and _HIGH\n (git-fixes).\n - Staging: rtl8723bs: prevent buffer overflow in update_sta_support_rate()\n (git-fixes).\n - sunrpc: fixed rollback in rpc_gssd_dummy_populate() (git-fixes).\n - SUNRPC: Properly set the @subbuf parameter of xdr_buf_subsegment()\n (git-fixes).\n - tcp: fix error recovery in tcp_zerocopy_receive()\n (networking-stable-20_05_16).\n - tcp: fix SO_RCVLOWAT hangs with fat skbs (networking-stable-20_05_16).\n - tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes\n (bsc#1173284).\n - thermal/drivers/mediatek: Fix bank number settings on mt8183 (git-fixes).\n - thermal/drivers/rcar_gen3: Fix undefined temperature if negative\n (git-fixes).\n - thermal/drivers/ti-soc-thermal: Avoid dereferencing ERR_PTR (git-fixes).\n - tipc: block BH before using dst_cache (networking-stable-20_05_27).\n - tipc: fix partial topology connection closure\n (networking-stable-20_05_12).\n - tpm: Fix TIS locality timeout problems (git-fixes).\n - tpm_tis: Remove the HID IFX0102 (git-fixes).\n - tracing: Fix event trigger to accept redundant spaces (git-fixes).\n - tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040\n (networking-stable-20_05_12).\n - ubifs: fix wrong use of crypto_shash_descsize() (bsc#1173827).\n - ubifs: remove broken lazytime support (bsc#1173826).\n - Update patch reference tag for ACPI lockdown fix (bsc#1173573)\n - usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n - usb/ehci-platform: Set PM runtime as active on resume (git-fixes).\n - USB: ehci: reopen solution for Synopsys HC bug (git-fixes).\n - usb: gadget: udc: Potential Oops in error handling code (git-fixes).\n - usb: host: ehci-exynos: Fix error check in exynos_ehci_probe()\n (git-fixes).\n - usb: host: ehci-platform: add a quirk to avoid stuck (git-fixes).\n - usb: host: xhci-mtk: avoid runtime suspend when removing hcd (git-fixes).\n - usblp: poison URBs upon disconnect (git-fixes).\n - usb/ohci-platform: Fix a warning when hibernating (git-fixes).\n - USB: ohci-sm501: Add missed iounmap() in remove (git-fixes).\n - usb: renesas_usbhs: getting residue from callback_result (git-fixes).\n - USB: serial: ch341: add basis for quirk detection (git-fixes).\n - usb: typec: tcpci_rt1711h: avoid screaming irq causing boot hangs\n (git-fixes).\n - usb/xhci-plat: Set PM runtime as active on resume (git-fixes).\n - video: vt8500lcdfb: fix fallthrough warning (bsc#1152489)\n - virtio_net: fix lockdep warning on 32 bit (networking-stable-20_05_16).\n - watchdog: da9062: No need to ping manually before setting timeout\n (git-fixes).\n - wil6210: account for napi_gro_receive never returning GRO_DROP\n (bsc#1154353).\n - wil6210: add wil_netif_rx() helper function (bsc#1154353).\n - wil6210: use after free in wil_netif_rx_any() (bsc#1154353).\n - x86/amd_nb: Add AMD family 17h model 60h PCI IDs (git-fixes).\n - xhci: Fix enumeration issue when setting max packet size for FS devices\n (git-fixes).\n - xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n - xhci: Poll for U0 after disabling USB2 LPM (git-fixes).\n - xhci: Return if xHCI does not support LPM (git-fixes).\n - xprtrdma: Fix handling of RDMA_ERROR replies (git-fixes).\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.2:\n\n zypper in -t patch openSUSE-2020-1062=1", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2020-07-26T00:00:00", "type": "suse", "title": "Security update for the Linux Kernel (important)", "bulletinFamily": "unix", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-12771", "CVE-2020-15393"], "modified": "2020-07-26T00:00:00", "id": "OPENSUSE-SU-2020:1062-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ROJNPZLJQREMBO6RYZZN6PF57GZCBZPB/", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2022-11-08T23:04:24", "description": "An update that solves 7 vulnerabilities and has 109 fixes\n is now available.\n\nDescription:\n\n\n\n The openSUSE Leap 15.2 kernel was updated to receive various security and\n bugfixes.\n\n This update is signed with the new UEFI signing key for openSUSE. It\n contains rebuilds of all available KMP packages also rebuilt with the new\n UEFi signing key. (boo#1174543)\n\n The following security bugs were fixed:\n\n - CVE-2020-14356: A use after free vulnerability in cgroup BPF component\n was fixed (bsc#1175213).\n - CVE-2020-14331: A buffer over write in vgacon_scroll was fixed\n (bnc#1174205).\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make\n observations that help to obtain sensitive information about the\n internal state of the network RNG, aka CID-f227e3ec3b5c. This is related\n to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n - CVE-2020-10135: Legacy pairing and secure-connections pairing\n authentication in Bluetooth\u00ae BR/EDR Core Specification v5.2 and earlier\n may have allowed an unauthenticated user to complete authentication\n without pairing credentials via adjacent access. An unauthenticated,\n adjacent attacker could impersonate a Bluetooth BR/EDR master or slave\n to pair with a previously paired remote device to successfully complete\n the authentication procedure without knowing the link key (bnc#1171988).\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible\n use-after-free due to a race condition. This could lead to local\n escalation of privilege with System execution privileges needed. User\n interaction is not needed for exploitation (bnc#1174462).\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c\n in the Linux kernel Injection of malicious ACPI tables via configfs\n could be used by attackers to bypass lockdown and secure boot\n restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n - CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\n The following non-security bugs were fixed:\n\n - 9p/trans_fd: Fix concurrency del of req_list in\n p9_fd_cancelled/p9_read_work (git-fixes).\n - ACPICA: Dispatcher: add status checks (git-fixes).\n - ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).\n - ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).\n - af_key: pfkey_dump needs parameter validation (git-fixes).\n - agp/intel: Fix a memory leak on module initialisation failure\n (git-fixes).\n - ALSA: asihpi: delete duplicated word (git-fixes).\n - ALSA: atmel: Remove invalid \"fall through\" comments (git-fixes).\n - ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n - ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).\n - ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).\n - ALSA: echoaudio: Prevent races in calls to set_audio_format()\n (git-fixes).\n - ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).\n - ALSA: echoaudio: Race conditions around \"opencount\" (git-fixes).\n - ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).\n - ALSA: echoaudio: Remove redundant check (git-fixes).\n - ALSA: firewire: fix kernel-doc (git-fixes).\n - ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).\n - ALSA: hda: Enable sync-write operation as default for all controllers\n (git-fixes).\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).\n - ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO\n (git-fixes).\n - ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).\n - ALSA: hda/hdmi: Fix keep_power assignment for non-component devices\n (git-fixes).\n - ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop\n (git-fixes).\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL\n (jsc#SLE-13261).\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL\n (jsc#SLE-13261).\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops\n (git-fixes).\n - ALSA: hda/realtek - change to suitable link model for ASUS platform\n (git-fixes).\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with\n ALC256 (git-fixes).\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401)\n series with ALC289 (git-fixes).\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502)\n series with ALC289 (git-fixes).\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).\n - ALSA: hda/realtek: Fix add a \"ultra_low_power\" function for intel\n reference board (alc256) (git-fixes).\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung\n Notebook Pen S (git-fixes).\n - ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).\n - ALSA: hda/realtek - Fix unused variable warning (git-fixes).\n - ALSA: hda/realtek - fixup for yet another Intel reference board\n (git-fixes).\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus\n G14(GA401) series with ALC289 (git-fixes).\n - ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).\n - ALSA: hda/tegra: Disable sync-write operation (git-fixes).\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms\n (git-fixes).\n - ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n - ALSA: isa: delete repeated words in comments (git-fixes).\n - ALSA: isa/gus: remove 'set but not used' warning (git-fixes).\n - ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).\n - ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).\n - ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n - ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).\n - ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).\n - ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n - ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).\n - ALSA: pci/au88x0: remove \"defined but not used\" warnings (git-fixes).\n - ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n - ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n - ALSA: pci: delete repeated words in comments (git-fixes).\n - ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/fm801: fix kernel-doc (git-fixes).\n - ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).\n - ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).\n - ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).\n - ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).\n - ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n - ALSA: seq: oss: Serialize ioctls (git-fixes).\n - ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).\n - ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight\n S (git-fixes).\n - ALSA: usb-audio: add startech usb audio dock name (git-fixes).\n - ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support\n (git-fixes).\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control\n (git-fixes).\n - ALSA: usb-audio: endpoint : remove needless check before\n usb_free_coherent() (git-fixes).\n - ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109\n (bsc#1174625).\n - ALSA: usb-audio: Fix race against the error recovery URB submission\n (git-fixes).\n - ALSA: usb-audio: Fix some typos (git-fixes).\n - ALSA: usb-audio: fix spelling mistake \"buss\" -> \"bus\" (git-fixes).\n - ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109\n (git-fixes).\n - ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).\n - ALSA: vx_core: remove warning for empty loop body (git-fixes).\n - ALSA: xen: remove 'set but not used' warning (git-fixes).\n - ALSA: xen: Remove superfluous fall through comments (git-fixes).\n - apparmor: ensure that dfa state tables have entries (git-fixes).\n - apparmor: fix introspection of of task mode for unconfined tasks\n (git-fixes).\n - apparmor: Fix memory leak of profile proxy (git-fixes).\n - apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).\n - apparmor: remove useless aafs_create_symlink (git-fixes).\n - appletalk: Fix atalk_proc_init() return path (git-fixes).\n - arm64: armv8_deprecated: Fix undef_hook mask for thumb setend\n (bsc#1175180).\n - arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).\n - arm64: csum: Fix handling of bad packets (bsc#1175192).\n - arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none\n bsc#1175016).\n - arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay\n (bsc#1175347).\n - arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).\n - arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none\n bsc#1175019).\n - arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).\n - arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).\n - arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE\n (none bsc#1175012).\n - arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id\n (bsc#1174398).\n - arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode\n (bsc#1174398).\n - arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator\n (git-fixes).\n - arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).\n - arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none\n bsc#1175020).\n - arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc\n happy (none bsc#1175015).\n - arm64: dts: rockchip: Replace RK805 PMIC node name with \"pmic\" on rk3328\n boards (none bsc#1175014).\n - arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n - arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel\n (none bsc#1175011).\n - arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n - arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n - arm64: fix the flush_icache_range arguments in machine_kexec\n (bsc#1175184).\n - arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).\n - arm64: hw_breakpoint: Do not invoke overflow handler on uaccess\n watchpoints (bsc#1175189).\n - arm64: insn: Fix two bugs in encoding 32-bit logical immediates\n (bsc#1175186).\n - arm64: kexec_file: print appropriate variable (bsc#1175187).\n - arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197\n jsc#SLE-13593).\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197\n jsc#SLE-13593).\n - arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).\n - arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).\n - arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none\n bsc#1175018).\n - arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).\n - arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).\n - arm64: vdso: do not free unallocated pages (bsc#1175181).\n - arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).\n - arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).\n - arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).\n - ARM: percpu.h: fix build error (git-fixes).\n - arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n - ASoC: codecs: max98373: Removed superfluous volume control from chip\n default (git-fixes).\n - ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend\n (git-fixes).\n - ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).\n - ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).\n - ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).\n - ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).\n - ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n - ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).\n - ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback\n (git-fixes).\n - ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).\n - ASoC: rt286: fix unexpected interrupt happens (git-fixes).\n - ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the\n Lenovo Miix 2 10 (git-fixes).\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n - ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of\n 10 (git-fixes).\n - ASoC: rt5682: Report the button event in the headset type only\n (git-fixes).\n - ASoC: SOF: nocodec: add missing .owner field (git-fixes).\n - ASoC: topology: fix kernel oops on route addition error (git-fixes).\n - ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).\n - ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n - ASoC: wm8974: remove unsupported clock mode (git-fixes).\n - ath10k: Acquire tx_lock in tx error paths (git-fixes).\n - ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n - ath9k: Fix regression with Atheros 9271 (git-fixes).\n - atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).\n - AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n - AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n - b43: Remove uninitialized_var() usage (git-fixes).\n - blk-mq: consider non-idle request as \"inflight\" in blk_mq_rq_inflight()\n (bsc#1165933).\n - Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).\n - Bluetooth: btusb: fix up firmware download sequence (git-fixes).\n - Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).\n - Bluetooth: Fix slab-out-of-bounds read in\n hci_extended_inquiry_result_evt() (git-fixes).\n - Bluetooth: Fix update of connection state in `hci_encrypt_cfm`\n (git-fixes).\n - Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags\n (git-fixes).\n - Bluetooth: hci_serdev: Only unregister device if it was registered\n (git-fixes).\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt()\n (git-fixes).\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_with_rssi_evt() (git-fixes).\n - bnxt_en: Init ethtool link settings after reading updated PHY\n configuration (jsc#SLE-8371 bsc#1153274).\n - bnxt_en: Init ethtool link settings after reading updated PHY\n configuration (jsc#SLE-8371 bsc#1153274).\n - bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).\n - bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n - bpfilter: fix up a sparse annotation (bsc#1155518).\n - bpfilter: Initialize pos variable (bsc#1155518).\n - bpfilter: reject kernel addresses (bsc#1155518).\n - bpfilter: switch to kernel_write (bsc#1155518).\n - bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone\n (bsc#1155518).\n - bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).\n - brcmfmac: Set timeout value when configuring power save (bsc#1173468).\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n - bridge: Avoid infinite loop when suppressing NS messages with invalid\n options (networking-stable-20_06_10).\n - bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).\n - btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).\n - btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers\n (bsc#1174438).\n - btrfs: avoid unnecessary splits when setting bits on an extent io tree\n (bsc#1175377).\n - btrfs: change timing for qgroup reserved space for ordered extents to\n fix reserved space leak (bsc#1172247).\n - btrfs: delete the ordered isize update code (bsc#1175377).\n - btrfs: do not set path->leave_spinning for truncate (bsc#1175377).\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n - btrfs: file: reserve qgroup space after the hole punch range is locked\n (bsc#1172247).\n - btrfs: fix a block group ref counter leak after failure to remove block\n group (bsc#1175149).\n - btrfs: fix block group leak when removing fails (bsc#1175149).\n - btrfs: fix bytes_may_use underflow when running balance and scrub in\n parallel (bsc#1175149).\n - btrfs: fix corrupt log due to concurrent fsync of inodes with shared\n extents (bsc#1175149).\n - btrfs: fix data block group relocation failure due to concurrent scrub\n (bsc#1175149).\n - btrfs: fix deadlock during fast fsync when logging prealloc extents\n beyond eof (bsc#1175377).\n - btrfs: fix double free on ulist after backref resolution failure\n (bsc#1175149).\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof\n (bsc#1174438).\n - btrfs: fix fatal extent_buffer readahead vs releasepage race\n (bsc#1175149).\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write\n (bsc#1174438).\n - btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).\n - btrfs: fix page leaks after failure to lock page for delalloc\n (bsc#1175149).\n - btrfs: fix race between block group removal and block group creation\n (bsc#1175149).\n - btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow\n (bsc#1174438).\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO\n (bsc#1174438).\n - btrfs: fix space_info bytes_may_use underflow after nocow buffered write\n (bsc#1175149).\n - btrfs: fix space_info bytes_may_use underflow during space cache\n writeout (bsc#1175149).\n - btrfs: fix wrong file range cleanup after an error filling dealloc range\n (bsc#1175149).\n - btrfs: inode: fix NULL pointer dereference if inode does not need\n compression (bsc#1174484).\n - btrfs: inode: move qgroup reserved space release to the callers of\n insert_reserved_file_extent() (bsc#1172247).\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent()\n (bsc#1172247).\n - btrfs: introduce per-inode file extent tree (bsc#1175377).\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n - btrfs: move extent_io_tree defs to their own header (bsc#1175377).\n - btrfs: Move free_pages_out label in inline extent handling branch in\n compress_file_range (bsc#1175263).\n - btrfs: qgroup: allow to unreserve range without releasing other ranges\n (bsc#1120163).\n - btrfs: qgroup: fix data leak caused by race between writeback and\n truncate (bsc#1172247).\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve\n retry-after-EDQUOT (bsc#1120163).\n - btrfs: qgroup: try to flush qgroup space when we get -EDQUOT\n (bsc#1120163).\n - btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc\n (bsc#1175149).\n - btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n - btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).\n - btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).\n - btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).\n - btrfs: separate out the extent io init function (bsc#1175377).\n - btrfs: separate out the extent leak code (bsc#1175377).\n - btrfs: trim: fix underflow in trim length to prevent access beyond\n device boundary (bsc#1175263).\n - btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update\n (bsc#1175377).\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n - btrfs: use the file extent tree infrastructure (bsc#1175377).\n - bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).\n - cfg80211: check vendor command doit pointer before use (git-fixes).\n - clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).\n - clk: at91: clk-generated: check best_rate against ranges (git-fixes).\n - clk: at91: clk-generated: continue if __clk_determine_rate() returns\n error (git-fixes).\n - clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).\n - clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).\n - clk: at91: sam9x60-pll: use logical or for range check (git-fixes).\n - clk: at91: sckc: register slow_rc with accuracy option (git-fixes).\n - clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).\n - clk: bcm63xx-gate: fix last clock availability (git-fixes).\n - clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).\n - clk: iproc: round clock rate to the closest (git-fixes).\n - clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).\n - clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).\n - clk: rockchip: Revert \"fix wrong mmc sample phase shift for rk3328\"\n (git-fixes).\n - clk: scmi: Fix min and max rate when registering clocks with discrete\n rates (git-fixes).\n - clk: spear: Remove uninitialized_var() usage (git-fixes).\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n - console: newport_con: fix an issue about leak related system resources\n (git-fixes).\n - crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).\n - crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).\n - crypto: ccp - Fix use of merged scatterlists (git-fixes).\n - crypto: ccree - fix resource leak on error path (git-fixes).\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified\n (git-fixes).\n - crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not\n specified (git-fixes).\n - crypto: qat - fix double free in qat_uclo_create_batch_init_list\n (git-fixes).\n - dccp: Fix possible memleak in dccp_init and dccp_fini\n (networking-stable-20_06_16).\n - Delete patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.patch\n (bsc#1174627)\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n - devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n - devres: keep both device name and resource name in pretty name\n (git-fixes).\n - dlm: remove BUG() before panic() (git-fixes).\n - dmaengine: dmatest: stop completed threads when running without set\n channel (git-fixes).\n - dmaengine: dw: Initialize channel before each transfer (git-fixes).\n - dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).\n - dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler\n (git-fixes).\n - dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu\n (git-fixes).\n - dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).\n - dmaengine: ioat setting ioat timeout as module parameter (git-fixes).\n - dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler\n (git-fixes).\n - dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).\n - dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).\n - dm: do not use waitqueue for request-based DM (bsc#1165933).\n - docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE\n documentation might refer to cgroup-v2.rst.)\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n - dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n - drbd: Remove uninitialized_var() usage (git-fixes).\n - driver core: Avoid binding drivers to dead devices (git-fixes).\n - drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups()\n (git-fixes).\n - drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).\n - drm/amd/display: Clear dm_state for fast updates (git-fixes).\n - drm/amd/display: Use kfree() to free rgb_user in\n calculate_user_regamma_ramp() (git-fixes).\n - drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).\n - drm/amdgpu/display: use blanked rather than plane state for sync\n (bsc#1152489) \t* refreshed for context changes \t* protect code with\n CONFIG_DRM_AMD_DC_DCN2_0\n - drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).\n - drm/amdgpu: fix preemption unit test (git-fixes).\n - drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).\n - drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n - drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr() (git-fixes).\n - drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).\n - drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)\n - drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).\n - drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in\n (bsc#1152472) \t* refreshed for context changes\n - drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n - drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers\n (git-fixes).\n - drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array\n (git-fixes).\n - drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice\n (bsc#1152489) \t* refreshed for context changes\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) \t* move\n drm_mipi_dbi.c -> tinydrm/mipi-dbi.c\n - drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n - drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).\n - drm/exynos: Properly propagate return value in drm_iommu_attach_device()\n (git-fixes).\n - drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi\n (git-fixes).\n - drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).\n - drm: hold gem reference until object is no longer accessed (git-fixes).\n - drm/i915: Actually emit the await_start (bsc#1174737).\n - drm/i915: Copy across scheduler behaviour flags across submit fences\n (bsc#1174737).\n - drm/i915: Do not poison i915_request.link on removal (bsc#1174737).\n - drm/i915: Drop no-semaphore boosting (bsc#1174737).\n - drm/i915: Eliminate the trylock for awaiting an earlier request\n (bsc#1174737).\n - drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) \t* context\n changes\n - drm/i915: Flush execution tasklets before checking request status\n (bsc#1174737).\n - drm/i915: Flush tasklet submission before sleeping on i915_request_wait\n (bsc#1174737).\n - drm/i915/gt: Close race between engine_park and intel_gt_retire_requests\n (git-fixes).\n - drm/i915/gt: Flush submission tasklet before waiting/retiring\n (bsc#1174737).\n - drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).\n - drm/i915/gt: Move new timelines to the end of active_list (git-fixes).\n - drm/i915/gt: Only swap to a random sibling once upon creation\n (bsc#1152489) \t* context changes\n - drm/i915/gt: Unlock engine-pm after queuing the kernel context switch\n (git-fixes).\n - drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).\n - drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).\n - drm/i915: Keep track of request among the scheduling lists (bsc#1174737).\n - drm/i915: Lock signaler timeline while navigating (bsc#1174737).\n - drm/i915: Mark i915_request.timeline as a volatile, rcu pointer\n (bsc#1174737).\n - drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).\n - drm/i915: Mark up unlocked update of i915_request.hwsp_seqno\n (bsc#1174737).\n - drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2.\n (bsc#1152489) \t* context changes\n - drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n - drm/i915: Prevent using semaphores to chain up to external fences\n (bsc#1174737).\n - drm/i915: Protect i915_request_await_start from early waits\n (bsc#1174737).\n - drm/i915: Pull waiting on an external dma-fence into its routine\n (bsc#1174737).\n - drm/i915: Rely on direct submission to the queue (bsc#1174737).\n - drm/i915: Remove wait priority boosting (bsc#1174737).\n - drm/i915: Reorder await_execution before await_request (bsc#1174737).\n - drm/i915: Return early for await_start on same timeline (bsc#1174737).\n - drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n - drm/imx: fix use after free (git-fixes).\n - drm/imx: imx-ldb: Disable both channels for split mode in enc->disable()\n (git-fixes).\n - drm/imx: tve: fix regulator_disable error path (git-fixes).\n - drm/ingenic: Fix incorrect assumption about plane->index (bsc#1152489)\n * refreshed for context changes\n - drm: mcde: Fix display initialization problem (git-fixes).\n - drm/mediatek: Check plane visibility in atomic_update (git-fixes).\n - drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n - drm/msm/dpu: allow initialization of encoder locks during encoder init\n (git-fixes).\n - drm/msm: fix potential memleak in error branch (git-fixes).\n - drm/nouveau/fbcon: fix module unload when fbcon init has failed for some\n reason (git-fixes).\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n - drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout\n (git-fixes).\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel\n (git-fixes).\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer\n S1003 (git-fixes).\n - drm/panel: otm8009a: Drop unnessary backlight_device_unregister()\n (git-fixes).\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n - drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n - drm/radeon: fix double free (git-fixes).\n - drm/stm: repair runtime power management (git-fixes).\n - drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n - drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).\n - drm/tegra: hub: Do not enable orphaned window group (git-fixes).\n - drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset()\n (bsc#1152489) \t* refreshed for context changes\n - drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).\n - exfat: add missing brelse() calls on error paths (git-fixes).\n - exfat: fix incorrect update of stream entry in __exfat_truncate()\n (git-fixes).\n - exfat: fix memory leak in exfat_parse_param() (git-fixes).\n - exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).\n - fbdev: Detect integer underflow at \"struct fbcon_ops\"->clear_margins\n (git-fixes).\n - firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).\n - firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).\n - firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).\n - firmware: Fix a reference count leak (git-fixes).\n - firmware_loader: fix memory leak for paged buffer (bsc#1175367).\n - firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n - firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n - firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).\n - firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and\n above (bsc#1174906).\n - firmware: smccc: Add the definition for SMCCCv1.2 version/error codes\n (bsc#1174906).\n - firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x\n instead (bsc#1174906).\n - firmware: smccc: Refactor SMCCC specific bits into separate file\n (bsc#1174906).\n - firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n - fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config\n file\n - fuse: copy_file_range should truncate cache (git-fixes).\n - fuse: fix copy_file_range cache issues (git-fixes).\n - fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).\n - fuse: fix weird page warning (bsc#1175175).\n - geneve: fix an uninitialized value in geneve_changelink() (git-fixes).\n - genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897\n ltc#187090).\n - genirq/affinity: Remove const qualifier from node_to_cpumask argument\n (bsc#1174897 ltc#187090).\n - genirq/affinity: Spread vectors on node according to nr_cpu ratio\n (bsc#1174897 ltc#187090).\n - gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n - gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0\n (bsc#1174825).\n - go7007: add sanity checking for endpoints (git-fixes).\n - gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n - gpio: arizona: put pm_runtime in case of failure (git-fixes).\n - gpio: max77620: Fix missing release of interrupt (git-fixes).\n - gpio: pca953x: disable regmap locking for automatic address incrementing\n (git-fixes).\n - gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).\n - gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2\n (git-fixes).\n - gpu: host1x: Detach driver on unregister (git-fixes).\n - habanalabs: increase timeout during reset (git-fixes).\n - HID: alps: support devices with report id 2 (git-fixes).\n - HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n - HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override\n (git-fixes).\n - HID: logitech-hidpp: avoid repeated \"multiplier = \" log messages\n (git-fixes).\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n - HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).\n - HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).\n - HID: quirks: Remove ITE 8595 entry from hid_have_special_driver\n (git-fixes).\n - HID: steam: fixes race in handling device list (git-fixes).\n - hippi: Fix a size used in a 'pci_free_consistent()' in an error handling\n path (git-fixes).\n - hwmon: (adm1275) Make sure we are reading enough data for different\n chips (git-fixes).\n - hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute\n (git-fixes).\n - hwmon: (nct6775) Accept PECI Calibration as temperature source for\n NCT6798D (git-fixes).\n - hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe()\n (git-fixes).\n - hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).\n - i2c: also convert placeholder function to return errno (git-fixes).\n - i2c: eg20t: Load module automatically if ID matches (git-fixes).\n - i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n - i2c: iproc: fix race between client unreg and isr (git-fixes).\n - i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).\n - i2c: rcar: avoid race when unregistering slave (git-fixes).\n - i2c: rcar: slave: only send STOP event when we have been addressed\n (git-fixes).\n - i2c: slave: add sanity check when unregistering (git-fixes).\n - i2c: slave: improve sanity check when registering (git-fixes).\n - i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).\n - i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).\n - i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).\n - i40iw: Report correct firmware version (git-fixes).\n - IB/cma: Fix ports memory leak in cma_configfs (git-fixes).\n - IB/core: Fix potential NULL pointer dereference in pkey cache\n (git-fixes).\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down\n (bsc#1174409).\n - IB/hfi1: Do not destroy link_wq when the device is shut down\n (bsc#1174409).\n - IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n - IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).\n - IB/hfi1: Fix memory leaks in sysfs registration and unregistration\n (git-fixes).\n - IB/hfi1: Fix module use count flaw due to leftover module put calls\n (bsc#1174407).\n - IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).\n - IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode\n (git-fixes).\n - IB/mad: Fix use after free when destroying MAD agent (git-fixes).\n - IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).\n - IB/mlx5: Fix 50G per lane indication (git-fixes).\n - IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command\n (git-fixes).\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device\n (git-fixes).\n - IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads\n (git-fixes).\n - ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n - IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).\n - IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).\n - IB/rdmavt: Delete unused routine (git-fixes).\n - IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE\n (bsc#1174770).\n - IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).\n - ide: Remove uninitialized_var() usage (git-fixes).\n - ieee802154: fix one possible memleak in adf7242_probe (git-fixes).\n - iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()'\n (git-fixes).\n - iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak\n (git-fixes).\n - iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).\n - iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).\n - iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n - iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).\n - iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe()\n (git-fixes).\n - iio:pressure:ms5611 Fix buffer element alignment (git-fixes).\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).\n - Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).\n - Input: elan_i2c - only increment wakeup count on touch (git-fixes).\n - Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).\n - Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).\n - Input: mms114 - add extra compatible for mms345l (git-fixes).\n - Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).\n - Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen\n (git-fixes).\n - integrity: remove redundant initialization of variable ret (git-fixes).\n - intel_th: Fix a NULL dereference when hub driver is not loaded\n (git-fixes).\n - intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n - intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n - intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n - io-mapping: indicate mapping failure (git-fixes).\n - iommu/arm-smmu-v3: Do not reserve implementation defined register space\n (bsc#1174126).\n - iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).\n - iommu/vt-d: Update scalable mode paging structure coherency\n (bsc#1174128).\n - ionic: centralize queue reset code (bsc#1167773).\n - ionic: fix up filter locks and debug msgs (bsc#1167773).\n - ionic: keep rss hash after fw update (bsc#1167773).\n - ionic: unlock queue mutex in error path (bsc#1167773).\n - ionic: update filter id after replay (bsc#1167773).\n - ionic: update the queue count on open (bsc#1167773).\n - ionic: use mutex to protect queue operations (bsc#1167773).\n - ionic: use offset for ethtool regs data (bsc#1167773).\n - irqchip/gic: Atomically update affinity (bsc#1175195).\n - kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch\n (bsc1174263).\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n - kABI: restore signature of xfrm_policy_bysel_ctx() and\n xfrm_policy_byid() (bsc#1174645).\n - kABI workaround for enum cpuhp_state (git-fixes).\n - kABI workaround for struct kvm_device (git-fixes). Just change an\n variable to \"const\" type in kvm_device.\n - kABI workaround for struct kvm_vcpu_arch (git-fixes).\n - kernel.h: remove duplicate include of asm/div64.h (git-fixes).\n - keys: asymmetric: fix error return code in software_key_query()\n (git-fixes).\n - kobject: Avoid premature parent object freeing in kobject_cleanup()\n (git-fixes).\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Annotate hyp NMI-related functions as __always_inline\n (bsc#1175190).\n - KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197\n jsc#SLE-13593).\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197\n jsc#SLE-13593).\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).\n - KVM: arm64: Support stolen time reporting via shared structure\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Support stolen time reporting via shared structure\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Use the correct timer structure to access the physical\n counter (bsc#1133021).\n - KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).\n - KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER\n (bsc#1133021).\n - KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).\n - KVM: nVMX: always update CR3 in VMCS (git-fixes).\n - KVM: Play nice with read-only memslots when querying host page size\n (bsc#1133021).\n - KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction\n (bsc#1133021).\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n - leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n - leds: core: Flush scheduled work for system suspend (git-fixes).\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n - leds: gpio: Fix semantic error (git-fixes).\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n - leds: lm36274: fix use-after-free on unbind (git-fixes).\n - leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n - libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses\n (bsc#1155518).\n - lib: Reduce user_access_begin() boundaries in strncpy_from_user() and\n strnlen_user() (bsc#1174331).\n - liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n - locktorture: Print ratio of acquisitions, not failures (bsc#1149032).\n - mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n - mac80211: fix misplaced while instead of if (git-fixes).\n - mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n - mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n - media: cec: silence shift wrapping warning in __cec_s_log_addrs()\n (git-fixes).\n - media: cxusb-analog: fix V4L2 dependency (git-fixes).\n - media: exynos4-is: Add missed check for pinctrl_lookup_state()\n (git-fixes).\n - media: firewire: Using uninitialized values in node_probe() (git-fixes).\n - media: marvell-ccic: Add missed v4l2_async_notifier_cleanup()\n (git-fixes).\n - media: media-request: Fix crash if memory allocation fails (git-fixes).\n - media: nuvoton-cir: remove setting tx carrier functions (git-fixes).\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for\n preview_init_entities() (git-fixes).\n - media: sur40: Remove uninitialized_var() usage (git-fixes).\n - media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).\n - mei: bus: do not clean driver pointer (git-fixes).\n - mfd: arizona: Ensure 32k clock is put on driver unbind and error\n (git-fixes).\n - mfd: dln2: Run event handler loop under spinlock (git-fixes).\n - mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).\n - mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3\n (bsc#1154488).\n - mlxsw: core: Use different get_trend() callbacks for different thermal\n zones (networking-stable-20_06_10).\n - mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed\n (git-fixes).\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type\n (git-fixes).\n - mm: Fix protection usage propagation (bsc#1174002).\n - mm/mmap.c: close race between munmap() and expand_upwards()/downwards()\n (bsc#1174527).\n - mtd: properly check all write ioctls for permissions (git-fixes).\n - mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).\n - mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).\n - mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).\n - mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).\n - mwifiex: Prevent memory corruption handling keys (git-fixes).\n - nbd: Fix memory leak in nbd_add_socket (git-fixes).\n - ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - net: be more gentle about silly gso requests coming from user\n (networking-stable-20_06_07).\n - net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).\n - net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n - netdevsim: fix unbalaced locking in nsim_create() (git-fixes).\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n - net: ena: add reserved PCI device ID (bsc#1174852).\n - net: ena: add support for reporting of packet drops (bsc#1174852).\n - net: ena: add support for the rx offset feature (bsc#1174852).\n - net: ena: add support for traffic mirroring (bsc#1174852).\n - net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n - net: ena: allow setting the hash function without changing the key\n (bsc#1174852).\n - net: ena: avoid memory access violation by validating req_id properly\n (bsc#1174852).\n - net: ena: avoid unnecessary admin command when RSS function set fails\n (bsc#1174852).\n - net: ena: avoid unnecessary rearming of interrupt vector when\n busy-polling (bsc#1174852).\n - net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n - net: ena: changes to RSS hash key allocation (bsc#1174852).\n - net: ena: cosmetic: change ena_com_stats_admin stats to u64\n (bsc#1174852).\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n - net: ena: cosmetic: extract code to ena_indirection_table_set()\n (bsc#1174852).\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n - net: ena: cosmetic: fix spelling and grammar mistakes in comments\n (bsc#1174852).\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n - net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n - net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h\n macros (bsc#1174852).\n - net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation()\n (bsc#1174852).\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n - net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n - net: ena: drop superfluous prototype (bsc#1174852).\n - net: ena: enable support of rss hash key and function changes\n (bsc#1174852).\n - net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n - net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n - net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n - net: ena: fix continuous keep-alive resets (bsc#1174852).\n - net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n - net: ena: fix error returning in ena_com_get_hash_function()\n (bsc#1174852).\n - net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n - net: ena: Fix using plain integer as NULL pointer in\n ena_init_napi_in_range (bsc#1174852).\n - net: ena: Make some functions static (bsc#1174852).\n - net: ena: move llq configuration from ena_probe to ena_device_init()\n (bsc#1174852).\n - net: ena: reduce driver load time (bsc#1174852).\n - net: ena: remove code that does nothing (bsc#1174852).\n - net: ena: remove set but not used variable 'hash_key' (bsc#1174852).\n - net: ena: rename ena_com_free_desc to make API more uniform\n (bsc#1174852).\n - net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n - net: ena: support new LLQ acceleration mode (bsc#1174852).\n - net: ena: use explicit variable size for clarity (bsc#1174852).\n - net: ena: use SHUTDOWN as reset reason when closing interface\n (bsc#1174852).\n - net_failover: fixed rollback in net_failover_open()\n (networking-stable-20_06_10).\n - netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c\n (bsc#1171857).\n - netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and\n exit helpers (bsc#1171857).\n - netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c\n (bsc#1171857).\n - netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit\n helpers (bsc#1171857).\n - net: Fix a documentation bug wrt. ip_unprivileged_port_start\n (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n - net: fsl/fman: treat all RGMII modes in memac_adjust_link()\n (bsc#1174398).\n - net: hns3: check reset pending after FLR prepare (bsc#1154353).\n - net: hns3: fix error handling for desc filling (git-fixes).\n - net: hns3: fix for not calculating TX BD send size correctly (git-fixes).\n - net: hns3: fix return value error when query MAC link status fail\n (git-fixes).\n - net: ipv4: Fix wrong type conversion from hint to rt in\n ip_route_use_hint() (bsc#1154353).\n - net: lan78xx: add missing endpoint sanity check (git-fixes).\n - net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n - net: lan78xx: replace bogus endpoint lookup (git-fixes).\n - net: macb: call pm_runtime_put_sync on failure path (git-fixes).\n - net/mlx5: drain health workqueue in case of driver load error\n (networking-stable-20_06_16).\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash\n (jsc#SLE-8464).\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash\n (jsc#SLE-8464).\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev\n (jsc#SLE-8464).\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev\n (jsc#SLE-8464).\n - net/mlx5e: Fix repeated XSK usage on one channel\n (networking-stable-20_06_16).\n - net/mlx5e: Fix VXLAN configuration restore after function reload\n (jsc#SLE-8464).\n - net/mlx5e: Fix VXLAN configuration restore after function reload\n (jsc#SLE-8464).\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode\n (jsc#SLE-8464).\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode\n (jsc#SLE-8464).\n - net/mlx5: Fix fatal error handling during device load\n (networking-stable-20_06_16).\n - net: phy: Check harder for errors in get_phy_id() (git-fixes).\n - net: phy: fix memory leak in device-create error path (git-fixes).\n - net: phy: realtek: add support for configuring the RX delay on RTL8211F\n (bsc#1174398).\n - net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).\n - net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).\n - net/smc: fix restoring of fallback changes (git-fixes).\n - net: stmmac: do not attach interface until resume finishes (bsc#1174072).\n - net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).\n - net: stmmac: dwc-qos: use generic device api (bsc#1174072).\n - net: stmmac: enable timestamp snapshot for required PTP packets in dwmac\n v5.10a (networking-stable-20_06_07).\n - net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).\n - net/tls: fix encryption error checking (git-fixes).\n - net/tls: free record only on encryption error (git-fixes).\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n - nfc: nci: add missed destroy_workqueue in nci_register_device\n (git-fixes).\n - nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame\n (git-fixes).\n - nfp: flower: fix used time of merge flow statistics\n (networking-stable-20_06_07).\n - NFS: Fix interrupted slots by sending a solo SEQUENCE operation\n (bsc#1174264).\n - NTB: Fix static check warning in perf_clear_test (git-fixes).\n - NTB: Fix the default port and peer numbers for legacy drivers\n (git-fixes).\n - ntb: hw: remove the code that sets the DMA mask (git-fixes).\n - NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).\n - NTB: ntb_test: Fix bug when counting remote files (git-fixes).\n - NTB: ntb_tool: reading the link file should not end in a NULL byte\n (git-fixes).\n - NTB: perf: Do not require one more memory window than number of peers\n (git-fixes).\n - NTB: perf: Fix race condition when run with ntb_test (git-fixes).\n - NTB: perf: Fix support for hardware that does not have port numbers\n (git-fixes).\n - ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).\n - NTB: Revert the change to use the NTB device dev for DMA allocations\n (git-fixes).\n - ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n - ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n - ocfs2: load global_inode_alloc (bsc#1172963).\n - omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).\n - ovl: inode reference leak in ovl_is_inuse true case (git-fixes).\n - padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).\n - padata: kABI fixup for struct padata_instance splitting nodes\n (git-fixes).\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership\n (bsc#1174356).\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n - PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).\n - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge\n (git-fixes).\n - PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register\n (git-fixes).\n - PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n - PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context()\n (git-fixes).\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2\n (bsc#1172201).\n - PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n - PCI: qcom: Add missing reset for ipq806x (git-fixes).\n - PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n - PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n - PCI: rcar: Fix runtime PM imbalance on error (git-fixes).\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n - PCI: switchtec: Add missing __iomem and __user tags to fix sparse\n warnings (git-fixes).\n - PCI: switchtec: Add missing __iomem tag to fix sparse warnings\n (git-fixes).\n - PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).\n - percpu: Separate decrypted varaibles anytime encryption can be enabled\n (bsc#1174332).\n - phy: armada-38x: fix NETA lockup when repeatedly switching speeds\n (git-fixes).\n - phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY\n (git-fixes).\n - phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).\n - phy: sun4i-usb: fix dereference of pointer phy0 before it is null\n checked (git-fixes).\n - pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n - pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n - pinctrl: single: fix function name in documentation (git-fixes).\n - pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n - platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).\n - platform/x86: intel-hid: Fix return value check in check_acpi_dev()\n (git-fixes).\n - platform/x86: intel-vbtn: Fix return value check in check_acpi_dev()\n (git-fixes).\n - platform/x86: ISST: Increase timeout (bsc#1174185).\n - PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).\n - powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n - powerpc: Allow 4224 bytes of stack expansion for the signal frame\n (bsc#1065729).\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable\n pkey (bsc#1065729).\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu feature\n (bsc#1065729).\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n - powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n - powerpc/fadump: fix race between pstore write and fadump crash trigger\n (bsc#1168959 ltc#185010).\n - powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).\n - powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n - powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl()\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/pseries/hotplug-cpu: Remove double free in error path\n (bsc#1065729).\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n - powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n - powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n - power: supply: check if calc_soc succeeded in pm860x_init_battery\n (git-fixes).\n - pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n - qed: suppress \"do not support RoCE & iWARP\" flooding on HW init\n (git-fixes).\n - qed: suppress false-positives interrupt error messages on HW init\n (git-fixes).\n - r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).\n - r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).\n - r8169: fix resume on cable plug-in (bsc#1175296).\n - r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).\n - r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init\n (bsc#1175296).\n - r8169: read common register for PCI commit (bsc#1175296).\n - random32: move the pseudo-random 32-bit definitions to prandom.h\n (git-fixes).\n - random32: remove net_rand_state from the latent entropy gcc plugin\n (git-fixes).\n - random: fix circular include dependency on arm64 after addition of\n percpu.h (git-fixes).\n - RDMA/cm: Add missing locking around id.state in cm_dup_req_handler\n (git-fixes).\n - RDMA/cma: Protect bind_list and listen_list while finding matching cm id\n (git-fixes).\n - RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).\n - RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).\n - RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id()\n (git-fixes).\n - RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).\n - RDMA/cm: Remove a race freeing timewait_info (git-fixes).\n - RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow\n (git-fixes).\n - RDMA/core: Fix double destruction of uobject (git-fixes).\n - RDMA/core: Fix double put of resource (git-fixes).\n - RDMA/core: Fix missing error check on dev_set_name() (git-fixes).\n - RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).\n - RDMA/core: Fix race between destroy and release FD object (git-fixes).\n - RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).\n - RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).\n - RDMA/counter: Query a counter before release (git-fixes).\n - RDMA/efa: Set maximum pkeys device attribute (git-fixes).\n - RDMA/hns: Bugfix for querying qkey (git-fixes).\n - RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).\n - RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n - RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).\n - RDMA/mad: Do not crash if the rdma device does not have a umad interface\n (git-fixes).\n - RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads()\n (git-fixes).\n - RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n - RDMA/mlx5: Add init2init as a modify command (git-fixes).\n - RDMA/mlx5: Fix access to wrong pointer while performing flush due to\n error (git-fixes).\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails\n (jsc#SLE-8446).\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails\n (jsc#SLE-8446).\n - RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).\n - RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction\n (jsc#SLE-8446).\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction\n (jsc#SLE-8446).\n - RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).\n - RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).\n - RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).\n - RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing\n (git-fixes).\n - RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).\n - RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532\n (git-fixes).\n - RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).\n - RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).\n - RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).\n - RDMA/rxe: Set default vendor ID (git-fixes).\n - RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices\n (git-fixes).\n - RDMA/siw: Fix failure handling during device creation (git-fixes).\n - RDMA/siw: Fix passive connection establishment (git-fixes).\n - RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).\n - RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr()\n (git-fixes).\n - RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n - RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n - RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).\n - RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).\n - RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).\n - regmap: debugfs: check count when read regmap file (git-fixes).\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps\n (git-fixes).\n - regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n - regmap: fix alignment issue (git-fixes).\n - regmap: Fix memory leak from regmap_register_patch (git-fixes).\n - regulator: gpio: Honor regulator-boot-on property (git-fixes).\n - remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load\n (git-fixes).\n - remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load\n (git-fixes).\n - remoteproc: qcom: q6v5: Update running state before requesting stop\n (git-fixes).\n - Revert \"ALSA: hda: call runtime_allow() for all hda controllers\"\n (git-fixes).\n - Revert \"drm/amd/display: Expose connector VRR range via debugfs\"\n (bsc#1152489) \t* refreshed for context changes\n - Revert \"drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\"\n (git-fixes).\n - Revert \"i2c: cadence: Fix the hold bit setting\" (git-fixes).\n - Revert \"RDMA/cma: Simplify rdma_resolve_addr() error flow\" (git-fixes).\n - Revert \"thermal: mediatek: fix register index error\" (git-fixes).\n - rhashtable: Document the right function parameters (bsc#1174880).\n - rhashtable: drop duplicated word in <linux/rhashtable.h>\n (bsc#1174880).\n - rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).\n - rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).\n - rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).\n - RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen()\n (git-fixes).\n - rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for\n podman or docker builds when no more specific driver can be used (like\n lvm or btrfs). As the default build fs is ext4 currently, we need\n overlayfs kernel modules to be available.\n - rpm/modules.fips: add ecdh_generic (boo#1173813)\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails\n (bsc#1154353).\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n - rtw88: fix LDPC field for RA info (git-fixes).\n - rtw88: fix short GI capability based on current bandwidth (git-fixes).\n - s390: fix syscall_get_error for compat processes (git-fixes).\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n - s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).\n - s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n - s390/qdio: put thinint indicator after early error (git-fixes).\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n - sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot\n (jsc#SLE-13654).\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot\n (jsc#SLE-13654).\n - scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow\n (jsc#SLE-13654).\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow\n (jsc#SLE-13654).\n - scsi: libfc: free response frame from GPN_ID (bsc#1173849).\n - scsi: libfc: Handling of extra kref (bsc#1173849).\n - scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).\n - scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted\n (bsc#1173849).\n - scsi: libfc: Skip additional kref updating work event (bsc#1173849).\n - scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).\n - scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action\n (git-fixes).\n - selftests/net: in rxtimestamp getopt_long needs terminating null entry\n (networking-stable-20_06_16).\n - selinux: fall back to ref-walk if audit is required (bsc#1174333).\n - selinux: revert \"stop passing MAY_NOT_BLOCK to the AVC upon follow_link\"\n (bsc#1174333).\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n - serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).\n - serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).\n - serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).\n - serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).\n - serial: amba-pl011: Make sure we initialize the port.lock spinlock\n (git-fixes).\n - serial: exar: Fix GPIO configuration for Sealevel cards based on\n XR17V35X (git-fixes).\n - serial: mxs-auart: add missed iounmap() in probe failure and remove\n (git-fixes).\n - serial: tegra: fix CREAD handling for PIO (git-fixes).\n - SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n - soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).\n - soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).\n - spi: davinci: Remove uninitialized_var() usage (git-fixes).\n - spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n - spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).\n - spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).\n - spi: rockchip: Fix error in SPI slave pio read (git-fixes).\n - spi: spidev: fix a potential use-after-free in spidev_release()\n (git-fixes).\n - spi: spidev: fix a race between spidev_release and spidev_remove\n (git-fixes).\n - spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate\n (git-fixes).\n - spi: sun4i: update max transfer size reported (git-fixes).\n - staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift\n (git-fixes).\n - staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift\n (git-fixes).\n - staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift\n (git-fixes).\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support\n (git-fixes).\n - staging: comedi: verify array index is correct before using it\n (git-fixes).\n - Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode\n (git-fixes).\n - staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n - staging: rtl8712: handle firmware load failure (git-fixes).\n - staging: vchiq_arm: Add a matching unregister call (git-fixes).\n - staging: wlan-ng: properly check endpoint types (git-fixes).\n - SUNRPC dont update timeout value on connection reset (bsc#1174263).\n - sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n - tcp: md5: allow changing MD5 keys in all socket states (git-fixes).\n - thermal/drivers: imx: Fix missing of_node_put() at probe time\n (git-fixes).\n - thermal: int3403_thermal: Downgrade error message (git-fixes).\n - thermal: ti-soc-thermal: Fix reversed condition in\n ti_thermal_expose_sensor() (git-fixes).\n - tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n - tpm: Require that all digests are present in TCG_PCR_EVENT2 structures\n (git-fixes).\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init\n (git-fixes).\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n - ubsan: check panic_on_warn (bsc#1174805).\n - udp: Copy has_conns in reuseport_grow() (git-fixes).\n - udp: Improve load balancing for SO_REUSEPORT (git-fixes).\n - uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).\n - USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).\n - usb: chipidea: core: add wakeup support for extcon (git-fixes).\n - usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).\n - usb: dwc2: Fix shutdown callback in platform (git-fixes).\n - usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n - usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).\n - usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant\n (git-fixes).\n - usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work\n (git-fixes).\n - usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).\n - usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength\n (git-fixes).\n - usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk\n (git-fixes).\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable()\n (git-fixes).\n - usb: gadget: udc: gr_udc: fix memleak on error handling path in\n gr_ep_init() (git-fixes).\n - usb: hso: check for return value in hso_serial_common_create()\n (git-fixes).\n - usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n - USB: iowarrior: fix up report size handling for some devices (git-fixes).\n - usbip: tools: fix module name in man page (git-fixes).\n - usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).\n - USB: serial: ch341: add new Product ID for CH340 (git-fixes).\n - USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n - USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n - USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).\n - USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n - USB: serial: iuu_phoenix: fix memory corruption (git-fixes).\n - USB: serial: option: add GosunCn GM500 series (git-fixes).\n - USB: serial: option: add Quectel EG95 LTE modem (git-fixes).\n - USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n - usb: tegra: Fix allocation for the FPCI context (git-fixes).\n - usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n - usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).\n - video: fbdev: sm712fb: fix an issue about iounmap for a wrong address\n (git-fixes).\n - video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()'\n call (git-fixes).\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc\n serial (git-fixes).\n - virt: vbox: Fix guest capabilities mask check (git-fixes).\n - virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to\n match upstream (git-fixes).\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n - vt: Reject zero-sized screen buffer size (git-fixes).\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid\n options (networking-stable-20_06_10).\n - watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in\n watchdog_info.options (git-fixes).\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info option\n (git-fixes).\n - watchdog: initialize device before misc_register (git-fixes).\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n - wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n - wireless: Use offsetof instead of custom macro (git-fixes).\n - wl1251: fix always return 0 error (git-fixes).\n - workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).\n - xen/pvcalls-back: test for errors when calling backend_connect()\n (bsc#1065600).\n - xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).\n - xfrm: policy: match with both mark and mask on user interfaces\n (bsc#1174645).\n - xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork\n (git-fixes).\n - xfs: fix inode allocation block res calculation precedence (git-fixes).\n - xfs: fix reflink quota reservation accounting error (git-fixes).\n - xfs: preserve rmapbt swapext block reservation from freed blocks\n (git-fixes).\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.2:\n\n zypper in -t patch openSUSE-2020-1236=1", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-08-21T00:00:00", "type": "suse", "title": "Security update for the Linux Kernel (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10781", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-15780", "CVE-2020-16166"], "modified": "2020-08-21T00:00:00", "id": "OPENSUSE-SU-2020:1236-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RZBOHACFHPZE53IZN4OJDZ5XKOOT76WT/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-04-18T12:41:17", "description": "An update that solves 25 vulnerabilities and has 132 fixes\n is now available.\n\nDescription:\n\n\n\n The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other than\n the one which called it. This attack is known as Special Register Buffer\n Data Sampling (SRBDS) or \"CrossTalk\" (bsc#1154824).\n - CVE-2018-1000199: Fixed a potential local code execution via ptrace\n (bsc#1089895).\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n - CVE-2019-20806: Fixed a null pointer dereference in\n tw5864_handle_frame() which may had lead to denial of service\n (bsc#1172199).\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\n video driver. This could lead to local information disclosure with\n System execution privileges needed (bsc#1170345).\n - CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev\n (bsc#1170056).\n - CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem\n which could have allowed a remote network user to crash the kernel\n resulting in a denial of service (bsc#1171191).\n - CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n (bsc#1170778).\n - CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\n uninitialized data (bsc#1171220).\n - CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\n where it was assumed that an skb would only contain a single netlink\n message (bsc#1171189).\n - CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap\n could have caused user PTE access (bsc#1172317).\n - CVE-2020-11608: An issue was discovered in\n drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences\n in ov511_mode_init_regs and ov518_mode_init_regs when there are zero\n endpoints, aka CID-998912346c0d (bnc#1168829).\n - CVE-2020-11609: An issue was discovered in the stv06xx subsystem in\n drivers/media/usb/gspca/stv06xx/stv06xx.c and\n drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid\n descriptors, as demonstrated by a NULL pointer dereference, aka\n CID-485b06aadb93 (bnc#1168854).\n - CVE-2020-12114: Fixed a pivot_root race condition which could have\n allowed local users to cause a denial of service (panic) by corrupting a\n mountpoint reference counter (bsc#1171098).\n - CVE-2020-12464: Fixed a use-after-free due to a transfer without a\n reference (bsc#1170901).\n - CVE-2020-12652: Fixed an issue which could have allowed local users to\n hold an incorrect lock during the ioctl operation and trigger a race\n condition (bsc#1171218).\n - CVE-2020-12653: Fixed an issue in the wifi driver which could have\n allowed local users to gain privileges or cause a denial of service\n (bsc#1171195).\n - CVE-2020-12654: Fixed an issue in he wifi driver which could have\n allowed a remote AP to trigger a heap-based buffer overflow\n (bsc#1171202).\n - CVE-2020-12655: Fixed an issue which could have allowed attackers to\n trigger a sync of excessive duration via an XFS v5 image with crafted\n metadata (bsc#1171217).\n - CVE-2020-12656: Fixed an improper handling of certain domain_release\n calls leadingch could have led to a memory leak (bsc#1171219).\n - CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n - CVE-2020-12659: Fixed an out-of-bounds write (by a user with the\n CAP_NET_ADMIN capability) due to improper headroom validation\n (bsc#1171214).\n - CVE-2020-12769: Fixed an issue which could have allowed attackers to\n cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one\n (bsc#1171983).\n - CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store\n in drivers/usb/gadget/configfs.c (bsc#1171982).\n\n The following non-security bugs were fixed:\n\n - ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe()\n (bsc#1051510).\n - ACPI: sysfs: Fix reference count leak in\n acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n - acpi/x86: ignore unspecified bit positions in the ACPI global lock field\n (bsc#1051510).\n - Add br_netfilter to kernel-default-base (bsc#1169020)\n - agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n - ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n - ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256\n (bsc#1051510).\n - ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n - ALSA: hda: Add driver blacklist (bsc#1051510).\n - ALSA: hda: Always use jackpoll helper for jack update after resume\n (bsc#1051510).\n - ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n - ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n - ALSA: hda: Explicitly permit using autosuspend if runtime PM is\n supported (bsc#1051510).\n - ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n - ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n - ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops\n (bsc#1051510).\n - ALSA: hda: Keep the controller initialization even if no codecs found\n (bsc#1051510).\n - ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n - ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround\n (bsc#1172017).\n - ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA\n (git-fixes).\n - ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n - ALSA: hda/realtek - Add more fixup entries for Clevo machines\n (git-fixes).\n - ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n - ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n - ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n - ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n - ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295\n (git-fixes).\n - ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295\n (git-fixes).\n - ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295\n (git-fixes).\n - ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n - ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme\n (bsc#1111666).\n - ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes\n bsc#1171293).\n - ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n - ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n - ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n - ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio\n option (git-fixes).\n - ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n - ALSA: pcm: oss: Place the plugin buffer overflow checks correctly\n (bsc#1170522).\n - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses\n (git-fixes).\n - ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n - ALSA: usb-audio: Add control message quirk delay for Kingston HyperX\n headset (git-fixes).\n - ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n - ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n - ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n - ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos\n (bsc#1051510).\n - ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen\n (bsc#1051510).\n - ALSA: usb-audio: Check mapping at creating connector controls, too\n (bsc#1051510).\n - ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n - ALSA: usb-audio: Do not create jack controls for PCM terminals\n (bsc#1051510).\n - ALSA: usb-audio: Do not override ignore_ctl_error value from the map\n (bsc#1051510).\n - ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n - ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif\n (bsc#1051510).\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC\n (git-fixes).\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio\n (git-fixes).\n - ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n - ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry\n (bsc#1051510).\n - ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n - ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n - ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n - ASoC: fix regwmask (bsc#1051510).\n - ASoC: msm8916-wcd-digital: Reset RX interpolation path after use\n (bsc#1051510).\n - ASoC: samsung: Prevent clk_get_rate() calls in atomic context\n (bsc#1111666).\n - ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n - ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n - b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n - batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_show_throughput_override\n (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_store_throughput_override\n (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n - bcache: avoid unnecessary btree nodes flushing in btree_flush_write()\n (git fixes (block drivers)).\n - bcache: fix incorrect data type usage in btree_flush_write() (git fixes\n (block drivers)).\n - bcache: Revert \"bcache: shrink btree node cache after bch_btree_check()\"\n (git fixes (block drivers)).\n - blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n - blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n - block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n - block: drbd: remove a stray unlock in __drbd_send_protocol()\n (bsc#1171599).\n - block: fix busy device checking in blk_drop_partitions again\n (bsc#1171948).\n - block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n - block: fix memleak of bio integrity data (git fixes (block drivers)).\n - block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n - bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets()\n (networking-stable-20_03_28).\n - bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF\n (bsc#1104745).\n - bnxt_en: reinitialize IRQs when MTU is modified\n (networking-stable-20_03_14).\n - bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n - bnxt_en: Return error when allocating zero size context memory\n (bsc#1104745).\n - bonding/alb: make sure arp header is pulled before accessing it\n (networking-stable-20_03_14).\n - bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n - bpf: Forbid XADD on spilled pointers for unprivileged users\n (bsc#1083647).\n - brcmfmac: abort and release host after error (bsc#1051510).\n - btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n - btrfs: fix log context list corruption after rename whiteout error\n (bsc#1172342).\n - btrfs: fix partial loss of prealloc extent past i_size after fsync\n (bsc#1172343).\n - btrfs: relocation: add error injection points for cancelling balance\n (bsc#1171417).\n - btrfs: relocation: Check cancel request after each data page read\n (bsc#1171417).\n - btrfs: relocation: Check cancel request after each extent found\n (bsc#1171417).\n - btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to\n prevent runaway balance (bsc#1171417).\n - btrfs: relocation: Fix reloc root leakage and the NULL pointer reference\n caused by the leakage (bsc#1171417).\n - btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent\n runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: reloc: fix reloc root leak and NULL pointer dereference\n (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: setup a nofs context for memory allocation at btrfs_create_tree()\n (bsc#1172127).\n - btrfs: setup a nofs context for memory allocation at __btrfs_set_acl\n (bsc#1172127).\n - btrfs: use nofs context when initializing security xattrs to avoid\n deadlock (bsc#1172127).\n - can: add missing attribute validation for termination\n (networking-stable-20_03_14).\n - cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n - cdc-acm: introduce a cool down (git-fixes).\n - ceph: check if file lock exists before sending unlock request\n (bsc#1168789).\n - ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n - ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n - ceph: fix endianness bug when handling MDS session feature bits\n (bsc#1171695).\n - cgroup, netclassid: periodically release file_lock on classid updating\n (networking-stable-20_03_14).\n - cifs: Allocate crypto structures on the fly for calculating signatures\n of incoming packets (bsc#1144333).\n - cifs: Allocate encryption header through kmalloc (bsc#1144333).\n - cifs: allow unlock flock and OFD lock across fork (bsc#1144333).\n - cifs: check new file size when extending file by fallocate (bsc#1144333).\n - cifs: cifspdu.h: Replace zero-length array with flexible-array member\n (bsc#1144333).\n - cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n - cifs: do not share tcons with DFS (bsc#1144333).\n - cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n - cifs: ensure correct super block for DFS reconnect (bsc#1144333).\n - cifs: Fix bug which the return value by asynchronous read is error\n (bsc#1144333).\n - cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n - cifs: improve read performance for page size 64KB & cache=strict &\n vers=2.1+ (bsc#1144333).\n - cifs: Increment num_remote_opens stats counter even in case of\n smb2_query_dir_first (bsc#1144333).\n - cifs: minor update to comments around the cifs_tcp_ses_lock mutex\n (bsc#1144333).\n - cifs: protect updating server->dstaddr with a spinlock (bsc#1144333).\n - cifs: smb2pdu.h: Replace zero-length array with flexible-array member\n (bsc#1144333).\n - cifs: smbd: Calculate the correct maximum packet size for segmented\n SMBDirect send/receive (bsc#1144333).\n - cifs: smbd: Check and extend sender credits in interrupt context\n (bsc#1144333).\n - cifs: smbd: Check send queue size before posting a send (bsc#1144333).\n - cifs: smbd: Do not schedule work to send immediate packet on every\n receive (bsc#1144333).\n - cifs: smbd: Merge code to track pending packets (bsc#1144333).\n - cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).\n - cifs: smbd: Update receive credits before sending and deal with credits\n roll back on failure before sending (bsc#1144333).\n - cifs: Warn less noisily on default mount (bsc#1144333).\n - clk: Add clk_hw_unregister_composite helper function definition\n (bsc#1051510).\n - clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n - clk: imx: make mux parent strings const (bsc#1051510).\n - clk: mediatek: correct the clocks for MT2701 HDMI PHY module\n (bsc#1051510).\n - clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n - clocksource/drivers/hyper-v: Set TSC clocksource as default w/\n InvariantTSC (bsc#1170620, bsc#1170621).\n - clocksource: dw_apb_timer_of: Fix missing clockevent timers\n (bsc#1051510).\n - component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n - coresight: do not use the BIT() macro in the UAPI header (git fixes\n (block drivers)).\n - cpufreq: s3c64xx: Remove pointless NULL check in\n s3c64xx_cpufreq_driver_init (bsc#1051510).\n - crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n - crypto: ccp - Clean up and exit correctly on allocation failure\n (git-fixes).\n - crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n - crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n - cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n - cxgb4: fix Txq restart check during backpressure (bsc#1127354\n bsc#1127371).\n - debugfs: Add debugfs_create_xul() for hexadecimal unsigned long\n (git-fixes).\n - debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n - devlink: fix return value after hitting end in region read (bsc#1109837).\n - devlink: validate length of param values (bsc#1109837).\n - devlink: validate length of region addr/len (bsc#1109837).\n - dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n - dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n - dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n - dm writecache: fix data corruption when reloading the target (git fixes\n (block drivers)).\n - dm writecache: fix incorrect flush sequence when doing SSD mode commit\n (git fixes (block drivers)).\n - dm writecache: verify watermark during resume (git fixes (block\n drivers)).\n - dm zoned: fix invalid memory access (git fixes (block drivers)).\n - dm zoned: reduce overhead of backing device checks (git fixes (block\n drivers)).\n - dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git\n fixes (block drivers)).\n - dm zoned: support zone sizes smaller than 128MiB (git fixes (block\n drivers)).\n - dp83640: reverse arguments to list_add_tail (git-fixes).\n - drivers: hv: Add a module description line to the hv_vmbus driver\n (bsc#1172249, bsc#1172251).\n - drivers/net/ibmvnic: Update VNIC protocol version reporting\n (bsc#1065729).\n - drivers: w1: add hwmon support structures (jsc#SLE-11048).\n - drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n - drivers: w1: refactor w1_slave_show to make the temp reading\n functionality separate (jsc#SLE-11048).\n - drm: amd/acp: fix broken menu structure (bsc#1114279)\n - drm/amdgpu: Correctly initialize thermal controller for GPUs with\n Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n - drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n - drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is\n (bsc#1113956)\n - drm/atomic: Take the atomic toys away from X (bsc#1112178) \t* context\n changes\n - drm/crc: Actually allow to change the crc source (bsc#1114279) \t* offset\n changes\n - drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n - drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n - drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n - drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n - drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround\n (bsc#1112178)\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of\n (bsc#1114279)\n - drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)\n - drm/i915: properly sanity check batch_start_offset (bsc#1114279)\n - drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n - drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem\n (bsc#1114279)\n - drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n - drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n - drm/qxl: qxl_release use after free (bsc#1051510).\n - drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)\n - drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n - drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n - drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)\n - drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)\n - dump_stack: avoid the livelock of the dump_lock (git fixes (block\n drivers)).\n - EDAC, sb_edac: Add support for systems with segmented PCI buses\n (bsc#1169525).\n - ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n - ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n - ext4: use non-movable memory for superblock readahead (bsc#1171952).\n - fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n - fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)\n - fib: add missing attribute validation for tun_id\n (networking-stable-20_03_14).\n - firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n - Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root()\n modification is not needed due to missing dependency\n - Following two patches needs to be combined as one commit (one adds\n context, later removes which affects existing patch) else commit series\n cannot be sequenced.\n - fpga: dfl: afu: Corrected error handling levels (git-fixes).\n - fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n - fs/seq_file.c: simplify seq_file iteration code and interface\n (bsc#1170125).\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n - gre: fix uninit-value in __iptunnel_pull_header\n (networking-stable-20_03_14).\n - HID: hid-input: clear unmapped usages (git-fixes).\n - HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n - HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\n (git-fixes).\n - HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n - HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n - HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices\n (git-fixes).\n - hrtimer: Annotate lockless access to timer->state (git fixes (block\n drivers)).\n - hsr: add restart routine into hsr_get_node_list()\n (networking-stable-20_03_28).\n - hsr: check protocol version in hsr_newlink()\n (networking-stable-20_04_17).\n - hsr: fix general protection fault in hsr_addr_is_self()\n (networking-stable-20_03_28).\n - hsr: set .netnsok flag (networking-stable-20_03_28).\n - hsr: use rcu_read_lock() in hsr_get_node_{list/status}()\n (networking-stable-20_03_28).\n - i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present\n (git-fixes).\n - i2c: acpi: put device when verifying client fails (git-fixes).\n - i2c: brcmstb: remove unused struct member (git-fixes).\n - i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n - i2c: core: decrease reference count of device node in\n i2c_unregister_device (git-fixes).\n - i2c: dev: Fix the race between the release of i2c_dev and cdev\n (bsc#1051510).\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n - i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array\n (git-fixes).\n - i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n - i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n - i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n - i2c: mux: demux-pinctrl: Fix an error handling path in\n 'i2c_demux_pinctrl_probe()' (bsc#1051510).\n - i2c: st: fix missing struct parameter description (bsc#1051510).\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device\n (bsc#1103991).\n - ibmvnic: Skip fatal error reset after passive init (bsc#1171078\n ltc#184239).\n - iio:ad7797: Use correct attribute_group (bsc#1051510).\n - iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n - iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n - iio: adc: stm32-adc: Use dma_request_chan() instead\n dma_request_slave_channel() (bsc#1051510).\n - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()'\n (bsc#1051510).\n - iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).\n - iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n - iio: xilinx-xadc: Fix clearing interrupt when enabling trigger\n (bsc#1051510).\n - iio: xilinx-xadc: Fix sequencer configuration for aux channels in\n simultaneous mode (bsc#1051510).\n - ima: Fix return value of ima_write_policy() (git-fixes).\n - input: evdev - call input_flush_device() on release(), not flush()\n (bsc#1051510).\n - input: hyperv-keyboard - add module description (bsc#1172249,\n bsc#1172251).\n - input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n - input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n - input: raydium_i2c_ts - use true and false for boolean values\n (bsc#1051510).\n - input: synaptics-rmi4 - fix error return code in rmi_driver_probe()\n (bsc#1051510).\n - input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n - input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n - input: xpad - add custom init packet for Xbox One S controllers\n (bsc#1051510).\n - iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n - iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n - iommu/amd: Do not loop forever when trying to increase address space\n (bsc#1172098).\n - iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system\n (bsc#1172099).\n - iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n - iommu/amd: Fix race in increase_address_space()/fetch_pte()\n (bsc#1172102).\n - iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n - iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n - ip6_tunnel: Allow rcv/xmit even if remote address is a local address\n (bsc#1166978).\n - ipmi: fix hung processes in __get_guid() (git-fixes).\n - ipv4: fix a RCU-list lock in fib_triestat_seq_show\n (networking-stable-20_04_02).\n - ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface\n (networking-stable-20_03_14).\n - ipv6: do not auto-add link-local address to lag ports\n (networking-stable-20_04_09).\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n - ipv6: Fix nlmsg_flags when splitting a multipath route\n (networking-stable-20_03_01).\n - ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n - ipv6: Fix route replacement with dev-only route\n (networking-stable-20_03_01).\n - ipvlan: add cond_resched_rcu() while processing muticast backlog\n (networking-stable-20_03_14).\n - ipvlan: do not deref eth hdr before checking it's set\n (networking-stable-20_03_14).\n - ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast()\n (networking-stable-20_03_14).\n - iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n - ixgbe: do not check firmware errors (bsc#1170284).\n - kABI fix for early XHCI debug (git-fixes).\n - kabi for for md: improve handling of bio with REQ_PREFLUSH in\n md_flush_request() (git-fixes).\n - kabi/severities: Do not track KVM internal symbols.\n - kabi/severities: Ingnore get_dev_data() The function is internal to the\n AMD IOMMU driver and must not be called by any third party.\n - kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n - keys: reaching the keys quotas correctly (bsc#1051510).\n - KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n - KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n - KVM: Check validity of resolved slot when searching memslots\n (bsc#1172104).\n - KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n - KVM: s390: vsie: Fix possible race when shadowing region 3 tables\n (git-fixes).\n - KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks\n (git-fixes).\n - KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n - KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs\n (bsc#1152489).\n - l2tp: Allow management of tunnels and session in user namespace\n (networking-stable-20_04_17).\n - libata: Remove extra scsi_host_put() in ata_scsi_add_hosts()\n (bsc#1051510).\n - libata: Return correct status in sata_pmp_eh_recover_pm() when\n ATA_DFLAG_DETACH is set (bsc#1051510).\n - lib: raid6: fix awk build warnings (git fixes (block drivers)).\n - lib/raid6/test: fix build on distros whose /bin/sh is not bash (git\n fixes (block drivers)).\n - lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes\n (block drivers)).\n - locks: print unsigned ino in /proc/locks (bsc#1171951).\n - mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n - mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n - mac80211: mesh: fix discovery timer re-arming issue / crash\n (bsc#1051510).\n - macsec: avoid to set wrong mtu (bsc#1051510).\n - macsec: restrict to ethernet devices (networking-stable-20_03_28).\n - macvlan: add cond_resched() during multicast processing\n (networking-stable-20_03_14).\n - macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n - md: improve handling of bio with REQ_PREFLUSH in md_flush_request()\n (git-fixes).\n - md/raid0: Fix an error message in raid0_make_request() (git fixes (block\n drivers)).\n - md/raid10: prevent access of uninitialized resync_pages offset\n (git-fixes).\n - media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n - media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n - media: ti-vpe: cal: fix disable_irqs to only the intended target\n (git-fixes).\n - mei: release me_cl object reference (bsc#1051510).\n - mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n - mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE\n (networking-stable-20_04_09).\n - mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n - mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n - mmc: core: Check request type before completing the request (git-fixes).\n - mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n - mmc: cqhci: Avoid false \"cqhci: CQE stuck on\" by not open-coding timeout\n loop (git-fixes).\n - mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n - mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n - mmc: meson-gx: simplify interrupt handler (git-fixes).\n - mmc: renesas_sdhi: limit block count to 16 bit for old revisions\n (git-fixes).\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n - mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n - mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n - mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers\n (bsc#1051510).\n - mmc: sdhci: Update the tuning failed messages to pr_debug level\n (git-fixes).\n - mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n - mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card()\n (bsc#1051510).\n - mmc: tmio: fix access width of Block Count Register (git-fixes).\n - mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n - mm: thp: handle page cache THP correctly in PageTransCompoundMap (git\n fixes (block drivers)).\n - mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer\n (bsc#1051510).\n - mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n - mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n - mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n - mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n - mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n - net: bcmgenet: correct per TX/RX ring statistics\n (networking-stable-20_04_27).\n - net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n - net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n - net: dsa: bcm_sf2: Do not register slave MDIO bus with OF\n (networking-stable-20_04_09).\n - net: dsa: bcm_sf2: Ensure correct sub-node is parsed\n (networking-stable-20_04_09).\n - net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n - net: dsa: Fix duplicate frames flooded by learning\n (networking-stable-20_03_28).\n - net: dsa: mv88e6xxx: fix lockup on warm boot\n (networking-stable-20_03_14).\n - net/ethernet: add Google GVE driver (jsc#SLE-10538)\n - net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n - net: fec: validate the new settings in fec_enet_set_coalesce()\n (networking-stable-20_03_14).\n - net: fib_rules: Correctly set table field when table number exceeds 8\n bits (networking-stable-20_03_01).\n - net: fix race condition in __inet_lookup_established() (bsc#1151794).\n - net: fq: add missing attribute validation for orphan mask\n (networking-stable-20_03_14).\n - net: hns3: fix \"tc qdisc del\" failed issue (bsc#1109837).\n - net, ip_tunnel: fix interface lookup with no key\n (networking-stable-20_04_02).\n - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin\n (networking-stable-20_04_17).\n - net: ipv6: do not consider routes via gateways for anycast address check\n (networking-stable-20_04_17).\n - netlink: Use netlink header as base to calculate bad attribute offset\n (networking-stable-20_03_14).\n - net: macsec: update SCI upon MAC address change\n (networking-stable-20_03_14).\n - net: memcg: fix lockdep splat in inet_csk_accept()\n (networking-stable-20_03_14).\n - net: memcg: late association of sock to memcg\n (networking-stable-20_03_14).\n - net/mlx4_en: avoid indirect call in TX completion\n (networking-stable-20_04_27).\n - net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n - net/mlx5: Expose link speed directly (bsc#1171118).\n - net/mlx5: Expose port speed when possible (bsc#1171118).\n - net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n - net: mvneta: Fix the case where the last poll did not process all rx\n (networking-stable-20_03_28).\n - net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node\n (networking-stable-20_04_27).\n - net/packet: tpacket_rcv: do not increment ring index on drop\n (networking-stable-20_03_14).\n - net: phy: restore mdio regs in the iproc mdio driver\n (networking-stable-20_03_01).\n - net: qmi_wwan: add support for ASKEY WWHC050\n (networking-stable-20_03_28).\n - net: revert default NAPI poll timeout to 2 jiffies\n (networking-stable-20_04_17).\n - net_sched: cls_route: remove the right filter from hashtable\n (networking-stable-20_03_28).\n - net_sched: sch_skbprio: add message validation to skbprio_change()\n (bsc#1109837).\n - net/x25: Fix x25_neigh refcnt leak when receiving frame\n (networking-stable-20_04_27).\n - nfc: add missing attribute validation for SE API\n (networking-stable-20_03_14).\n - nfc: add missing attribute validation for vendor subcommand\n (networking-stable-20_03_14).\n - nfc: pn544: Fix occasional HW initialization failure\n (networking-stable-20_03_01).\n - NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n - nfp: abm: fix a memory leak bug (bsc#1109837).\n - nfsd4: fix up replay_matches_cache() (git-fixes).\n - nfsd: Ensure CLONE persists data and metadata changes to the target file\n (git-fixes).\n - nfsd: fix delay timer on 32-bit architectures (git-fixes).\n - nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n - nfs: Directory page cache pages need to be locked when read (git-fixes).\n - nfsd: memory corruption in nfsd4_lock() (git-fixes).\n - nfs: Do not call generic_error_remove_page() while holding locks\n (bsc#1170457).\n - nfs: Fix memory leaks and corruption in readdir (git-fixes).\n - nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n - nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n - nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n - NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n - NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n - nfs: Revalidate the file size on a fatal write error (git-fixes).\n - NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals\n (git-fixes).\n - NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n - NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).\n - NFSv4-Fix-OPEN-CLOSE-race.patch\n - NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid()\n (git-fixes).\n - NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n - NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for\n layoutreturn (git-fixes).\n - nl802154: add missing attribute validation for dev_type\n (networking-stable-20_03_14).\n - nl802154: add missing attribute validation (networking-stable-20_03_14).\n - nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n - objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n - objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n - objtool: Make BP scratch register warning more robust (bsc#1169514).\n - padata: Remove broken queue flushing (git-fixes).\n - Partially revert \"kfifo: fix kfifo_alloc() and kfifo_init()\" (git fixes\n (block drivers)).\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2\n (bsc#1172201, bsc#1172202).\n - PCI: hv: Decouple the func definition in hv_dr_state from VSP message\n (bsc#1172201, bsc#1172202).\n - PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n - perf: Allocate context task_ctx_data for child event (git-fixes).\n - perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n - perf: Copy parent's address filter offsets on clone (git-fixes).\n - perf/core: Add sanity check to deal with pinned event failure\n (git-fixes).\n - perf/core: Avoid freeing static PMU contexts when PMU is unregistered\n (git-fixes).\n - perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n - perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n - perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n - perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n - perf/core: Fix exclusive events' grouping (git-fixes).\n - perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n - perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n - perf/core: Fix locking for children siblings group read (git-fixes).\n - perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes\n (dependent patch for 18736eef1213)).\n - perf/core: Fix perf_event_read_value() locking (git-fixes).\n - perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n - perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent\n patch)).\n - perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n - perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).\n - perf/core: Fix race between close() and fork() (git-fixes).\n - perf/core: Fix the address filtering fix (git-fixes).\n - perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n - perf/core: Force USER_DS when recording user stack data (git-fixes).\n - perf/core: Restore mmap record type correctly (git-fixes).\n - perf: Fix header.size for namespace events (git-fixes).\n - perf/ioctl: Add check for the sample_period value (git-fixes).\n - perf, pt, coresight: Fix address filters for vmas with non-zero offset\n (git-fixes).\n - perf: Return proper values for user stack errors (git-fixes).\n - pinctrl: baytrail: Enable pin configuration setting for GPIO chip\n (git-fixes).\n - pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler\n (git-fixes).\n - pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H\n (git-fixes).\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA\n (bsc#1051510).\n - pnfs: Ensure we do clear the return-on-close layout stateid on fatal\n errors (git-fixes).\n - powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n - powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n - powerpc/setup_64: Set cache-line-size based on cache-block-size\n (bsc#1065729).\n - powerpc/sstep: Fix DS operand in ld encoding to appropriate value\n (bsc#1065729).\n - qede: Fix race between rdma destroy workqueue and link change event\n (networking-stable-20_03_01).\n - r8152: check disconnect status after long sleep\n (networking-stable-20_03_14).\n - raid6/ppc: Fix build for clang (git fixes (block drivers)).\n - random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n - rcu: locking and unlocking need to always be at least barriers (git\n fixes (block drivers)).\n - Redo patch for SLE15-SP1, based on feedback from IBM:\n patches.suse/s390-ftrace-fix-potential-crashes-when-switching-tracers\n (bsc#1171244 LTC#185785 git-fixes).\n - resolve KABI warning for perf-pt-coresight (git-fixes).\n - Revert \"ALSA: hda/realtek: Fix pop noise on ALC225\" (git-fixes).\n - Revert \"drm/panel: simple: Add support for Sharp LQ150X1LG11 panels\"\n (bsc#1114279) \t* offset changes\n - Revert \"HID: i2c-hid: add Trekstor Primebook C11B to descriptor\n override\" Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was\n also reverted.\n - Revert \"HID: i2c-hid: override HID descriptors for certain devices\" This\n broke i2c-hid.ko's build, there is no way around it without a big file\n rename or renaming the kernel module.\n - Revert \"i2c-hid: properly terminate i2c_hid_dmi_desc_override_table\"\n Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n - Revert \"ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()\"\n (bsc#1172221).\n - Revert \"RDMA/cma: Simplify rdma_resolve_addr() error flow\" (bsc#1103992).\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n - s390/cio: avoid duplicated 'ADD' uevents (git-fixes).\n - s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n - s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n - s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762\n LTC#185291).\n - s390/diag: fix display of diagnose call statistics (git-fixes).\n - s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n - s390/gmap: return proper error code on ksm unsharing (git-fixes).\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n - s390/pci: do not set affinity for floating irqs (git-fixes).\n - s390/pci: Fix possible deadlock in recover_store() (bsc#1165183\n LTC#184103).\n - s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n - s390/qeth: cancel RX reclaim work earlier (git-fixes).\n - s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n - s390/qeth: do not warn for napi with 0 budget (git-fixes).\n - s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n - s390/qeth: fix promiscuous mode after reset (git-fixes).\n - s390/qeth: fix qdio teardown after early init error (git-fixes).\n - s390/qeth: handle error due to unsupported transport mode (git-fixes).\n - s390/qeth: handle error when backing RX buffer (git-fixes).\n - s390/qeth: lock the card while changing its hsuid (git-fixes).\n - s390/qeth: support net namespaces for L3 devices (git-fixes).\n - s390/time: Fix clk type in get_tod_clock (git-fixes).\n - scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n - scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n - scsi: bnx2i: fix potential use after free (bsc#1171600).\n - scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)\n - scsi: core: save/restore command resid for error handling (bsc#1171602).\n - scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n - scsi: core: try to get module before removing device (bsc#1171605).\n - scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n - scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n - scsi: esas2r: unlock on error in esas2r_nvram_read_direct()\n (bsc#1171608).\n - scsi: fnic: fix invalid stack access (bsc#1171609).\n - scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n - scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.patch\n - scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791\n ltc#185128).\n - scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patch\n - scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n - scsi: iscsi: Fix a potential deadlock in the timeout handler\n (bsc#1171612).\n - scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n - scsi: lpfc: Change default queue allocation for reduced memory\n consumption (bsc#1164780).\n - scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer\n dereferences (bsc#1171614).\n - scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG\n (bsc#1171615).\n - scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event\n (bsc#1164780).\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n - scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type\n (bsc#1164780).\n - scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n - scsi: lpfc: Maintain atomic consistency of queue_claimed flag\n (bsc#1164780).\n - scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n - scsi: lpfc: Remove re-binding of nvme rport during registration\n (bsc#1164780).\n - scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n - scsi: megaraid_sas: Do not initiate OCR if controller is not in ready\n state (bsc#1171616).\n - scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n - scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.patch\n - scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n - scsi: qla2xxx: Delete all sessions before unregister local nvme port\n (bsc#1157169).\n - scsi: qla2xxx: Do not log message when reading port speed via sysfs\n (bsc#1157169).\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV\n (bsc#1157169).\n - scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n - scsi: qla2xxx: Remove non functional code (bsc#1157169).\n - scsi: qla2xxx: set UNLOADING before waiting for session deletion\n (bsc#1157169).\n - scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.patch\n - scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n - scsi: qla4xxx: fix double free bug (bsc#1171618).\n - scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI\n (bsc#1171619).\n - scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n - scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and\n WRITE(6) (bsc#1171621).\n - scsi: ufs: change msleep to usleep_range (bsc#1171622).\n - scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path\n (bsc#1171623).\n - scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic\n (bsc#1171624).\n - scsi: ufs: Fix ufshcd_probe_hba() reture value in case\n ufshcd_scsi_add_wlus() fails (bsc#1171625).\n - scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n - scsi: zfcp: fix missing erp_lock in port recovery trigger for\n point-to-point (git-fixes).\n - sctp: fix possibly using a bad saddr with a given dst\n (networking-stable-20_04_02).\n - sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n - sctp: move the format error check out of __sctp_sf_do_9_1_abort\n (networking-stable-20_03_01).\n - selftests/powerpc: Fix build errors in powerpc ptrace selftests\n (boo#1124278).\n - seq_file: fix problem when seeking mid-record (bsc#1170125).\n - serial: uartps: Move the spinlock after the read of the tx empty\n (git-fixes).\n - sfc: detach from cb_page in efx_copy_channel()\n (networking-stable-20_03_14).\n - signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig\n (bsc#1172185).\n - slcan: not call free_netdev before rtnl_unlock in slcan_open\n (networking-stable-20_03_28).\n - slip: make slhc_compress() more robust against malicious packets\n (networking-stable-20_03_14).\n - smb3: Additional compression structures (bsc#1144333).\n - smb3: Add new compression flags (bsc#1144333).\n - smb3: change noisy error message to FYI (bsc#1144333).\n - smb3: enable swap on SMB3 mounts (bsc#1144333).\n - smb3-fix-performance-regression-with-setting-mtime.patch\n - smb3: Minor cleanup of protocol definitions (bsc#1144333).\n - smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n - smb3: smbdirect support can be configured by default (bsc#1144333).\n - smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n - spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n - spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n - spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n - spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n - spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n - spi: fsl: do not map irq during probe (git-fixes).\n - spi: fsl: use platform_get_irq() instead of of_irq_to_resource()\n (git-fixes).\n - spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n - spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n - spi: spi-fsl-dspi: Replace interruptible wait queue with a simple\n completion (git-fixes).\n - spi: spi-s3c64xx: Fix system resume support (git-fixes).\n - spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n - staging: comedi: dt2815: fix writing hi byte of analog output\n (bsc#1051510).\n - staging: comedi: Fix comedi_device refcnt leak in comedi_open\n (bsc#1051510).\n - staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n - staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default\n (git-fixes).\n - staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n - staging: vt6656: Fix pairwise key entry save (git-fixes).\n - sunrpc: expiry_time should be seconds not timeval (git-fixes).\n - sunrpc: Fix a potential buffer overflow in 'svc_print_xprts()'\n (git-fixes).\n - supported.conf: Add br_netfilter to base (bsc#1169020).\n - supported.conf: support w1 core and thermometer support\n - svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path\n (bsc#1103992).\n - svcrdma: Fix leak of transport addresses (git-fixes).\n - svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n - taskstats: fix data-race (bsc#1172188).\n - tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n - tcp: repair: fix TCP_QUEUE_SEQ implementation\n (networking-stable-20_03_28).\n - team: add missing attribute validation for array index\n (networking-stable-20_03_14).\n - team: add missing attribute validation for port ifindex\n (networking-stable-20_03_14).\n - team: fix hang in team_mode_get() (networking-stable-20_04_27).\n - tools lib traceevent: Remove unneeded qsort and uses memmove instead\n (git-fixes).\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n - tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n - tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n - tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n - tracing: Disable trace_printk() on post poned tests (git-fixes).\n - tracing: Fix the race between registering 'snapshot' event trigger and\n triggering 'snapshot' operation (git-fixes).\n - tty: rocket, avoid OOB access (git-fixes).\n - tun: Do not put_page() for all negative return values from XDP program\n (bsc#1109837).\n - UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n - UAS: no use logging any details in case of ENODEV (git-fixes).\n - Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n - Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)\n - Update\n patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for-huge-DMA-.patch\n (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).\n - Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741,\n bsc#1166969).\n - Update references:\n patches.suse/s390-pci-do-not-set-affinity-for-floating-irqs (bsc#1171817\n LTC#185819 git-fixes).\n - usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair\n K70 RGB RAPIDFIRE (git-fixes).\n - usb: cdc-acm: restore capability check order (git-fixes).\n - usb: core: Fix misleading driver bug report (bsc#1051510).\n - usb: dwc3: do not set gadget->is_otg flag (git-fixes).\n - usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n - usb: early: Handle AMD's spec-compliant identifiers, too (git-fixes).\n - usb: f_fs: Clear OS Extended descriptor counts to zero in\n ffs_data_reset() (git-fixes).\n - usb: gadget: audio: Fix a missing error return value in audio_bind()\n (git-fixes).\n - usb: gadget: composite: Inform controller driver of self-powered\n (git-fixes).\n - usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n - usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n - usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n - usb: gadget: net2272: Fix a memory leak in an error handling path in\n 'net2272_plat_probe()' (git-fixes).\n - usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n - usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n - usb: gadget: udc: bdc: Remove unnecessary NULL checks in\n bdc_req_complete (git-fixes).\n - usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n - usb: hub: Fix handling of connect changes during sleep (git-fixes).\n - usbnet: silence an unnecessary warning (bsc#1170770).\n - usb: serial: garmin_gps: add sanity checking for data length (git-fixes).\n - usb: serial: option: add BroadMobi BM806U (git-fixes).\n - usb: serial: option: add support for ASKEY WWHC050 (git-fixes).\n - usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n - usb: serial: qcserial: Add DW5816e support (git-fixes).\n - usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n - usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n - usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n - usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg\n list (git-fixes).\n - video: fbdev: sis: Remove unnecessary parentheses and commented code\n (bsc#1114279)\n - video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n - vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n - vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n - vt: selection, introduce vc_is_sel (git-fixes).\n - vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n - vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console\n (git-fixes).\n - vxlan: check return value of gro_cells_init()\n (networking-stable-20_03_28).\n - w1: Add subsystem kernel public interface (jsc#SLE-11048).\n - w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n - w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n - w1: use put_device() if device_register() fail (jsc#SLE-11048).\n - watchdog: reset last_hw_keepalive time at start (git-fixes).\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).\n - wil6210: remove reset file from debugfs (git-fixes).\n - wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n - workqueue: do not use wq_select_unbound_cpu() for bound works\n (bsc#1172130).\n - x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n - x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n - x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n - x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n - x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621,\n bsc#1170620).\n - x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash data in die() when panic_on_oops is set\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash register data or kmsg before running crash\n kernel (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is\n not set (bsc#1170617, bsc#1170618).\n - x86: hyperv: report value of misc_features (git fixes).\n - x86/Hyper-V: Trigger crash enlightenment only once during system crash\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617,\n bsc#1170618).\n - x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n - x86/resctrl: Fix invalid attempt at removing the default resource group\n (git-fixes).\n - x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n - x86/unwind/orc: Do not skip the first frame for inactive tasks\n (bsc#1058115).\n - x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n - x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks\n (bsc#1058115).\n - x86/unwind/orc: Prevent unwinding before ORC initialization\n (bsc#1058115).\n - x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n - x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n - x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n - x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n - xen/pci: reserve MCFG areas earlier (bsc#1170145).\n - xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish\n (networking-stable-20_04_27).\n - xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n - xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n - xfs: do not ever return a stale pointer from __xfs_dir3_free_read\n (git-fixes).\n - xprtrdma: Fix completion wait during device removal (git-fixes).\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.1:\n\n zypper in -t patch openSUSE-2020-801=1", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-06-13T00:00:00", "type": "suse", "title": "Security update for the Linux Kernel (important)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-1000199", "CVE-2019-19462", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-0543", "CVE-2020-10690", "CVE-2020-10711", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-11608", "CVE-2020-11609", "CVE-2020-12114", "CVE-2020-12464", "CVE-2020-12652", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12655", "CVE-2020-12656", "CVE-2020-12657", "CVE-2020-12659", "CVE-2020-12769", "CVE-2020-13143"], "modified": "2020-06-13T00:00:00", "id": "OPENSUSE-SU-2020:0801-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BOYMLRUHWMVAOFIPZH7KANUUUY2YYNL3/", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-11-06T12:09:24", "description": "An update that solves 79 vulnerabilities and has 676 fixes\n is now available.\n\nDescription:\n\n\n This update syncs the RT kernel from the SUSE Linux Enterprise 15-SP2\n codestream.\n\n This update was imported from the SUSE:SLE-15-SP2:Update update project.\n\n\nSpecial Instructions and Notes:\n\n Please reboot the system after installing this update.\n\nPatch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended installation methods\n like YaST online_update or \"zypper patch\".\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.2:\n\n zypper in -t patch openSUSE-2021-242=1", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-02-05T00:00:00", "type": "suse", "title": "Security update for RT kernel (moderate)", "bulletinFamily": "unix", "cvss2": {"severity": "HIGH", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "COMPLETE", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 8.5, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0110", "CVE-2020-0305", "CVE-2020-0404", "CVE-2020-0427", "CVE-2020-0431", "CVE-2020-0432", "CVE-2020-0444", "CVE-2020-0465", "CVE-2020-0466", "CVE-2020-0543", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-11668", "CVE-2020-12351", "CVE-2020-12352", "CVE-2020-12652", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14351", "CVE-2020-14356", "CVE-2020-14385", "CVE-2020-14386", "CVE-2020-14390", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15436", "CVE-2020-15437", "CVE-2020-15780", "CVE-2020-16120", "CVE-2020-16166", "CVE-2020-1749", "CVE-2020-24490", "CVE-2020-2521", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285", "CVE-2020-25641", "CVE-2020-25643", "CVE-2020-25645", "CVE-2020-25656", "CVE-2020-25668", "CVE-2020-25669", "CVE-2020-25704", "CVE-2020-25705", "CVE-2020-26088", "CVE-2020-27068", "CVE-2020-27777", "CVE-2020-27786", "CVE-2020-27825", "CVE-2020-27830", "CVE-2020-28915", "CVE-2020-28941", "CVE-2020-28974", "CVE-2020-29369", "CVE-2020-29370", "CVE-2020-29371", "CVE-2020-29373", "CVE-2020-29660", "CVE-2020-29661", "CVE-2020-36158", "CVE-2020-4788", "CVE-2020-8694"], "modified": "2021-02-05T00:00:00", "id": "OPENSUSE-SU-2021:0242-1", "href": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XOAUJM2XDOB5Y2JL726SBZNXGQBPQC75/", "cvss": {"score": 7.5, "vector": "AV:N/AC:M/Au:S/C:P/I:P/A:C"}}], "openvas": [{"lastseen": "2020-07-21T19:32:52", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-08T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for the (openSUSE-SU-2020:0935-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12888", "CVE-2019-19462", "CVE-2019-20810", "CVE-2020-12769", "CVE-2020-12656", "CVE-2020-10732", "CVE-2020-10768", "CVE-2019-20812", "CVE-2020-14416", "CVE-2020-10766", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-10773", "CVE-2020-10767"], "modified": "2020-07-09T00:00:00", "id": "OPENVAS:1361412562310853260", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310853260", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.853260\");\n script_version(\"2020-07-09T12:15:58+0000\");\n script_cve_id(\"CVE-2019-19462\", \"CVE-2019-20810\", \"CVE-2019-20812\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10773\", \"CVE-2020-12656\", \"CVE-2020-12769\", \"CVE-2020-12888\", \"CVE-2020-13143\", \"CVE-2020-13974\", \"CVE-2020-14416\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-07-09 12:15:58 +0000 (Thu, 09 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-08 03:04:13 +0000 (Wed, 08 Jul 2020)\");\n script_name(\"openSUSE: Security Advisory for the (openSUSE-SU-2020:0935-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.2\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2020:0935-1\");\n script_xref(name:\"URL\", value:\"http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00008.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'the'\n package(s) announced via the openSUSE-SU-2020:0935-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE Leap 15.2 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c\n did not call snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\n - CVE-2020-10711: A NULL pointer dereference flaw was found in the Linux\n kernel's SELinux subsystem. This flaw occurs while importing the\n Commercial IP Security Option (CIPSO) protocol's category bitmap into\n the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine.\n While processing the CIPSO restricted bitmap tag in the\n 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to\n indicate that the category bitmap is present, even if it has not been\n allocated. This issue leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This flaw allowed a\n remote network user to crash the system kernel, resulting in a denial of\n service (bnc#1171191).\n\n - CVE-2020-10732: A flaw was found in the implementation of Userspace core\n dumps. This flaw allowed an attacker with a local account to crash a\n trivial program and exfiltrate private kernel data (bnc#1171220).\n\n - CVE-2020-10751: SELinux LSM hook implementation before version 5.7,\n where it incorrectly assumed that an skb would only contain a single\n netlink message. The hook would incorrectly only validate the first\n netlink message in the skb and allow or deny the rest of the messages\n within the skb with the granted permission without further processing\n (bnc#1171189).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler\n logical bug allowed an attacker to turn off the SSBD protection.\n (bnc#1172781).\n\n - CVE-2020-10767: Fixed that Indirect Branch Prediction Barrier is\n force-disabled when STIBP is unavailable or enhanced IBRS is available.\n (bnc#1172782).\n\n - CVE-2020-10768: Fixed that indirect branch speculation can be enabled\n after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command\n (bnc#1172783).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x.\n (bnc#11729 ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'the' package(s) on openSUSE Leap 15.2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs-html\", rpm:\"kernel-docs-html~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel-debuginfo\", rpm:\"kernel-default-devel-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall\", rpm:\"kernel-kvmsmall~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debuginfo\", rpm:\"kernel-kvmsmall-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debugsource\", rpm:\"kernel-kvmsmall-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel\", rpm:\"kernel-kvmsmall-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel-debuginfo\", rpm:\"kernel-kvmsmall-devel-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt\", rpm:\"kernel-preempt~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt-debuginfo\", rpm:\"kernel-preempt-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt-debugsource\", rpm:\"kernel-preempt-debugsource~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt-devel\", rpm:\"kernel-preempt-devel~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-preempt-devel-debuginfo\", rpm:\"kernel-preempt-devel-debuginfo~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~5.3.18~lp152.20.7.1\", rls:\"openSUSELeap15.2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-23T13:07:27", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-23T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-1b2dae6219)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10768", "CVE-2020-10766", "CVE-2020-10767"], "modified": "2020-06-24T00:00:00", "id": "OPENVAS:1361412562310877960", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877960", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877960\");\n script_version(\"2020-06-24T03:42:18+0000\");\n script_cve_id(\"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-24 03:42:18 +0000 (Wed, 24 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-23 03:19:13 +0000 (Tue, 23 Jun 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-1b2dae6219)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2020-1b2dae6219\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/S2DALCEIKGQ6XS65HL4BOJCU55QWAKL2\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-1b2dae6219 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.19~200.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-09-23T13:01:25", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-23T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-125ccdc871)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10768", "CVE-2020-10766", "CVE-2020-10767"], "modified": "2020-06-24T00:00:00", "id": "OPENVAS:1361412562310877974", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877974", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877974\");\n script_version(\"2020-06-24T03:42:18+0000\");\n script_cve_id(\"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\");\n script_tag(name:\"cvss_base\", value:\"5.0\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-06-24 03:42:18 +0000 (Wed, 24 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-23 03:19:41 +0000 (Tue, 23 Jun 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-125ccdc871)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC32\");\n\n script_xref(name:\"FEDORA\", value:\"2020-125ccdc871\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ASOAZA6OZAVVC3T4CQEB4FDNMTW2M263\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-125ccdc871 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 32.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC32\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.19~300.fc32\", rls:\"FC32\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2020-07-21T20:04:04", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-03T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux-gke-5.0 (USN-4413-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2020-10751", "CVE-2020-13143"], "modified": "2020-07-10T00:00:00", "id": "OPENVAS:1361412562310844485", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844485", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844485\");\n script_version(\"2020-07-10T06:57:28+0000\");\n script_cve_id(\"CVE-2020-10711\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-10751\", \"CVE-2020-12768\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-10 06:57:28 +0000 (Fri, 10 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 03:01:43 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux-gke-5.0 (USN-4413-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU18\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4413-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005501.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux-gke-5.0'\n package(s) announced via the USN-4413-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Matthew Sheets discovered that the SELinux network label handling\nimplementation in the Linux kernel could be coerced into de-referencing a\nNULL pointer. A remote attacker could use this to cause a denial of service\n(system crash). (CVE-2020-10711)\n\nIt was discovered that the SCSI generic (sg) driver in the Linux kernel did\nnot properly handle certain error conditions correctly. A local privileged\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-12770)\n\nIt was discovered that the USB Gadget device driver in the Linux kernel did\nnot validate arguments passed from configfs in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or possibly expose sensitive information. (CVE-2020-13143)\n\nDmitry Vyukov discovered that the SELinux netlink security hook in the\nLinux kernel did not validate messages in some situations. A privileged\nattacker could use this to bypass SELinux netlink restrictions.\n(CVE-2020-10751)\n\nIt was discovered that the KVM implementation in the Linux kernel did not\nproperly deallocate memory on initialization for some processors. A local\nattacker could possibly use this to cause a denial of service.\n(CVE-2020-12768)\");\n\n script_tag(name:\"affected\", value:\"'linux-gke-5.0' package(s) on Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1043-gke\", ver:\"5.0.0-1043.44\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.0.0-1063-oem-osp1\", ver:\"5.0.0-1063.68\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke-5.0\", ver:\"5.0.0.1043.28\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.0.0.1063.61\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T20:04:32", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-03T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4411-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2020-10732", "CVE-2020-13143"], "modified": "2020-07-10T00:00:00", "id": "OPENVAS:1361412562310844483", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844483", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844483\");\n script_version(\"2020-07-10T06:57:28+0000\");\n script_cve_id(\"CVE-2020-10732\", \"CVE-2020-10711\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-12768\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-10 06:57:28 +0000 (Fri, 10 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 03:01:33 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4411-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU20\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4411-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005500.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4411-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that the elf handling code in the Linux kernel did not\ninitialize memory before using it in certain situations. A local attacker\ncould use this to possibly expose sensitive information (kernel memory).\n(CVE-2020-10732)\n\nMatthew Sheets discovered that the SELinux network label handling\nimplementation in the Linux kernel could be coerced into de-referencing a\nNULL pointer. A remote attacker could use this to cause a denial of service\n(system crash). (CVE-2020-10711)\n\nIt was discovered that the SCSI generic (sg) driver in the Linux kernel did\nnot properly handle certain error conditions correctly. A local privileged\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-12770)\n\nIt was discovered that the USB Gadget device driver in the Linux kernel did\nnot validate arguments passed from configfs in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or possibly expose sensitive information. (CVE-2020-13143)\n\nIt was discovered that the KVM implementation in the Linux kernel did not\nproperly deallocate memory on initialization for some processors. A local\nattacker could possibly use this to cause a denial of service.\n(CVE-2020-12768)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 20.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU20.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1018-aws\", ver:\"5.4.0-1018.18\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1019-gcp\", ver:\"5.4.0-1019.19\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-1019-oracle\", ver:\"5.4.0-1019.19\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-28-generic\", ver:\"5.4.0-28.32\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-40-generic\", ver:\"5.4.0-40.44\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-40-generic-lpae\", ver:\"5.4.0-40.44\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.4.0-40-lowlatency\", ver:\"5.4.0-40.44\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"5.4.0.1018.19\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.4.0.1019.17\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.4.0.28.35\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.4.0.40.43\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.4.0.1019.17\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.4.0.1018.17\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.4.0.40.43\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem\", ver:\"5.4.0.40.43\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oem-osp1\", ver:\"5.4.0.40.43\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.4.0.1019.17\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.4.0.28.35\", rls:\"UBUNTU20.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-07-21T20:04:01", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-03T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4412-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2020-10751", "CVE-2020-13143"], "modified": "2020-07-10T00:00:00", "id": "OPENVAS:1361412562310844484", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844484", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844484\");\n script_version(\"2020-07-10T06:57:28+0000\");\n script_cve_id(\"CVE-2020-10711\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-10751\", \"CVE-2020-12768\");\n script_tag(name:\"cvss_base\", value:\"4.6\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-07-10 06:57:28 +0000 (Fri, 10 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-03 03:01:38 +0000 (Fri, 03 Jul 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4412-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU19\\.10|UBUNTU18\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"4412-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005499.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4412-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Matthew Sheets discovered that the SELinux network label handling\nimplementation in the Linux kernel could be coerced into de-referencing a\nNULL pointer. A remote attacker could use this to cause a denial of service\n(system crash). (CVE-2020-10711)\n\nIt was discovered that the SCSI generic (sg) driver in the Linux kernel did\nnot properly handle certain error conditions correctly. A local privileged\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-12770)\n\nIt was discovered that the USB Gadget device driver in the Linux kernel did\nnot validate arguments passed from configfs in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or possibly expose sensitive information. (CVE-2020-13143)\n\nDmitry Vyukov discovered that the SELinux netlink security hook in the\nLinux kernel did not validate messages in some situations. A privileged\nattacker could use this to bypass SELinux netlink restrictions.\n(CVE-2020-10751)\n\nIt was discovered that the KVM implementation in the Linux kernel did not\nproperly deallocate memory on initialization for some processors. A local\nattacker could possibly use this to cause a denial of service.\n(CVE-2020-12768)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 19.10, Ubuntu 18.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU19.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1024-kvm\", ver:\"5.3.0-1024.26\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1028-oracle\", ver:\"5.3.0-1028.30\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1030-gcp\", ver:\"5.3.0-1030.32\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1031-azure\", ver:\"5.3.0-1031.32\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-generic\", ver:\"5.3.0-62.56\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-generic-lpae\", ver:\"5.3.0-62.56\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-lowlatency\", ver:\"5.3.0-62.56\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-snapdragon\", ver:\"5.3.0-62.56\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-azure\", ver:\"5.3.0.1031.49\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1030.40\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gke\", ver:\"5.3.0.1030.40\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"5.3.0.1024.22\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1028.43\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"5.3.0.62.52\", rls:\"UBUNTU19.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1028-oracle\", ver:\"5.3.0-1028.30~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-1030-gcp\", ver:\"5.3.0-1030.32~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-generic\", ver:\"5.3.0-62.56~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-generic-lpae\", ver:\"5.3.0-62.56~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-5.3.0-62-lowlatency\", ver:\"5.3.0-62.56~18.04.1\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gcp\", ver:\"5.3.0.1030.24\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-gkeop-5.3\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-oracle\", ver:\"5.3.0.1028.25\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual-hwe-18.04\", ver:\"5.3.0.62.115\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-15T15:57:27", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-11T00:00:00", "type": "openvas", "title": "Debian: Security Advisory for linux (DSA-4699-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2019-19462", "CVE-2020-12114", "CVE-2019-3016", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-10757"], "modified": "2020-06-11T00:00:00", "id": "OPENVAS:1361412562310704699", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704699", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704699\");\n script_version(\"2020-06-11T03:00:17+0000\");\n script_cve_id(\"CVE-2019-19462\", \"CVE-2019-3016\", \"CVE-2020-0543\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12768\", \"CVE-2020-12770\", \"CVE-2020-13143\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-11 03:00:17 +0000 (Thu, 11 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-11 03:00:17 +0000 (Thu, 11 Jun 2020)\");\n script_name(\"Debian: Security Advisory for linux (DSA-4699-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB10\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2020/dsa-4699.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4699-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the DSA-4699-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2019-3016\nIt was discovered that the KVM implementation for x86 did not\nalways perform TLB flushes when needed, if the paravirtualised\nTLB flush feature was enabled. This could lead to disclosure of\nsensitive information within a guest VM.\n\nCVE-2019-19462The syzkaller tool found a missing error check in the relay\n\nlibrary used to implement various files under debugfs. A local\nuser permitted to access debugfs could use this to cause a denial\nof service (crash) or possibly for privilege escalation.\n\nCVE-2020-0543\nResearchers at VU Amsterdam discovered that on some Intel CPUs\nsupporting the RDRAND and RDSEED instructions, part of a random\nvalue generated by these instructions may be used in a later\nspeculative execution on any core of the same physical CPU.\nDepending on how these instructions are used by applications, a\nlocal user or VM guest could use this to obtain sensitive\ninformation such as cryptographic keys from other users or VMs.\n\nThis vulnerability can be mitigated by a microcode update, either\nas part of system firmware (BIOS) or through the intel-microcode\npackage in Debian's non-free archive section. This kernel update\nonly provides reporting of the vulnerability and the option to\ndisable the mitigation if it is not needed.\n\nCVE-2020-10711\nMatthew Sheets reported NULL pointer dereference issues in the\nSELinux subsystem while receiving CIPSO packet with null category. A\nremote attacker can take advantage of this flaw to cause a denial of\nservice (crash). Note that this issue does not affect the binary\npackages distributed in Debian as CONFIG_NETLABEL is not enabled.\n\nCVE-2020-10732\nAn information leak of kernel private memory to userspace was found\nin the kernel's implementation of core dumping userspace processes.\n\nCVE-2020-10751\nDmitry Vyukov reported that the SELinux subsystem did not properly\nhandle validating multiple messages, which could allow a privileged\nattacker to bypass SELinux netlink restrictions.\n\nCVE-2020-10757\nFan Yang reported a flaw in the way mremap handled DAX hugepages,\nallowing a local user to escalate their privileges.\n\nCVE-2020-12114\nPiotr Krysiuk discovered a race condition between the umount and\npivot_root operations in the filesystem core (vfs). A local user\nwith the CAP_SYS_ADMIN capability in any user namespace could use\nthis to cause a denial of service (crash).\n\nCVE-2020-12464\nKyungtae Kim reported a race condition in the USB core that can\nresult in a use-after-free. It is not clear how this can be\nexploited, but i ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the stable distribution (buster), these problems have been fixed\nin version 4.19.118-2+deb10u1. This version also fixes some related\nbugs that do not have their own CVE IDs, and a regression in the\nUAPI header introduced in the previous point release\n(bug #960271).\n\nWe recommend that you upgrade your linux packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"hyperv-daemons\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libbpf-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libbpf4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower1\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"liblockdep-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"liblockdep4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-8-arm\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-8-s390\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-8-x86\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-config-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-cpupower\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-686\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-armel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-armhf\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-i386\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-mips\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-mips64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-mipsel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-ppc64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-cloud-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-common\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-common-rt\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-686\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-armel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-armhf\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-i386\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-mips\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-mips64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-mipsel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-ppc64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-cloud-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-common\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-common-rt\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-686\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-armel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-armhf\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-i386\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-mips\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-mips64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-mipsel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-ppc64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-cloud-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-common\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-common-rt\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-4kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-5kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp-lpae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-cloud-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-cloud-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-loongson-3-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-marvell-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-octeon-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-powerpc64le-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rpi-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-s390x-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-4kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-5kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp-lpae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-cloud-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-cloud-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-loongson-3-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-marvell-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-octeon-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-powerpc64le-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rpi-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-s390x-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-4kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-5kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp-lpae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-cloud-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-cloud-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-loongson-3-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-marvell-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-octeon-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-powerpc64le-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rpi-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-s390x-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-amd64-signed-template\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-arm64-signed-template\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-i386-signed-template\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-kbuild-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-perf-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.19.0-6\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.19.0-8\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.19.0-9\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"lockdep\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"usbip\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-25T13:28:00", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-14T00:00:00", "type": "openvas", "title": "openSUSE: Security Advisory for the (openSUSE-SU-2020:0801-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10711", "CVE-2020-12659", "CVE-2019-19462", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12656", "CVE-2018-1000199", "CVE-2020-11609", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-12653", "CVE-2020-11608", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-12652", "CVE-2020-10757", "CVE-2020-12655", "CVE-2020-12657"], "modified": "2020-06-24T00:00:00", "id": "OPENVAS:1361412562310853206", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310853206", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.853206\");\n script_version(\"2020-06-24T03:42:18+0000\");\n script_cve_id(\"CVE-2018-1000199\", \"CVE-2019-19462\", \"CVE-2019-20806\", \"CVE-2019-20812\", \"CVE-2019-9455\", \"CVE-2020-0543\", \"CVE-2020-10690\", \"CVE-2020-10711\", \"CVE-2020-10720\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\", \"CVE-2020-12656\", \"CVE-2020-12657\", \"CVE-2020-12659\", \"CVE-2020-12769\", \"CVE-2020-13143\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-24 03:42:18 +0000 (Wed, 24 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-14 03:00:56 +0000 (Sun, 14 Jun 2020)\");\n script_name(\"openSUSE: Security Advisory for the (openSUSE-SU-2020:0801-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2020:0801-1\");\n script_xref(name:\"URL\", value:\"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'the'\n package(s) announced via the openSUSE-SU-2020:0801-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other than\n the one which called it. This attack is known as Special Register Buffer\n Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\n - CVE-2018-1000199: Fixed a potential local code execution via ptrace\n (bsc#1089895).\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n\n - CVE-2019-20806: Fixed a null pointer dereference in\n tw5864_handle_frame() which may had lead to denial of service\n (bsc#1172199).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\n video driver. This could lead to local information disclosure with\n System execution privileges needed (bsc#1170345).\n\n - CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev\n (bsc#1170056).\n\n - CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem\n which could have allowed a remote network user to crash the kernel\n resulting in a denial of service (bsc#1171191).\n\n - CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n (bsc#1170778).\n\n - CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\n uninitialized data (bsc#1171220).\n\n - CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\n where it was assumed that an skb would only contain a single netlink\n message (bsc#1171189).\n\n - CVE-2020-10757: Fixed an issue where remapping hugepage DAX to anon mmap\n could have caused user PTE access (bsc#1172317).\n\n - CVE-2020-11608: An issue was discovered in\n drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences\n in ov511_mode_init_regs and ov518_mode_init_regs when there are zero\n endpoints, aka CID-998912346c0d (bnc#1168829).\n\n - CVE-2020-11609: An issue was discovered in the stv06xx subsystem in\n drivers/media/usb/gspca/stv06xx/stv06xx.c and\n drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid\n descriptors, as demonstrated by a NULL pointer dereference, aka\n CID-485b06aadb93 (bnc#1168854).\n\n - CVE-2020-12114: Fixed a pivot_root race condition which could have\n allowed ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'the' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~4.12.14~lp151.28.52.2\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs-html\", rpm:\"kernel-docs-html~4.12.14~lp151.28.52.2\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base-debuginfo\", rpm:\"kernel-debug-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base-debuginfo\", rpm:\"kernel-default-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel-debuginfo\", rpm:\"kernel-default-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall\", rpm:\"kernel-kvmsmall~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base\", rpm:\"kernel-kvmsmall-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base-debuginfo\", rpm:\"kernel-kvmsmall-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debuginfo\", rpm:\"kernel-kvmsmall-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debugsource\", rpm:\"kernel-kvmsmall-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel\", rpm:\"kernel-kvmsmall-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel-debuginfo\", rpm:\"kernel-kvmsmall-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base\", rpm:\"kernel-vanilla-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base-debuginfo\", rpm:\"kernel-vanilla-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debuginfo\", rpm:\"kernel-vanilla-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debugsource\", rpm:\"kernel-vanilla-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel-debuginfo\", rpm:\"kernel-vanilla-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-21T20:03:11", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-07-09T00:00:00", "type": "openvas", "title": "Ubuntu: Security Advisory for linux (USN-4419-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-8992", "CVE-2020-10711", "CVE-2020-12770", "CVE-2020-10690", "CVE-2020-13143"], "modified": "2020-07-09T00:00:00", "id": "OPENVAS:1361412562310844496", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310844496", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.844496\");\n script_version(\"2020-07-09T12:15:58+0000\");\n script_cve_id(\"CVE-2020-10690\", \"CVE-2020-10711\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-8992\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-07-09 12:15:58 +0000 (Thu, 09 Jul 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-07-09 03:00:30 +0000 (Thu, 09 Jul 2020)\");\n script_name(\"Ubuntu: Security Advisory for linux (USN-4419-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU16\\.04 LTS\");\n\n script_xref(name:\"USN\", value:\"4419-1\");\n script_xref(name:\"URL\", value:\"https://lists.ubuntu.com/archives/ubuntu-security-announce/2020-July/005510.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the USN-4419-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that a race condition existed in the Precision Time\nProtocol (PTP) implementation in the Linux kernel, leading to a use-after-\nfree vulnerability. A local attacker could possibly use this to cause a\ndenial of service (system crash) or possibly execute arbitrary code.\n(CVE-2020-10690)\n\nMatthew Sheets discovered that the SELinux network label handling\nimplementation in the Linux kernel could be coerced into de-referencing a\nNULL pointer. A remote attacker could use this to cause a denial of service\n(system crash). (CVE-2020-10711)\n\nIt was discovered that the SCSI generic (sg) driver in the Linux kernel did\nnot properly handle certain error conditions correctly. A local privileged\nattacker could use this to cause a denial of service (system crash).\n(CVE-2020-12770)\n\nIt was discovered that the USB Gadget device driver in the Linux kernel did\nnot validate arguments passed from configfs in some situations. A local\nattacker could possibly use this to cause a denial of service (system\ncrash) or possibly expose sensitive information. (CVE-2020-13143)\n\nShijie Luo discovered that the ext4 file system implementation in the Linux\nkernel did not properly check for a too-large journal size. An attacker\ncould use this to construct a malicious ext4 image that, when mounted,\ncould cause a denial of service (soft lockup). (CVE-2020-8992)\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Ubuntu 16.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1076-kvm\", ver:\"4.4.0-1076.83\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1110-aws\", ver:\"4.4.0-1110.121\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1135-raspi2\", ver:\"4.4.0-1135.144\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-1139-snapdragon\", ver:\"4.4.0-1139.147\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-generic\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-generic-lpae\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-lowlatency\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-powerpc-e500mc\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-powerpc-smp\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-powerpc64-emb\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.4.0-185-powerpc64-smp\", ver:\"4.4.0-185.215\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-aws\", ver:\"4.4.0.1110.114\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-generic-lpae\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-kvm\", ver:\"4.4.0.1076.74\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-lowlatency\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-e500mc\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc-smp\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-emb\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-powerpc64-smp\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-raspi2\", ver:\"4.4.0.1135.135\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-snapdragon\", ver:\"4.4.0.1139.131\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"linux-image-virtual\", ver:\"4.4.0.185.191\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-06-10T17:40:06", "description": "The remote host is missing an update for the ", "cvss3": {}, "published": "2020-06-07T00:00:00", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-5436586091)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-12888"], "modified": "2020-06-09T00:00:00", "id": "OPENVAS:1361412562310877909", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877909", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877909\");\n script_version(\"2020-06-09T07:30:09+0000\");\n script_cve_id(\"CVE-2020-12888\");\n script_tag(name:\"cvss_base\", value:\"4.7\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-09 07:30:09 +0000 (Tue, 09 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-07 03:27:38 +0000 (Sun, 07 Jun 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-5436586091)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC31\");\n\n script_xref(name:\"FEDORA\", value:\"2020-5436586091\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CBEHRQQZTKJTPQFPY3JAO7MQ4JAFEQNW\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-5436586091 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 31.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC31\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.15~200.fc31\", rls:\"FC31\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.7, "vector": "AV:L/AC:M/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2023-05-18T15:05:41", "description": "The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result (bnc#1158265).\n\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\n - CVE-2020-10711: A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\n - CVE-2020-10732: A flaw was found in the implementation of Userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\n - CVE-2020-10751: SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed that Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed that indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command (bnc#1172783).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).\n\n - CVE-2020-12656: Fixed a memory leak in gss_mech_free in the rpcsec_gss_krb5 implementation due to lack of certain domain_release calls (bnc#1171219).\n\n - CVE-2020-12769: An issue was discovered in drivers/spi/spi-dw.c allowed attackers to cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one, aka CID-19b61392c5a8 (bnc#1171983).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13143: gadget_dev_desc_UDC_store in drivers/usb/gadget/configfs.c relied on kstrdup without considering the possibility of an internal '\\0' value, which allowed attackers to trigger an out-of-bounds read, aka CID-15753588bcd4 (bnc#1171982).\n\n - CVE-2020-13974: tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nThe following non-security bugs were fixed :\n\n - ACPICA: Fixes for acpiExec namespace init file (git-fixes).\n\n - ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe() (git-fixes).\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods (git-fixes).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (git-fixes).\n\n - ACPI: PM: Avoid using power resources if there are none for D0 (git-fixes).\n\n - ACPI: sysfs: Fix reference count leak in acpi_sysfs_add_hotplug_profile() (git-fixes).\n\n - af_unix: add compat_ioctl support (git-fixes).\n\n - agp/intel: Reinforce the barrier after GTT updates (git-fixes).\n\n - ALSA: emu10k1: delete an unnecessary condition (git-fixes).\n\n - ALSA: es1688: Add the missed snd_card_free() (git-fixes).\n\n - ALSA: fireface: fix configuration error for nominal sampling transfer frequency (git-fixes).\n\n - ALSA: firewire-lib: fix invalid assignment to union data for directional parameter (git-fixes).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).\n\n - ALSA: hda: add member to store ratio for stripe control (git-fixes).\n\n - ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (git-fixes).\n\n - ALSA: hda: Fix potential race in unsol event handler (git-fixes).\n\n - ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround (bsc#1172017).\n\n - ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (git-fixes).\n\n - ALSA: hda/realtek - Add LED class support for micmute LED (git-fixes).\n\n - ALSA: hda/realtek - Add more fixup entries for Clevo machines (git-fixes).\n\n - ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system (git-fixes).\n\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (git-fixes).\n\n - ALSA: hda/tegra: correct number of SDO lines for Tegra194 (git-fixes).\n\n - ALSA: hda/tegra: workaround playback failure on Tegra194 (git-fixes).\n\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n\n - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio option (git-fixes).\n\n - ALSA: pcm: disallow linking stream to itself (git-fixes).\n\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n\n - ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).\n\n - ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (git-fixes).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (git-fixes).\n\n - ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (git-fixes).\n\n - ALSA: usb-audio: Clean up quirk entries with macros (git-fixes).\n\n - ALSA: usb-audio: Fix a limit check in proc_dump_substream_formats() (git-fixes).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after resume (git-fixes).\n\n - ALSA: usb-audio: fixing upper volume limit for RME Babyface Pro routing crosspoints (git-fixes).\n\n - ALSA: usb-audio: Fixing usage of plain int instead of NULL (git-fixes).\n\n - ALSA: usb-audio: Fix racy list management in output queue (git-fixes).\n\n - ALSA: usb-audio: Improve frames size computation (git-fixes).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled interfaces (git-fixes).\n\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC (git-fixes).\n\n - ALSA: usb-audio: Print more information in stream proc files (git-fixes).\n\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio (git-fixes).\n\n - ALSA: usb-audio: Remove async workaround for Scarlett 2nd gen (git-fixes).\n\n - ALSA: usb-audio: RME Babyface Pro mixer patch (git-fixes).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename quirks (git-fixes).\n\n - amd-xgbe: Use __napi_schedule() in BH context (networking-stable-20_04_17).\n\n - arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12424).\n\n - ARM: oxnas: make ox820_boot_secondary static (git-fixes).\n\n - asm-gemeric/tlb: remove stray function declarations (bsc#1156395).\n\n - ASoC: fix incomplete error-handling in img_i2s_in_probe (git-fixes).\n\n - ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore WT10-A tablet (git-fixes).\n\n - ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks that need pmc_plt_clk_0 quirk (bsc#1171246).\n\n - ASoC: intel - fix the card names (git-fixes).\n\n - ASoC: max9867: fix volume controls (git-fixes).\n\n - ASoC: meson: add missing free_irq() in error path (git-fixes).\n\n - ASoC: rt5645: Add platform-data for Asus T101HA (git-fixes).\n\n - ASoC: SOF: core: fix error return code in sof_probe_continue() (git-fixes).\n\n - ASoC: ux500: mop500: Fix some refcounted resources issues (git-fixes).\n\n - ath10k: Remove ath10k_qmi_register_service_notifier() declaration (git-fixes).\n\n - ath10k: remove the max_sched_scan_reqs value (git-fixes).\n\n - ath10k: Skip handling del_server during driver exit (git-fixes).\n\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (git-fixes).\n\n - ath9k: Fix use-after-free Read in htc_connect_service (git-fixes).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (git-fixes).\n\n - ath9k_htc: Silence undersized packet warnings (git-fixes).\n\n - ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (git-fixes).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).\n\n - b43legacy: Fix case where channel status is corrupted (git-fixes).\n\n - bfq: Avoid false bfq queue merging (bsc#1171513).\n\n - bfq: Fix check detecting whether waker queue should be selected (bsc#1168838).\n\n - bfq: Use only idle IO periods for think time calculations (bsc#1171513).\n\n - bfq: Use 'ttime' local variable (bsc#1171513).\n\n - blk-iocost: Fix error on iocost_ioc_vrate_adj (bsc#1173206).\n\n - blk-iocost: fix incorrect vtime comparison in iocg_is_idle() (bsc#1173206).\n\n - bluetooth: btmtkuart: Improve exception handling in btmtuart_probe() (git-fixes).\n\n - bluetooth: hci_bcm: fix freeing not-requested IRQ (git-fixes).\n\n - bnxt_en: Improve TQM ring context memory sizing formulas (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Fix map permissions check (bsc#1155518).\n\n - bpf: Prevent mmap()'ing read-only maps as writable (bsc#1155518).\n\n - bpf: Restrict bpf_probe_read(, str)() only to archs where they work (bsc#1172344).\n\n - bpf, sockhash: Synchronize_rcu before free'ing map (git-fixes).\n\n - bpf, sockmap: Check update requirements after locking (git-fixes).\n\n - bpf: Undo internal BPF_PROBE_MEM in BPF insns dump (bsc#1155518).\n\n - brcmfmac: fix wrong location to get firmware feature (git-fixes).\n\n - btrfs: fix log context list corruption after rename whiteout error (bsc#1172342).\n\n - btrfs: fix partial loss of prealloc extent past i_size after fsync (bsc#1172343).\n\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n\n - btrfs: reloc: fix reloc root leak and NULL pointer dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: add comments for handle_cap_flush_ack logic (bsc#1172940).\n\n - ceph: allow rename operation under different quota realms (bsc#1172988).\n\n - ceph: ceph_kick_flushing_caps needs the s_mutex (bsc#1172986).\n\n - ceph: convert mdsc->cap_dirty to a per-session list (bsc#1172984 bsc#1167104).\n\n - ceph: document what protects i_dirty_item and i_flushing_item (bsc#1172940).\n\n - ceph: do not release i_ceph_lock in handle_cap_trunc (bsc#1172940).\n\n - ceph: do not return -ESTALE if there's still an open file (bsc#1171915).\n\n - ceph: do not take i_ceph_lock in handle_cap_import (bsc#1172940).\n\n - ceph: fix potential race in ceph_check_caps (bsc#1172940).\n\n - ceph: flush release queue when handling caps for unknown inode (bsc#1172939).\n\n - ceph: make sure mdsc->mutex is nested in s->s_mutex to fix dead lock (bsc#1172989).\n\n - ceph: normalize 'delta' parameter usage in check_quota_exceeded (bsc#1172987).\n\n - ceph: reorganize __send_cap for less spinlock abuse (bsc#1172940).\n\n - ceph: request expedited service on session's last cap flush (bsc#1172985 bsc#1167104).\n\n - ceph: reset i_requested_max_size if file write is not wanted (bsc#1172983).\n\n - ceph: skip checking caps when session reconnecting and releasing reqs (bsc#1172990).\n\n - ceph: split up __finish_cap_flush (bsc#1172940).\n\n - ceph: throw a warning if we destroy session with mutex still locked (bsc#1172940).\n\n - char/random: Add a newline at the end of the file (jsc#SLE-12424).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate (git-fixes).\n\n - clk: bcm2835: Remove casting to bcm2835_clk_register (git-fixes).\n\n - clk: clk-flexgen: fix clock-critical handling (git-fixes).\n\n - clk: mediatek: assign the initial value to clk_init_data of mtk_mux (git-fixes).\n\n - clk: meson: meson8b: Do not rely on u-boot to init all GP_PLL registers (git-fixes).\n\n - clk: meson: meson8b: Fix the polarity of the RESET_N lines (git-fixes).\n\n - clk: meson: meson8b: Fix the vclk_div(1, 2, 4, 6, 12)_en gate bits (git-fixes).\n\n - clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src (git-fixes).\n\n - clk: renesas: cpg-mssr: Fix STBCR suspend/resume handling (git-fixes).\n\n - clk: samsung: Mark top ISP and CAM clocks on Exynos542x as critical (git-fixes).\n\n - clk: sprd: return correct type of value for\n _sprd_pll_recalc_rate (git-fixes).\n\n - clk: sunxi: Fix incorrect usage of round_down() (git-fixes).\n\n - clk: ti: am33xx: fix RTC clock parent (git-fixes).\n\n - clocksource: dw_apb_timer_of: Fix missing clockevent timers (git-fixes).\n\n - component: Silence bind error on -EPROBE_DEFER (git-fixes).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1172739\n\n - coredump: fix crash when umh is disabled (git-fixes).\n\n - coredump: fix NULL pointer dereference on coredump (git-fixes).\n\n - crypto: algapi - Avoid spurious modprobe on LOADED (git-fixes).\n\n - crypto: algboss - do not wait during notifier callback (git-fixes).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).\n\n - crypto: ccp -- do not 'select' CONFIG_DMADEVICES (git-fixes).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime (git-fixes).\n\n - crypto: drbg - fix error return code in drbg_alloc_state() (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n\n - crypto: stm32/crc32 - fix multi-instance (git-fixes).\n\n - crypto: stm32/crc32 - fix run-time self test issue (git-fixes).\n\n - cxgb4: fix adapter crash due to wrong MC size (networking-stable-20_04_27).\n\n - cxgb4: fix large delays in PTP synchronization (networking-stable-20_04_27).\n\n - Delete patches.suse/seltests-powerpc-Add-a-selftest-for-memcpy_ mcsafe.patch (bsc#1171699).\n\n - dma-coherent: fix integer overflow in the reserved-memory dma allocation (git-fixes).\n\n - dma-debug: fix displaying of dma allocation type (git-fixes).\n\n - dma-direct: fix data truncation in dma_direct_get_required_mask() (git-fixes).\n\n - dmaengine: dmatest: Fix process hang when reading 'wait' parameter (git-fixes).\n\n - dmaengine: dmatest: Restore default for channel (git-fixes).\n\n - dmaengine: mmp_tdma: Do not ignore slave config validation errors (git-fixes).\n\n - dmaengine: mmp_tdma: Reset channel error on release (git-fixes).\n\n - dmaengine: owl: Use correct lock in owl_dma_get_pchan() (git-fixes).\n\n - dmaengine: pch_dma.c: Avoid data race between probe and irq handler (git-fixes).\n\n - dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (git-fixes).\n\n - dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n\n - dm writecache: fix data corruption when reloading the target (git fixes (block drivers)).\n\n - drivers/net/ibmvnic: Update VNIC protocol version reporting (bsc#1065729).\n\n - drivers: phy: sr-usb: do not use internal fsm for USB2 phy init (git-fixes).\n\n - drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (git-fixes).\n\n - drm/amd/display: add basic atomic check for cursor plane (git-fixes).\n\n - drm/amd/display: drop cursor position check in atomic test (git-fixes).\n\n - drm/amd/display: Prevent dpcd reads with passive dongles (git-fixes).\n\n - drm/amdgpu: force fbdev into vram (bsc#1152472) 	* context changes\n\n - drm/amdgpu: invalidate L2 before SDMA IBs (v2) (git-fixes).\n\n - drm/amdgpu: simplify padding calculations (v2) (git-fixes).\n\n - drm/amd/powerplay: avoid using pm_en before it is initialized revised (git-fixes).\n\n - drm/amd/powerplay: perform PG ungate prior to CG ungate (git-fixes).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1152472) 	* context changes\n\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit (git-fixes).\n\n - drm/edid: Add Oculus Rift S to non-desktop list (git-fixes).\n\n - drm: encoder_slave: fix refcouting error for modules (git-fixes).\n\n - drm/etnaviv: fix perfmon domain interation (git-fixes).\n\n - drm/etnaviv: rework perfmon query infrastructure (git-fixes).\n\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is (bsc#1152489)\n\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when IPC is disabled (git-fixes).\n\n - drm/i915: extend audio CDCLK>=2*BCLK constraint to more platforms (git-fixes).\n\n - drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl (bsc#1152489)\n\n - drm/i915: fix port checks for MST support on gen >= 11 (git-fixes).\n\n - drm/i915/gem: Avoid iterating an empty list (git-fixes).\n\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (bsc#1152489)\n\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest (git-fixes).\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of (bsc#1152489)\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of inheritance (git-fixes).\n\n - drm/i915: HDCP: fix Ri prime check done during link check (bsc#1152489) 	* context changes\n\n - drm/i915: HDCP: fix Ri prime check done during link check (git-fixes).\n\n - drm/i915: Limit audio CDCLK>=2*BCLK constraint back to GLK only (git-fixes).\n\n - drm/i915: Propagate error from completed fences (git-fixes).\n\n - drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (git-fixes).\n\n - drm/i915: work around false-positive maybe-uninitialized warning (git-fixes).\n\n - drm/mcde: dsi: Fix return value check in mcde_dsi_bind() (git-fixes).\n\n - drm/qxl: lost qxl_bo_kunmap_atomic_page in qxl_image_init_helper() (git-fixes).\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider (git-fixes).\n\n - drm/vkms: Hold gem object while still in-use (git-fixes).\n\n - dwc3: Remove check for HWO flag in dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).\n\n - e1000e: Disable TSO for buffer overrun workaround (git-fixes).\n\n - e1000e: Do not wake up the system via WOL if device wakeup is disabled (git-fixes).\n\n - EDAC/amd64: Add PCI device IDs for family 17h, model 70h (bsc#1165975).\n\n - EDAC/ghes: Setup DIMM label from DMI and use it in error reports (bsc#1168779).\n\n - EDAC/skx: Use the mcmtr register to retrieve close_pg/bank_xor_enable (bsc#1152489).\n\n - EDAC/synopsys: Do not dump uninitialized pinf->col (bsc#1152489).\n\n - efi/efivars: Add missing kobject_put() in sysfs entry creation error path (git-fixes).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12424).\n\n - efi: READ_ONCE rng seed size before munmap (jsc#SLE-12424).\n\n - efi/tpm: Verify event log header before parsing (bsc#1173461).\n\n - eventpoll: fix missing wakeup for ovflist in ep_poll_callback (bsc#1159867).\n\n - evm: Check also if *tfm is an error pointer in init_desc() (git-fixes).\n\n - evm: Fix a small race in init_desc() (git-fixes).\n\n - evm: Fix possible memory leak in evm_calc_hmac_or_hash() (git-fixes).\n\n - evm: Fix RCU list related warnings (git-fixes).\n\n - extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (git-fixes).\n\n - fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n\n - fdt: add support for rng-seed (jsc#SLE-12424).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12424).\n\n - firmware: imx: scu: Fix corruption of header (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (git-fixes).\n\n - firmware: imx-scu: Support one TX and one RX (git-fixes).\n\n - firmware: imx: warn on unexpected RX (git-fixes).\n\n - firmware: qcom_scm: fix bogous abuse of dma-direct internals (git-fixes).\n\n - firmware: xilinx: Fix an error handling path in 'zynqmp_firmware_probe()' (git-fixes).\n\n - Fix a regression of AF_ALG crypto interface hang with aes_s390 (bsc#1167651)\n\n - fpga: dfl: afu: Corrected error handling levels (git-fixes).\n\n - fs: Do not check if there is a fsnotify watcher on pseudo inodes (bsc#1158765).\n\n - fsnotify: Rearrange fast path to minimise overhead when there is no watcher (bsc#1158765).\n\n - genetlink: clean up family attributes allocations (git-fixes).\n\n - genetlink: fix memory leaks in genl_family_rcv_msg_dumpit() (bsc#1154353).\n\n - gpio: bcm-kona: Fix return value of bcm_kona_gpio_probe() (git-fixes).\n\n - gpio: dwapb: Append MODULE_ALIAS for platform driver (git-fixes).\n\n - gpio: dwapb: Call acpi_gpiochip_free_interrupts() on GPIO chip de-registration (git-fixes).\n\n - gpio: exar: Fix bad handling for ida_simple_get error path (git-fixes).\n\n - gpiolib: Document that GPIO line names are not globally unique (git-fixes).\n\n - gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).\n\n - gpio: pxa: Fix return value of pxa_gpio_probe() (git-fixes).\n\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown (git-fixes).\n\n - gpu/drm: Ingenic: Fix opaque pointer casted to wrong type (git-fixes).\n\n - habanalabs: Align protection bits configuration of all TPCs (git-fixes).\n\n - HID: alps: Add AUI1657 device ID (git-fixes).\n\n - HID: alps: ALPS_1657 is too specific; use U1_UNICORN_LEGACY instead (git-fixes).\n\n - HID: i2c-hid: add Schneider SCL142ALM to descriptor override (git-fixes).\n\n - HID: i2c-hid: reset Synaptics SYNA2393 on resume (git-fixes).\n\n - HID: intel-ish-hid: avoid bogus uninitialized-variable warning (git-fixes).\n\n - HID: multitouch: add eGalaxTouch P80H84 support (git-fixes).\n\n - HID: multitouch: enable multi-input as a quirk for some devices (git-fixes).\n\n - HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for Dell K12A keyboard-dock (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles (git-fixes).\n\n - hsr: check protocol version in hsr_newlink() (networking-stable-20_04_17).\n\n - i2c: acpi: put device when verifying client fails (git-fixes).\n\n - i2c: altera: Fix race between xfer_msg and isr thread (git-fixes).\n\n - i2c: designware-pci: Add support for Elkhart Lake PSE I2C (jsc#SLE-12734).\n\n - i2c: designware-pci: Fix BUG_ON during device removal (jsc#SLE-12734).\n\n - i2c: designware-pci: Switch over to MSI interrupts (jsc#SLE-12734).\n\n - i2c: dev: Fix the race between the release of i2c_dev and cdev (git-fixes).\n\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n\n - i2c: mux: demux-pinctrl: Fix an error handling path in 'i2c_demux_pinctrl_probe()' (git-fixes).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n\n - ice: Fix error return code in ice_add_prof() (jsc#SLE-7926).\n\n - ice: Fix inability to set channels when down (jsc#SLE-7926).\n\n - ieee80211: Fix incorrect mask for default PE duration (git-fixes).\n\n - iio: adc: stm32-adc: fix device used to request dma (git-fixes).\n\n - iio: adc: stm32-adc: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n\n - iio: adc: stm32-dfsdm: fix device used to request dma (git-fixes).\n\n - iio: adc: stm32-dfsdm: Use dma_request_chan() instead dma_request_slave_channel() (git-fixes).\n\n - iio: adc: ti-ads8344: Fix channel selection (git-fixes).\n\n - iio: buffer: Do not allow buffers without any channels enabled to be activated (git-fixes).\n\n - iio:chemical:pms7003: Fix timestamp alignment and prevent data leak (git-fixes).\n\n - iio:chemical:sps30: Fix timestamp alignment (git-fixes).\n\n - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()' (git-fixes).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering (git-fixes).\n\n - iio: sca3000: Remove an erroneous 'get_device()' (git-fixes).\n\n - iio: vcnl4000: Fix i2c swapped word reading (git-fixes).\n\n - ima: Call ima_calc_boot_aggregate() in ima_eventdigest_init() (bsc#1172223).\n\n - ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1172223)\n\n - ima: Directly free *entry in ima_alloc_init_template() if digests is NULL (bsc#1172223).\n\n - ima: Remove __init annotation from ima_pcrread() (git-fixes).\n\n - include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n\n - Input: dlink-dir685-touchkeys - fix a typo in driver name (git-fixes).\n\n - Input: edt-ft5x06 - fix get_default register write access (git-fixes).\n\n - Input: evdev - call input_flush_device() on release(), not flush() (git-fixes).\n\n - Input: i8042 - add ThinkPad S230u to i8042 reset list (git-fixes).\n\n - Input: mms114 - fix handling of mms345l (git-fixes).\n\n - Input: synaptics - add a second working PNP_ID for Lenovo T470s (git-fixes).\n\n - Input: synaptics-rmi4 - fix error return code in rmi_driver_probe() (git-fixes).\n\n - Input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n\n - Input: usbtouchscreen - add support for BonXeon TP (git-fixes).\n\n - Input: xpad - add custom init packet for Xbox One S controllers (git-fixes).\n\n - iocost: check active_list of all the ancestors in iocg_activate() (bsc#1173206).\n\n - iocost: do not let vrate run wild while there's no saturation signal (bsc1173206).\n\n - iocost: over-budget forced IOs should schedule async delay (bsc#1173206).\n\n - iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172061).\n\n - iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172062).\n\n - iommu/amd: Do not loop forever when trying to increase address space (bsc#1172063).\n\n - iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system (bsc#1172393).\n\n - iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172064).\n\n - iommu/amd: Fix race in increase_address_space()/fetch_pte() (bsc#1172065).\n\n - iommu/amd: Update Device Table in increase_address_space() (bsc#1172066).\n\n - iommu: Fix reference count leak in iommu_group_alloc (bsc#1172394).\n\n - iommu/qcom: Fix local_base status check (bsc#1172067).\n\n - iommu/virtio: Reverse arguments to list_add (bsc#1172068).\n\n - ipv4: Update fib_select_default to handle nexthop objects (networking-stable-20_04_27).\n\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n\n - ipvs: Improve robustness to the ipvs sysctl (git-fixes).\n\n - irqchip/al-fic: Add support for irq retrigger (jsc#SLE-10505).\n\n - irqchip/ti-sci-inta: Fix processing of masked irqs (git-fixes).\n\n - irqchip/versatile-fpga: Apply clear-mask earlier (git-fixes).\n\n - irqchip/versatile-fpga: Handle chained IRQs properly (git-fixes).\n\n - iwlwifi: avoid debug max amsdu config overwriting itself (git-fixes).\n\n - iwlwifi: mvm: limit maximum queue appropriately (git-fixes).\n\n - iwlwifi: pcie: handle QuZ configs with killer NICs as well (bsc#1172374).\n\n - jbd2: fix data races at struct journal_head (bsc#1173438).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12424).\n\n - kabi/severities: Ingnore get_dev_data() The function is internal to the AMD IOMMU driver and must not be called by any third-party.\n\n - kABI workaround for struct hdac_bus changes (git-fixes).\n\n - ktest: Add timeout for ssh sync testing (git-fixes).\n\n - KVM: Check validity of resolved slot when searching memslots (bsc#1172069).\n\n - KVM: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).\n\n - KVM: x86: only do L1TF workaround on affected processors (bsc#1171904).\n\n - l2tp: Allow management of tunnels and session in user namespace (networking-stable-20_04_17).\n\n - libbpf: Fix perf_buffer__free() API for sparse allocs (bsc#1155518).\n\n - libceph: ignore pool overlay and cache logic on redirects (bsc#1172938).\n\n - lib: devres: add a helper function for ioremap_uc (git-fixes).\n\n - libertas_tf: avoid a null dereference in pointer priv (git-fixes).\n\n - lib/lzo: fix ambiguous encoding bug in lzo-rle (git-fixes).\n\n - libnvdimm/btt: fix variable 'rc' set but not used (bsc#1162400).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm: cover up nd_region changes (bsc#1162400).\n\n - libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check (bsc#1171759).\n\n - libnvdimm/namespace: Enforce memremap_compat_align() (bsc#1162400).\n\n - libnvdimm/namsepace: Do not set claim_class on error (bsc#1162400).\n\n - libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n\n - libnvdimm: Out of bounds read in __nd_ioctl() (bsc#1065729).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n\n - libnvdimm/region: Fix build error (bsc#1162400).\n\n - libnvdimm/region: Introduce an 'align' attribute (bsc#1162400).\n\n - libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n\n - lib: Uplevel the pmem 'region' ida to a global allocator (bc#1162400).\n\n - list: Add hlist_unhashed_lockless() (bsc#1173438).\n\n - livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - locktorture: Allow CPU-hotplug to be disabled via\n --bootargs (bsc#1173068).\n\n - lpfc_debugfs: get rid of pointless access_ok() (bsc#1171530).\n\n - lpfc: fix axchg pointer reference after free and double frees (bsc#1171530).\n\n - lpfc: Fix pointer checks and comments in LS receive refactoring (bsc#1171530).\n\n - lpfc: Fix return value in __lpfc_nvme_ls_abort (bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n\n - mac80211: mesh: fix discovery timer re-arming issue / crash (git-fixes).\n\n - mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in zynqmp_ipi_mbox_probe() (git-fixes).\n\n - Make the 'Reducing compressed framebufer size' message be DRM_INFO_ONCE() (git-fixes).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - media: cedrus: Program output format during each run (git-fixes).\n\n - media: dvb: return -EREMOTEIO on i2c transfer failure (git-fixes).\n\n - media: platform: fcp: Set appropriate DMA parameters (git-fixes).\n\n - media: Revert 'staging: imgu: Address a compiler warning on alignment' (git-fixes).\n\n - media: staging: ipu3: Fix stale list entries on parameter queue failure (git-fixes).\n\n - media: staging: ipu3-imgu: Move alignment attribute to field (git-fixes).\n\n - mei: release me_cl object reference (git-fixes).\n\n - mfd: intel-lpss: Add Intel Tiger Lake PCI IDs (jsc#SLE-12737).\n\n - mfd: intel-lpss: Use devm_ioremap_uc for MMIO (git-fixes).\n\n - mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).\n\n - mfd: stmfx: Reset chip on resume as supply was disabled (git-fixes).\n\n - misc: fastrpc: fix potential fastrpc_invoke_ctx leak (git-fixes).\n\n - misc: rtsx: Add short delay after exit from ASPM (git-fixes).\n\n - mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n\n - mm: adjust vm_committed_as_batch according to vm overcommit policy (bnc#1173271).\n\n - mmc: block: Fix use-after-free issue for rpmb (git-fixes).\n\n - mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of DEFINE_SIMPLE_ATTRIBUTE (git-fixes).\n\n - mmc: fix compilation of user API (git-fixes).\n\n - mmc: meson-mx-sdio: trigger a soft reset after a timeout or CRC error (git-fixes).\n\n - mmc: mmci_sdmmc: fix DMA API warning overlapping mappings (git-fixes).\n\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start point (git-fixes).\n\n - mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (git-fixes).\n\n - mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card() (git-fixes).\n\n - mmc: sdio: Fix several potential memory leaks in mmc_sdio_init_card() (git-fixes).\n\n - mmc: tmio: Further fixup runtime PM management at remove (git-fixes).\n\n - mmc: uniphier-sd: call devm_request_irq() after tmio_mmc_host_probe() (git-fixes).\n\n - mm: do not prepare anon_vma if vma has VM_WIPEONFORK (bsc#1169681).\n\n - mm: memcontrol: fix memory.low proportional distribution (bsc#1168230).\n\n - mm/memremap: drop unused SECTION_SIZE and SECTION_MASK (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).\n\n - mm/memremap_pages: Introduce memremap_compat_align() (bsc#1162400).\n\n - mm/memremap_pages: Kill unused __devm_memremap_pages() (bsc#1162400).\n\n - mm/util.c: make vm_memory_committed() more accurate (bnc#1173271).\n\n - mt76: mt76x02u: Add support for newer versions of the XBox One wifi adapter (git-fixes).\n\n - mtd: Fix mtd not registered due to nvmem name collision (git-fixes).\n\n - mtd: rawnand: brcmnand: correctly verify erased pages (git-fixes).\n\n - mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).\n\n - mtd: rawnand: brcmnand: fix hamming oob layout (git-fixes).\n\n - mtd: rawnand: diskonchip: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).\n\n - mtd: rawnand: ingenic: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: marvell: Fix probe error path (git-fixes).\n\n - mtd: rawnand: marvell: Fix the condition on a return code (git-fixes).\n\n - mtd: rawnand: marvell: Use nand_cleanup() when the device is not yet registered (git-fixes).\n\n - mtd: rawnand: mtk: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: onfi: Fix redundancy detection check (git-fixes).\n\n - mtd: rawnand: orion: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: oxnas: Keep track of registered devices (git-fixes).\n\n - mtd: rawnand: oxnas: Release all devices in the\n _remove() path (git-fixes).\n\n - mtd: rawnand: pasemi: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: plat_nand: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: sharpsl: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: socrates: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: sunxi: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: timings: Fix default tR_max and tCCS_min timings (git-fixes).\n\n - mtd: rawnand: tmio: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: xway: Fix the probe error path (git-fixes).\n\n - mtd: spinand: Propagate ECC information to the MTD structure (git-fixes).\n\n - mtd: spi-nor: intel-spi: Add support for Intel Tiger Lake SPI serial flash (jsc#SLE-12737).\n\n - mwifiex: avoid -Wstringop-overflow warning (git-fixes).\n\n - mwifiex: Fix memory corruption in dump_station (git-fixes).\n\n - net: bcmgenet: correct per TX/RX ring statistics (networking-stable-20_04_27).\n\n - net: dsa: b53: b53_arl_rw_op() needs to select IVL or SVL (networking-stable-20_04_27).\n\n - net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n\n - net: dsa: b53: Lookup VID in ARL searches when VLAN is enabled (networking-stable-20_04_27).\n\n - net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n\n - net: dsa: declare lockless TX feature for slave ports (bsc#1154353).\n\n - net: dsa: mt7530: fix tagged frames pass-through in VLAN-unaware mode (networking-stable-20_04_17).\n\n - net: ena: xdp: update napi budget for DROP and ABORTED (bsc#1154492).\n\n - net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).\n\n - netfilter: connlabels: prefer static lock initialiser (git-fixes).\n\n - netfilter: nf_queue: enqueue skbs with NULL dst (git-fixes).\n\n - netfilter: nf_tables_offload: return EOPNOTSUPP if rule specifies no actions (git-fixes).\n\n - netfilter: nft_tproxy: Fix port selector on Big Endian (git-fixes).\n\n - netfilter: nft_tunnel: add the missing ERSPAN_VERSION nla_policy (git-fixes).\n\n - netfilter: not mark a spinlock as __read_mostly (git-fixes).\n\n - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin (networking-stable-20_04_17).\n\n - net: ipv6: do not consider routes via gateways for anycast address check (networking-stable-20_04_17).\n\n - net/mlx4_en: avoid indirect call in TX completion (networking-stable-20_04_27).\n\n - net/mlx5e: Add missing release firmware call (networking-stable-20_04_17).\n\n - net/mlx5e: Fix pfnum in devlink port attribute (networking-stable-20_04_17).\n\n - net/mlx5e: Fix stats update for matchall classifier (jsc#SLE-8464).\n\n - net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta() (jsc#SLE-8464).\n\n - net/mlx5: Fix cleaning unmanaged flow tables (jsc#SLE-8464).\n\n - net/mlx5: Fix crash upon suspend/resume (bsc#1172365).\n\n - net/mlx5: Fix frequent ioread PCI access during recovery (networking-stable-20_04_17).\n\n - net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node (networking-stable-20_04_27).\n\n - net: openvswitch: ovs_ct_exit to be done under ovs_lock (networking-stable-20_04_27).\n\n - net: phy: propagate an error back to the callers of phy_sfp_probe (bsc#1154353).\n\n - net: qrtr: send msgs from local of same id as broadcast (networking-stable-20_04_17).\n\n - net: revert default NAPI poll timeout to 2 jiffies (networking-stable-20_04_17).\n\n - net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (bnc#1158748 (network regression)).\n\n - net: tun: record RX queue in skb before do_xdp_generic() (networking-stable-20_04_17).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - net/x25: Fix x25_neigh refcnt leak when receiving frame (networking-stable-20_04_27).\n\n - NFC: st21nfca: add missed kfree_skb() in an error path (git-fixes).\n\n - nfs: add minor version to nfs_server_key for fscache (bsc#1172467).\n\n - nfsd4: make drc_slab global, not per-net (git-fixes).\n\n - nfsd: always check return value of find_any_file (bsc#1172208).\n\n - NFS: Fix fscache super_cookie index_key from changing after umount (git-fixes).\n\n - nfs: fix NULL deference in nfs4_get_valid_delegation.\n\n - nfs: fscache: use timespec64 in inode auxdata (git-fixes).\n\n - nfs: set invalid blocks after NFSv4 writes (git-fixes).\n\n - NFSv4.1 fix rpc_call_done assignment for BIND_CONN_TO_SESSION (git-fixes).\n\n - NFSv4: Fix fscache cookie aux_data to ensure change_attr is included (git-fixes).\n\n - ntb: intel: add hw workaround for NTB BAR alignment (jsc#SLE-12710).\n\n - ntb: intel: Add Icelake (gen4) support for Intel NTB (jsc#SLE-12710).\n\n - ntb: intel: fix static declaration (jsc#SLE-12710).\n\n - nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n\n - nvme-fc: avoid gcc-10 zero-length-bounds warning (bsc#1173206).\n\n - nvme-fc: do not call nvme_cleanup_cmd() for AENs (bsc#1171688).\n\n - nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n\n - objtool: Allow no-op CFI ops in alternatives (bsc#1169514).\n\n - objtool: Clean instruction state before each function validation (bsc#1169514).\n\n - objtool: Fix !CFI insn_state propagation (bsc#1169514).\n\n - objtool: Fix ORC vs alternatives (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - objtool: Remove check preventing branches within alternative (bsc#1169514).\n\n - objtool: Rename struct cfi_state (bsc#1169514).\n\n - objtool: Uniquely identify alternative instruction groups (bsc#1169514).\n\n - p54usb: add AirVasT USB stick device-id (git-fixes).\n\n - panic: do not print uninitialized taint_flags (bsc#1172814).\n\n - PCI: Allow pci_resize_resource() for devices on root bus (git-fixes).\n\n - PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up link (git-fixes).\n\n - PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n\n - PCI: brcmstb: Assert fundamental reset on initialization (git-fixes).\n\n - PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n\n - PCI: brcmstb: Fix window register offset from 4 to 8 (git-fixes).\n\n - pcie: mobiveil: remove patchset v9 Prepare to backport upstream version.\n\n - PCI: Fix pci_register_host_bridge() device_register() error handling (git-fixes).\n\n - PCI: mobiveil: Add 8-bit and 16-bit CSR register accessors (bsc#1161495).\n\n - PCI: mobiveil: Add callback function for interrupt initialization (bsc#1161495).\n\n - PCI: mobiveil: Add callback function for link up check (bsc#1161495).\n\n - PCI: mobiveil: Add Header Type field check (bsc#1161495).\n\n - PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape SoCs (bsc#1161495).\n\n - PCI: mobiveil: Allow mobiveil_host_init() to be used to re-init host (bsc#1161495).\n\n - PCI: mobiveil: Collect the interrupt related operations into a function (bsc#1161495).\n\n - PCI: mobiveil: Fix sparse different address space warnings (bsc#1161495).\n\n - PCI: mobiveil: Fix unmet dependency warning for PCIE_MOBIVEIL_PLAT (bsc#1161495).\n\n - PCI: mobiveil: Introduce a new structure mobiveil_root_port (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451 (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577 (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: fix SError when accessing config space (bsc#1161495).\n\n - PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge IP driver (bsc#1161495).\n\n - PCI: mobiveil: Move the host initialization into a function (bsc#1161495).\n\n - PCI/PM: Adjust pcie_wait_for_link_delay() for caller delay (git-fixes).\n\n - PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (git-fixes).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (git-fixes).\n\n - PCI: rcar: Fix incorrect programming of OB windows (git-fixes).\n\n - PCI: v3-semi: Fix a memory leak in v3_pci_probe() error handling paths (git-fixes).\n\n - PCI: vmd: Filter resource type bits from shadow register (git-fixes).\n\n - pcm_native: result of put_user() needs to be checked (git-fixes).\n\n - perf/core: Fix endless multiplex timer (git-fixes).\n\n - perf/core: fix parent pid/tid in task exit events (git-fixes).\n\n - pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (git-fixes).\n\n - pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()' (git-fixes).\n\n - pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (git-fixes).\n\n - pinctrl: intel: Add Intel Tiger Lake pin controller support (jsc#SLE-12737).\n\n - pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2 (git-fixes).\n\n - pinctrl: rza1: Fix wrong array assignment of rza1l_swio_entries (git-fixes).\n\n - pinctrl: samsung: Correct setting of eint wakeup mask on s5pv210 (git-fixes).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (git-fixes).\n\n - pinctrl: sprd: Fix the incorrect pull-up definition (git-fixes).\n\n - pinctrl: stmfx: stmfx_pinconf_set does not require to get direction anymore (git-fixes).\n\n - pinctrl: tigerlake: Tiger Lake uses _HID enumeration (jsc#SLE-12737).\n\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA (git-fixes).\n\n - platform/x86: dell-laptop: do not register micmute LED if there is no token (git-fixes).\n\n - platform/x86: intel-vbtn: Also handle tablet-mode switch on 'Detachable' and 'Portable' chassis-types (git-fixes).\n\n - platform/x86: intel-vbtn: Do not advertise switches to userspace if they are not there (git-fixes).\n\n - platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE on the 9 / 'Laptop' chasis-type (git-fixes).\n\n - platform/x86: intel-vbtn: Split keymap into buttons and switches parts (git-fixes).\n\n - platform/x86: intel-vbtn: Use acpi_evaluate_integer() (git-fixes).\n\n - PM: runtime: clk: Fix clk_pm_runtime_get() error path (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding (git-fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n\n - powerpc/64s/exception: Fix machine check no-loss idle wakeup (bsc#1156395).\n\n - powerpc/64s/kuap: Restore AMR in system reset exception (bsc#1156395).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n\n - powerpc/bpf: Enable bpf_probe_read(, str)() on powerpc again (bsc#1172344).\n\n - powerpc/fadump: Account for memory_limit while reserving memory (jsc#SLE-9099 git-fixes).\n\n - powerpc/fadump: consider reserved ranges while reserving memory (jsc#SLE-9099 git-fixes).\n\n - powerpc/fadump: use static allocation for reserved memory ranges (jsc#SLE-9099 git-fixes).\n\n - powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP (bsc#1156395).\n\n - powerpc/powernv: Fix a warning message (bsc#1156395).\n\n - powerpc/setup_64: Set cache-line-size based on cache-block-size (bsc#1065729).\n\n - powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n\n - power: reset: qcom-pon: reg write mask depends on pon generation (git-fixes).\n\n - power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (git-fixes).\n\n - power: supply: core: fix HWMON temperature labels (git-fixes).\n\n - power: supply: core: fix memory leak in HWMON error path (git-fixes).\n\n - power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (git-fixes).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile (git-fixes).\n\n - printk: queue wake_up_klogd irq_work only if per-CPU areas are ready (bsc#1172095).\n\n - proc/meminfo: avoid open coded reading of vm_committed_as (bnc#1173271).\n\n - pwm: sun4i: Move pwm_calculate() out of spin_lock() (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet Adapter variant (git-fixes).\n\n - r8169: Revive default chip version for r8168 (bsc#1173085).\n\n - raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n\n - random: fix data races at timer_rand_state (bsc#1173438).\n\n - rcu: Avoid data-race in rcu_gp_fqs_check_wake() (bsc#1171828).\n\n - rcu: Fix data-race due to atomic_t copy-by-value (bsc#1171828).\n\n - rcu: Make rcu_read_unlock_special() checks match raise_softirq_irqoff() (bsc#1172046).\n\n - rcu: Simplify rcu_read_unlock_special() deferred wakeups (bsc#1172046).\n\n - rcutorture: Add 100-CPU configuration (bsc#1173068).\n\n - rcutorture: Add worst-case call_rcu() forward-progress results (bsc#1173068).\n\n - rcutorture: Dispense with Dracut for initrd creation (bsc#1173068).\n\n - rcutorture: Make kvm-find-errors.sh abort on bad directory (bsc#1173068).\n\n - rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios (bsc#1173068).\n\n - rcutorture: Summarize summary of build and run results (bsc#1173068).\n\n - rcutorture: Test TREE03 with the threadirqs kernel boot parameter (bsc#1173068).\n\n - rcu: Use *_ONCE() to protect lockless ->expmask accesses (bsc#1171828).\n\n - rcu: Use WRITE_ONCE() for assignments to ->pprev for hlist_nulls (bsc#1173438).\n\n - RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).\n\n - RDMA/core: Move and rename trace_cm_id_create() (jsc#SLE-8449).\n\n - RDMA/mlx5: Fix NULL pointer dereference in destroy_prefetch_work (jsc#SLE-8446).\n\n - RDMA/nl: Do not permit empty devices names during RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).\n\n - RDMA/srpt: Fix disabling device management (jsc#SLE-8449).\n\n - RDMA/uverbs: Make the event_queue fds return POLLERR when disassociated (jsc#SLE-8449).\n\n - remoteproc: Add missing '\\n' in log messages (git-fixes).\n\n - remoteproc: Fall back to using parent memory pool if no dedicated available (git-fixes).\n\n - remoteproc: Fix and restore the parenting hierarchy for vdev (git-fixes).\n\n - remoteproc: Fix IDR initialisation in rproc_alloc() (git-fixes).\n\n - Revert 'drm/amd/display: disable dcn20 abm feature for bring up' (git-fixes).\n\n - Revert 'fs/seq_file.c: seq_read(): add info message about buggy .next functions' (bsc#1172751) The message floods dmesg and its benefit is marginal in default kernel.\n\n - Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid a resource leak in case of error in 'imx_pinctrl_probe()'' (git-fixes).\n\n - rpm/kernel-source.spec.in: Add obsolete_rebuilds (boo#1172073).\n\n - rpm/modules.fips: * add aes-ce-ccm and des3_ede-x86_64 (boo#173030) * add aes_ti and aes_neon_bs (boo#1172956)\n\n - rtc: mc13xxx: fix a double-unlock issue (git-fixes).\n\n - rtc: rv3028: Add missed check for devm_regmap_init_i2c() (git-fixes).\n\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (git-fixes).\n\n - rtw88: fix an issue about leak system resources (git-fixes).\n\n - rxrpc: Fix call RCU cleanup using non-bh-safe locks (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194, LTC#185911).\n\n - s390/pci: Log new handle in clp_disable_fh() (git-fixes).\n\n - sched/cfs: change initial value of runnable_avg (bsc#1158765).\n\n - sched/core: Check cpus_mask, not cpus_ptr in\n __set_cpus_allowed_ptr(), to fix mask corruption (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/core: Fix PI boosting between RT and DEADLINE tasks (bsc#1172823).\n\n - sched/core: Fix PI boosting between RT and DEADLINE tasks (git fixes (sched)).\n\n - sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/deadline: Initialize ->dl_boosted (bsc#1172823).\n\n - sched/deadline: Initialize ->dl_boosted (git fixes (sched)).\n\n - sched: etf: do not assume all sockets are full blown (networking-stable-20_04_27).\n\n - sched/fair: find_idlest_group(): Remove unused sd_flag parameter (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: Fix enqueue_task_fair() warning some more (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: fix nohz next idle balance (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: Optimize dequeue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: Optimize enqueue_task_fair() (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched/fair: Simplify the code of should_we_balance() (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched: Make newidle_balance() static again (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - sched: Offload wakee task activation if it the wakee is descheduling (bnc#1158748, bnc#1159781).\n\n - sched: Optimize ttwu() spinning on p->on_cpu (bnc#1158748, bnc#1159781).\n\n - sched/pelt: Sync util/runnable_sum with PELT window when propagating (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n\n - scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Change default queue allocation for reduced memory consumption (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Copyright updates for 12.6.0.4 patches (bsc#1171530).\n\n - scsi: lpfc: fix build failure with DEBUGFS disabled (bsc#1171530).\n\n - scsi: lpfc: Fix incomplete NVME discovery when target (bsc#1171530).\n\n - scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set func (bsc#1171530).\n\n - scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix noderef and address space warnings (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: fix spelling mistakes of asynchronous (bsc#1171530).\n\n - scsi: lpfc: Maintain atomic consistency of queue_claimed flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Make lpfc_defer_acc_rsp static (bsc#1171530).\n\n - scsi: lpfc: remove duplicate unloading checks (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove re-binding of nvme rport during registration (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).\n\n - scsi: qla2xxx: Delete all sessions before unregister local nvme port (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n\n - scsi: qla2xxx: Do not log message when reading port speed via sysfs (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334 bsc#1157169).\n\n - scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).\n\n - scsi: smartpqi: Update attribute name to `driver_version` (bsc#1173206).\n\n - scsi: zfcp: add diagnostics buffer for exchange config data (bsc#1158050).\n\n - scsi: zfcp: auto variables for dereferenced structs in open port handler (bsc#1158050).\n\n - scsi: zfcp: diagnostics buffer caching and use for exchange port data (bsc#1158050).\n\n - scsi: zfcp: enhance handling of FC Endpoint Security errors (bsc#1158050).\n\n - scsi: zfcp: expose fabric name as common fc_host sysfs attribute (bsc#1158050).\n\n - scsi: zfcp: Fence adapter status propagation for common statuses (bsc#1158050).\n\n - scsi: zfcp: Fence early sysfs interfaces for accesses of shost objects (bsc#1158050).\n\n - scsi: zfcp: Fence fc_host updates during link-down handling (bsc#1158050).\n\n - scsi: zfcp: fix fc_host attributes that should be unknown on local link down (bsc#1158050).\n\n - scsi: zfcp: fix wrong data and display format of SFP+ temperature (bsc#1158050).\n\n - scsi: zfcp: implicitly refresh config-data diagnostics when reading sysfs (bsc#1158050).\n\n - scsi: zfcp: implicitly refresh port-data diagnostics when reading sysfs (bsc#1158050).\n\n - scsi: zfcp: introduce sysfs interface for diagnostics of local SFP transceiver (bsc#1158050).\n\n - scsi: zfcp: introduce sysfs interface to read the local B2B-Credit (bsc#1158050).\n\n - scsi: zfcp: log FC Endpoint Security errors (bsc#1158050).\n\n - scsi: zfcp: log FC Endpoint Security of connections (bsc#1158050).\n\n - scsi: zfcp: Move allocation of the shost object to after xconf- and xport-data (bsc#1158050).\n\n - scsi: zfcp: Move fc_host updates during xport data handling into fenced function (bsc#1158050).\n\n - scsi: zfcp: move maximum age of diagnostic buffers into a per-adapter variable (bsc#1158050).\n\n - scsi: zfcp: Move p-t-p port allocation to after xport data (bsc#1158050).\n\n - scsi: zfcp: Move shost modification after QDIO (re-)open into fenced function (bsc#1158050).\n\n - scsi: zfcp: Move shost updates during xconfig data handling into fenced function (bsc#1158050).\n\n - scsi: zfcp: proper indentation to reduce confusion in zfcp_erp_required_act (bsc#1158050).\n\n - scsi: zfcp: report FC Endpoint Security in sysfs (bsc#1158050).\n\n - scsi: zfcp: signal incomplete or error for sync exchange config/port data (bsc#1158050).\n\n - scsi: zfcp: support retrieval of SFP Data via Exchange Port Data (bsc#1158050).\n\n - scsi: zfcp: trace FC Endpoint Security of FCP devices and connections (bsc#1158050).\n\n - scsi: zfcp: wire previously driver-specific sysfs attributes also to fc_host (bsc#1158050).\n\n - selftests/bpf: CONFIG_IPV6_SEG6_BPF required for test_seg6_loop.o (bsc#1155518).\n\n - selftests/bpf: CONFIG_LIRC required for test_lirc_mode2.sh (bsc#1155518).\n\n - selftests/bpf: Fix invalid memory reads in core_relo selftest (bsc#1155518).\n\n - selftests/bpf: Fix memory leak in extract_build_id() (bsc#1155518).\n\n - selftests/bpf, flow_dissector: Close TAP device FD after the test (bsc#1155518).\n\n - selftests/timens: handle a case when alarm clocks are not supported (bsc#1164648,jsc#SLE-11493).\n\n - serial: 8250: Fix max baud limit in generic 8250 port (git-fixes).\n\n - slimbus: core: Fix mismatch in of_node_get/put (git-fixes).\n\n - soc: mediatek: cmdq: return send msg error code (git-fixes).\n\n - soc: qcom: rpmh: Dirt can only make you dirtier, not cleaner (git-fixes).\n\n - soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before flushing new data (git-fixes).\n\n - soc: qcom: rpmh-rsc: Allow using free WAKE TCS for active request (git-fixes).\n\n - soc: qcom: rpmh-rsc: Clear active mode configuration for wake TCS (git-fixes).\n\n - soc: qcom: rpmh: Update dirty flag only when data changes (git-fixes).\n\n - soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).\n\n - spi: bcm2835aux: Fix controller unregister order (git-fixes).\n\n - spi: bcm2835: Fix controller unregister order (git-fixes).\n\n - spi: bcm-qspi: Handle clock probe deferral (git-fixes).\n\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (git-fixes).\n\n - SPI: designware: pci: Switch over to MSI interrupts (jsc#SLE-12735).\n\n - spi: dt-bindings: spi-controller: Fix #address-cells for slave mode (git-fixes).\n\n - spi: dw: Add SPI Rx-done wait method to DMA-based transfer (git-fixes).\n\n - spi: dw: Add SPI Tx-done wait method to DMA-based transfer (git-fixes).\n\n - spi: dw: Fix controller unregister order (git-fixes).\n\n - spi: dw: Fix native CS being unset (git-fixes).\n\n - spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).\n\n - spi: dw-pci: Add runtime power management support (jsc#SLE-12735).\n\n - spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n\n - spi: dw-pci: Fix Chip Select amount on Intel Elkhart Lake PSE SPI (jsc#SLE-12735).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error (git-fixes).\n\n - spi: dw: Zero DMA Tx and Rx configurations on stack (git-fixes).\n\n - spi: Fix controller unregister order (git-fixes).\n\n - spi: fsl: do not map irq during probe (git-fixes).\n\n - spi: fsl: use platform_get_irq() instead of of_irq_to_resource() (git-fixes).\n\n - spi: pxa2xx: Fix controller unregister order (git-fixes).\n\n - spi: pxa2xx: Fix runtime PM ref imbalance on probe error (git-fixes).\n\n - spi: Respect DataBitLength field of SpiSerialBusV2() ACPI resource (git-fixes).\n\n - spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and SPI_CTAR_* macros (git-fixes).\n\n - spi: spi-fsl-dspi: Do not access reserved fields in SPI_MCR (git-fixes).\n\n - spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI mode (git-fixes).\n\n - spi: spi-fsl-dspi: Replace interruptible wait queue with a simple completion (git-fixes).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (git-fixes).\n\n - staging: iio: ad2s1210: Fix SPI reading (git-fixes).\n\n - staging: kpc2000: fix error return code in kp2000_pcie_probe() (git-fixes).\n\n - staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).\n\n - staging: sm750fb: add missing case while setting FB_VISUAL (git-fixes).\n\n - sun6i: dsi: fix gcc-4.8 (bsc#1152489)\n\n - SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).\n\n - supported.conf: Add pinctrl-tigerlake as supported\n\n - supported.conf: Mark two hwtracing helper modules as externally supported (bsc#1170879)\n\n - svcrdma: Fix leak of svc_rdma_recv_ctxt objects (git-fixes).\n\n - tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n\n - team: fix hang in team_mode_get() (networking-stable-20_04_27).\n\n - thermal: intel: intel_pch_thermal: Add Comet Lake (CML) platform support (jsc#SLE-12668).\n\n - tick/sched: Annotate lockless access to last_jiffies_update (bsc#1173438).\n\n - timer: Use hlist_unhashed_lockless() in timer_pending() (bsc#1173438).\n\n - torture: Allow 'CFLIST' to specify default list of scenarios (bsc#1173068).\n\n - torture: Expand last_ts variable in kvm-test-1-run.sh (bsc#1173068).\n\n - torture: Handle jitter for CPUs that cannot be offlined (bsc#1173068).\n\n - torture: Handle systems lacking the mpstat command (bsc#1173068).\n\n - torture: Hoist calls to lscpu to higher-level kvm.sh script (bsc#1173068).\n\n - torture: Make results-directory date format completion-friendly (bsc#1173068).\n\n - torture: Use gawk instead of awk for systime() function (bsc#1173068).\n\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).\n\n - tty: n_gsm: Fix SOF skipping (git-fixes).\n\n - tty: n_gsm: Fix waking up upper tty layer when room available (git-fixes).\n\n - tty: serial: add missing spin_lock_init for SiFive serial console (git-fixes).\n\n - tun: correct header offsets in napi frags mode (git-fixes).\n\n - Update config files: Add CONFIG_PINCTRL_TIGERLAKE=m\n\n - Update patch reference for intel_th patch (jsc#SLE-12705)\n\n - Update the patch reference for ish-hid fix (jsc#SLE-12683)\n\n - usb: core: Fix misleading driver bug report (git-fixes).\n\n - usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to USB5534B (git-fixes).\n\n - usb: dwc2: gadget: move gadget resume after the core is in L0 state (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n\n - usb: dwc3: pci: Enable extcon driver for Intel Merrifield (git-fixes).\n\n - usb: gadget: audio: Fix a missing error return value in audio_bind() (git-fixes).\n\n - usb: gadget: fix illegal array access in binding with UDC (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe (git-fixes).\n\n - usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n\n - usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n\n - usb: gadget: legacy: fix redundant initialization warnings (git-fixes).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (git-fixes).\n\n - usb: gadget: net2272: Fix a memory leak in an error handling path in 'net2272_plat_probe()' (git-fixes).\n\n - usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (git-fixes).\n\n - usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (git-fixes).\n\n - usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n\n - usb: musb: Fix runtime PM imbalance on error (git-fixes).\n\n - usb: musb: start session in resume for host port (git-fixes).\n\n - usb: ohci-sm501: fix error return code in ohci_hcd_sm501_drv_probe() (git-fixes).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions (git-fixes).\n\n - usb: serial: qcserial: add DW5816e QDL support (git-fixes).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n\n - usb: usbfs: correct kernel->user page attribute mismatch (git-fixes).\n\n - usb: usbfs: fix mmap dma mismatch (git-fixes).\n\n - vfio: avoid possible overflow in vfio_iommu_type1_pin_pages (git-fixes).\n\n - vfio: Ignore -ENODEV when getting MSI cookie (git-fixes).\n\n - vfio/mdev: Fix reference count leak in add_mdev_supported_type (git-fixes).\n\n - vfio/pci: fix memory leaks in alloc_perm_bits() (git-fixes).\n\n - vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (git-fixes).\n\n - video: fbdev: w100fb: Fix a potential double free (git-fixes).\n\n - virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n\n - vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n\n - vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n\n - vrf: Fix IPv6 with qdisc and xfrm (networking-stable-20_04_27).\n\n - vsprintf: do not obfuscate NULL and error pointers (bsc#1172086).\n\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n\n - vxlan: use the correct nlattr array in NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).\n\n - w1: omap-hdq: cleanup to add missing newline for some dev_dbg (git-fixes).\n\n - watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).\n\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()' (git-fixes).\n\n - wireguard: device: avoid circular netns references (git-fixes).\n\n - wireguard: noise: do not assign initiation time in if condition (git-fixes).\n\n - wireguard: noise: read preshared key while taking lock (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: noise: separate receive counter from send counter (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: queueing: preserve flow hash across packet scrubbing (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: receive: account for napi_gro_receive never returning GRO_DROP (git-fixes).\n\n - wireguard: selftests: use newer iproute2 for gcc-10 (bsc#1169021 jsc#SLE-12250).\n\n - work around mvfs bug (bsc#1162063).\n\n - workqueue: do not use wq_select_unbound_cpu() for bound works (git-fixes).\n\n - workqueue: Remove the warning in wq_worker_sleeping() (git-fixes).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1152489).\n\n - x86: Fix early boot crash on gcc-10, third try (bsc#1152489).\n\n - x86/mm/cpa: Flush direct map alias during cpa (bsc#1152489).\n\n - x86/PCI: Mark Intel C620 MROMs as having non-compliant BARs (git-fixes).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk (git-fixes).\n\n - x86/resctrl: Fix invalid attempt at removing the default resource group (bsc#1152489).\n\n - x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1152489).\n\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks (bsc#1058115).\n\n - xfrm: Always set XFRM_TRANSFORMED in xfrm(4,6)_output_finish (networking-stable-20_04_27).\n\n - xfrm: fix error in comment (git fixes (block drivers)).\n\n - xfs: clean up the error handling in xfs_swap_extents (git-fixes).\n\n - xfs: do not commit sunit/swidth updates to disk if that would cause repair failures (bsc#1172169).\n\n - xfs: do not fail unwritten extent conversion on writeback due to edquot (bsc#1158242).\n\n - xfs: fix duplicate verification from xfs_qm_dqflush() (git-fixes).\n\n - xfs: force writes to delalloc regions to unwritten (bsc#1158242).\n\n - xfs: measure all contiguous previous extents for prealloc size (bsc#1158242).\n\n - xfs: preserve default grace interval during quotacheck (bsc#1172170).\n\n - xfs: refactor agfl length computation function (bsc#1172169).\n\n - xfs: split the sunit parameter update into two parts (bsc#1172169).\n\n - wireguard: selftests: initalize ipv6 members to NULL to squelch clang warning (git-fixes).", "cvss3": {}, "published": "2020-07-20T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-935)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19462", "CVE-2019-20810", "CVE-2019-20812", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-12656", "CVE-2020-12769", "CVE-2020-12888", "CVE-2020-13143", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2020-07-22T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-base-rebuild", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-preempt", "p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo", "p-cpe:/a:novell:opensuse:kernel-preempt-debugsource", "p-cpe:/a:novell:opensuse:kernel-preempt-devel", "p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "cpe:/o:novell:opensuse:15.2"], "id": "OPENSUSE-2020-935.NASL", "href": "https://www.tenable.com/plugins/nessus/138727", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-935.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138727);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/22\");\n\n script_cve_id(\"CVE-2019-19462\", \"CVE-2019-20810\", \"CVE-2019-20812\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10773\", \"CVE-2020-12656\", \"CVE-2020-12769\", \"CVE-2020-12888\", \"CVE-2020-13143\", \"CVE-2020-13974\", \"CVE-2020-14416\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-935)\");\n script_summary(english:\"Check for the openSUSE-2020-935 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.2 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed\n local users to cause a denial of service (such as relay\n blockage) by triggering a NULL alloc_percpu result\n (bnc#1158265).\n\n - CVE-2019-20810: go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c did not call\n snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function\n in net/packet/af_packet.c can result in a denial of\n service (CPU consumption and soft lockup) in a certain\n failure case involving TPACKET_V3, aka CID-b43d1f9f7067\n (bnc#1172453).\n\n - CVE-2020-10711: A NULL pointer dereference flaw was\n found in the Linux kernel's SELinux subsystem. This flaw\n occurs while importing the Commercial IP Security Option\n (CIPSO) protocol's category bitmap into the SELinux\n extensible bitmap via the' ebitmap_netlbl_import'\n routine. While processing the CIPSO restricted bitmap\n tag in the 'cipso_v4_parsetag_rbm' routine, it sets the\n security attribute to indicate that the category bitmap\n is present, even if it has not been allocated. This\n issue leads to a NULL pointer dereference issue while\n importing the same category bitmap into SELinux. This\n flaw allowed a remote network user to crash the system\n kernel, resulting in a denial of service (bnc#1171191).\n\n - CVE-2020-10732: A flaw was found in the implementation\n of Userspace core dumps. This flaw allowed an attacker\n with a local account to crash a trivial program and\n exfiltrate private kernel data (bnc#1171220).\n\n - CVE-2020-10751: SELinux LSM hook implementation before\n version 5.7, where it incorrectly assumed that an skb\n would only contain a single netlink message. The hook\n would incorrectly only validate the first netlink\n message in the skb and allow or deny the rest of the\n messages within the skb with the granted permission\n without further processing (bnc#1171189).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn\n off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed that Indirect Branch Prediction\n Barrier is force-disabled when STIBP is unavailable or\n enhanced IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed that indirect branch speculation\n can be enabled after it was force-disabled by the\n PR_SPEC_FORCE_DISABLE prctl command (bnc#1172783).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on\n s390/s390x. (bnc#1172999).\n\n - CVE-2020-12656: Fixed a memory leak in gss_mech_free in\n the rpcsec_gss_krb5 implementation due to lack of\n certain domain_release calls (bnc#1171219).\n\n - CVE-2020-12769: An issue was discovered in\n drivers/spi/spi-dw.c allowed attackers to cause a panic\n via concurrent calls to dw_spi_irq and\n dw_spi_transfer_one, aka CID-19b61392c5a8 (bnc#1171983).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts\n to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13143: gadget_dev_desc_UDC_store in\n drivers/usb/gadget/configfs.c relied on kstrdup without\n considering the possibility of an internal '\\0' value,\n which allowed attackers to trigger an out-of-bounds\n read, aka CID-15753588bcd4 (bnc#1171982).\n\n - CVE-2020-13974: tty/vt/keyboard.c had an integer\n overflow if k_ascii is called several times in a row,\n aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14416: A race condition in tty->disc_data\n handling in the slip and slcan line discipline could\n lead to a use-after-free, aka CID-0ace17d56824. This\n affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c (bnc#1162002).\n\nThe following non-security bugs were fixed :\n\n - ACPICA: Fixes for acpiExec namespace init file\n (git-fixes).\n\n - ACPI: CPPC: Fix reference count leak in\n acpi_cppc_processor_probe() (git-fixes).\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods\n (git-fixes).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx\n handling (git-fixes).\n\n - ACPI: PM: Avoid using power resources if there are none\n for D0 (git-fixes).\n\n - ACPI: sysfs: Fix reference count leak in\n acpi_sysfs_add_hotplug_profile() (git-fixes).\n\n - af_unix: add compat_ioctl support (git-fixes).\n\n - agp/intel: Reinforce the barrier after GTT updates\n (git-fixes).\n\n - ALSA: emu10k1: delete an unnecessary condition\n (git-fixes).\n\n - ALSA: es1688: Add the missed snd_card_free()\n (git-fixes).\n\n - ALSA: fireface: fix configuration error for nominal\n sampling transfer frequency (git-fixes).\n\n - ALSA: firewire-lib: fix invalid assignment to union data\n for directional parameter (git-fixes).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (git-fixes).\n\n - ALSA: hda: add member to store ratio for stripe control\n (git-fixes).\n\n - ALSA: hda: add sienna_cichlid audio asic id for\n sienna_cichlid up (git-fixes).\n\n - ALSA: hda: Fix potential race in unsol event handler\n (git-fixes).\n\n - ALSA: hda/realtek - Add a model for Thinkpad T570\n without DAC workaround (bsc#1172017).\n\n - ALSA: hda/realtek - add a pintbl quirk for several\n Lenovo machines (git-fixes).\n\n - ALSA: hda/realtek - Add LED class support for micmute\n LED (git-fixes).\n\n - ALSA: hda/realtek - Add more fixup entries for Clevo\n machines (git-fixes).\n\n - ALSA: hda/realtek - Add new codec supported for ALC287\n (git-fixes).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system\n (git-fixes).\n\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570\n Aorus Xtreme (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o\n CONFIG_LEDS_TRIGGER_AUDIO (git-fixes).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED\n GPIO (git-fixes).\n\n - ALSA: hda/tegra: correct number of SDO lines for\n Tegra194 (git-fixes).\n\n - ALSA: hda/tegra: workaround playback failure on Tegra194\n (git-fixes).\n\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug\n (git-fixes).\n\n - ALSA: iec1712: Initialize STDSP24 properly when using\n the model=staudio option (git-fixes).\n\n - ALSA: pcm: disallow linking stream to itself\n (git-fixes).\n\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n\n - ALSA: pcm: fix snd_pcm_link() lockdep splat (git-fixes).\n\n - ALSA: usb-audio: Add duplex sound support for USB\n devices using implicit feedback (git-fixes).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support\n (git-fixes).\n\n - ALSA: usb-audio: Add vendor, product and profile name\n for HP Thunderbolt Dock (git-fixes).\n\n - ALSA: usb-audio: Clean up quirk entries with macros\n (git-fixes).\n\n - ALSA: usb-audio: Fix a limit check in\n proc_dump_substream_formats() (git-fixes).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after\n resume (git-fixes).\n\n - ALSA: usb-audio: fixing upper volume limit for RME\n Babyface Pro routing crosspoints (git-fixes).\n\n - ALSA: usb-audio: Fixing usage of plain int instead of\n NULL (git-fixes).\n\n - ALSA: usb-audio: Fix racy list management in output\n queue (git-fixes).\n\n - ALSA: usb-audio: Improve frames size computation\n (git-fixes).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled\n interfaces (git-fixes).\n\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology\n Asus USB DAC (git-fixes).\n\n - ALSA: usb-audio: Print more information in stream proc\n files (git-fixes).\n\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master\n onboard audio (git-fixes).\n\n - ALSA: usb-audio: Remove async workaround for Scarlett\n 2nd gen (git-fixes).\n\n - ALSA: usb-audio: RME Babyface Pro mixer patch\n (git-fixes).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename\n quirks (git-fixes).\n\n - amd-xgbe: Use __napi_schedule() in BH context\n (networking-stable-20_04_17).\n\n - arm64: map FDT as RW for early_init_dt_scan()\n (jsc#SLE-12424).\n\n - ARM: oxnas: make ox820_boot_secondary static\n (git-fixes).\n\n - asm-gemeric/tlb: remove stray function declarations\n (bsc#1156395).\n\n - ASoC: fix incomplete error-handling in img_i2s_in_probe\n (git-fixes).\n\n - ASoC: Intel: bytcr_rt5640: Add quirk for Toshiba Encore\n WT10-A tablet (git-fixes).\n\n - ASoC: intel: cht_bsw_max98090_ti: Add all Chromebooks\n that need pmc_plt_clk_0 quirk (bsc#1171246).\n\n - ASoC: intel - fix the card names (git-fixes).\n\n - ASoC: max9867: fix volume controls (git-fixes).\n\n - ASoC: meson: add missing free_irq() in error path\n (git-fixes).\n\n - ASoC: rt5645: Add platform-data for Asus T101HA\n (git-fixes).\n\n - ASoC: SOF: core: fix error return code in\n sof_probe_continue() (git-fixes).\n\n - ASoC: ux500: mop500: Fix some refcounted resources\n issues (git-fixes).\n\n - ath10k: Remove ath10k_qmi_register_service_notifier()\n declaration (git-fixes).\n\n - ath10k: remove the max_sched_scan_reqs value\n (git-fixes).\n\n - ath10k: Skip handling del_server during driver exit\n (git-fixes).\n\n - ath9k: Fix general protection fault in\n ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx\n (git-fixes).\n\n - ath9k: Fix use-after-free Read in htc_connect_service\n (git-fixes).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg\n (git-fixes).\n\n - ath9k_htc: Silence undersized packet warnings\n (git-fixes).\n\n - ath9x: Fix stack-out-of-bounds Write in\n ath9k_hif_usb_rx_cb (git-fixes).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE) (git-fixes).\n\n - b43legacy: Fix case where channel status is corrupted\n (git-fixes).\n\n - bfq: Avoid false bfq queue merging (bsc#1171513).\n\n - bfq: Fix check detecting whether waker queue should be\n selected (bsc#1168838).\n\n - bfq: Use only idle IO periods for think time\n calculations (bsc#1171513).\n\n - bfq: Use 'ttime' local variable (bsc#1171513).\n\n - blk-iocost: Fix error on iocost_ioc_vrate_adj\n (bsc#1173206).\n\n - blk-iocost: fix incorrect vtime comparison in\n iocg_is_idle() (bsc#1173206).\n\n - bluetooth: btmtkuart: Improve exception handling in\n btmtuart_probe() (git-fixes).\n\n - bluetooth: hci_bcm: fix freeing not-requested IRQ\n (git-fixes).\n\n - bnxt_en: Improve TQM ring context memory sizing formulas\n (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Fix map permissions check (bsc#1155518).\n\n - bpf: Prevent mmap()'ing read-only maps as writable\n (bsc#1155518).\n\n - bpf: Restrict bpf_probe_read(, str)() only to archs\n where they work (bsc#1172344).\n\n - bpf, sockhash: Synchronize_rcu before free'ing map\n (git-fixes).\n\n - bpf, sockmap: Check update requirements after locking\n (git-fixes).\n\n - bpf: Undo internal BPF_PROBE_MEM in BPF insns dump\n (bsc#1155518).\n\n - brcmfmac: fix wrong location to get firmware feature\n (git-fixes).\n\n - btrfs: fix log context list corruption after rename\n whiteout error (bsc#1172342).\n\n - btrfs: fix partial loss of prealloc extent past i_size\n after fsync (bsc#1172343).\n\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots\n to prevent runaway balance (bsc#1171417 bsc#1160947\n bsc#1172366).\n\n - btrfs: reloc: fix reloc root leak and NULL pointer\n dereference (bsc#1171417 bsc#1160947 bsc#1172366).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: add comments for handle_cap_flush_ack logic\n (bsc#1172940).\n\n - ceph: allow rename operation under different quota\n realms (bsc#1172988).\n\n - ceph: ceph_kick_flushing_caps needs the s_mutex\n (bsc#1172986).\n\n - ceph: convert mdsc->cap_dirty to a per-session list\n (bsc#1172984 bsc#1167104).\n\n - ceph: document what protects i_dirty_item and\n i_flushing_item (bsc#1172940).\n\n - ceph: do not release i_ceph_lock in handle_cap_trunc\n (bsc#1172940).\n\n - ceph: do not return -ESTALE if there's still an open\n file (bsc#1171915).\n\n - ceph: do not take i_ceph_lock in handle_cap_import\n (bsc#1172940).\n\n - ceph: fix potential race in ceph_check_caps\n (bsc#1172940).\n\n - ceph: flush release queue when handling caps for unknown\n inode (bsc#1172939).\n\n - ceph: make sure mdsc->mutex is nested in s->s_mutex to\n fix dead lock (bsc#1172989).\n\n - ceph: normalize 'delta' parameter usage in\n check_quota_exceeded (bsc#1172987).\n\n - ceph: reorganize __send_cap for less spinlock abuse\n (bsc#1172940).\n\n - ceph: request expedited service on session's last cap\n flush (bsc#1172985 bsc#1167104).\n\n - ceph: reset i_requested_max_size if file write is not\n wanted (bsc#1172983).\n\n - ceph: skip checking caps when session reconnecting and\n releasing reqs (bsc#1172990).\n\n - ceph: split up __finish_cap_flush (bsc#1172940).\n\n - ceph: throw a warning if we destroy session with mutex\n still locked (bsc#1172940).\n\n - char/random: Add a newline at the end of the file\n (jsc#SLE-12424).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate\n (git-fixes).\n\n - clk: bcm2835: Remove casting to bcm2835_clk_register\n (git-fixes).\n\n - clk: clk-flexgen: fix clock-critical handling\n (git-fixes).\n\n - clk: mediatek: assign the initial value to clk_init_data\n of mtk_mux (git-fixes).\n\n - clk: meson: meson8b: Do not rely on u-boot to init all\n GP_PLL registers (git-fixes).\n\n - clk: meson: meson8b: Fix the polarity of the RESET_N\n lines (git-fixes).\n\n - clk: meson: meson8b: Fix the vclk_div(1, 2, 4, 6, 12)_en\n gate bits (git-fixes).\n\n - clk: qcom: Add missing msm8998 ufs_unipro_core_clk_src\n (git-fixes).\n\n - clk: renesas: cpg-mssr: Fix STBCR suspend/resume\n handling (git-fixes).\n\n - clk: samsung: Mark top ISP and CAM clocks on Exynos542x\n as critical (git-fixes).\n\n - clk: sprd: return correct type of value for\n _sprd_pll_recalc_rate (git-fixes).\n\n - clk: sunxi: Fix incorrect usage of round_down()\n (git-fixes).\n\n - clk: ti: am33xx: fix RTC clock parent (git-fixes).\n\n - clocksource: dw_apb_timer_of: Fix missing clockevent\n timers (git-fixes).\n\n - component: Silence bind error on -EPROBE_DEFER\n (git-fixes).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH\n References: bsc#1172739\n\n - coredump: fix crash when umh is disabled (git-fixes).\n\n - coredump: fix NULL pointer dereference on coredump\n (git-fixes).\n\n - crypto: algapi - Avoid spurious modprobe on LOADED\n (git-fixes).\n\n - crypto: algboss - do not wait during notifier callback\n (git-fixes).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()'\n when ndevlist is fully iterated (git-fixes).\n\n - crypto: ccp -- do not 'select' CONFIG_DMADEVICES\n (git-fixes).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime\n (git-fixes).\n\n - crypto: drbg - fix error return code in\n drbg_alloc_state() (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON()\n (git-fixes).\n\n - crypto: stm32/crc32 - fix multi-instance (git-fixes).\n\n - crypto: stm32/crc32 - fix run-time self test issue\n (git-fixes).\n\n - cxgb4: fix adapter crash due to wrong MC size\n (networking-stable-20_04_27).\n\n - cxgb4: fix large delays in PTP synchronization\n (networking-stable-20_04_27).\n\n - Delete\n patches.suse/seltests-powerpc-Add-a-selftest-for-memcpy_\n mcsafe.patch (bsc#1171699).\n\n - dma-coherent: fix integer overflow in the\n reserved-memory dma allocation (git-fixes).\n\n - dma-debug: fix displaying of dma allocation type\n (git-fixes).\n\n - dma-direct: fix data truncation in\n dma_direct_get_required_mask() (git-fixes).\n\n - dmaengine: dmatest: Fix process hang when reading 'wait'\n parameter (git-fixes).\n\n - dmaengine: dmatest: Restore default for channel\n (git-fixes).\n\n - dmaengine: mmp_tdma: Do not ignore slave config\n validation errors (git-fixes).\n\n - dmaengine: mmp_tdma: Reset channel error on release\n (git-fixes).\n\n - dmaengine: owl: Use correct lock in owl_dma_get_pchan()\n (git-fixes).\n\n - dmaengine: pch_dma.c: Avoid data race between probe and\n irq handler (git-fixes).\n\n - dmaengine: tegra210-adma: Fix an error handling path in\n 'tegra_adma_probe()' (git-fixes).\n\n - dm verity fec: fix hash block number in\n verity_fec_decode (git fixes (block drivers)).\n\n - dm writecache: fix data corruption when reloading the\n target (git fixes (block drivers)).\n\n - drivers/net/ibmvnic: Update VNIC protocol version\n reporting (bsc#1065729).\n\n - drivers: phy: sr-usb: do not use internal fsm for USB2\n phy init (git-fixes).\n\n - drivers: soc: ti: knav_qmss_queue: Make\n knav_gp_range_ops static (git-fixes).\n\n - drm/amd/display: add basic atomic check for cursor plane\n (git-fixes).\n\n - drm/amd/display: drop cursor position check in atomic\n test (git-fixes).\n\n - drm/amd/display: Prevent dpcd reads with passive dongles\n (git-fixes).\n\n - drm/amdgpu: force fbdev into vram (bsc#1152472) 	*\n context changes\n\n - drm/amdgpu: invalidate L2 before SDMA IBs (v2)\n (git-fixes).\n\n - drm/amdgpu: simplify padding calculations (v2)\n (git-fixes).\n\n - drm/amd/powerplay: avoid using pm_en before it is\n initialized revised (git-fixes).\n\n - drm/amd/powerplay: perform PG ungate prior to CG ungate\n (git-fixes).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s\n (bsc#1152472) 	* context changes\n\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit\n (git-fixes).\n\n - drm/edid: Add Oculus Rift S to non-desktop list\n (git-fixes).\n\n - drm: encoder_slave: fix refcouting error for modules\n (git-fixes).\n\n - drm/etnaviv: fix perfmon domain interation (git-fixes).\n\n - drm/etnaviv: rework perfmon query infrastructure\n (git-fixes).\n\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when\n IPC is (bsc#1152489)\n\n - drm/i915: Do not enable WaIncreaseLatencyIPCEnabled when\n IPC is disabled (git-fixes).\n\n - drm/i915: extend audio CDCLK>=2*BCLK constraint to more\n platforms (git-fixes).\n\n - drm/i915: Extend WaDisableDARBFClkGating to icl,ehl,tgl\n (bsc#1152489)\n\n - drm/i915: fix port checks for MST support on gen >= 11\n (git-fixes).\n\n - drm/i915/gem: Avoid iterating an empty list (git-fixes).\n\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest\n (bsc#1152489)\n\n - drm/i915/gvt: Fix kernel oops for 3-level ppgtt guest\n (git-fixes).\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display\n instead of (bsc#1152489)\n\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display\n instead of inheritance (git-fixes).\n\n - drm/i915: HDCP: fix Ri prime check done during link\n check (bsc#1152489) 	* context changes\n\n - drm/i915: HDCP: fix Ri prime check done during link\n check (git-fixes).\n\n - drm/i915: Limit audio CDCLK>=2*BCLK constraint back to\n GLK only (git-fixes).\n\n - drm/i915: Propagate error from completed fences\n (git-fixes).\n\n - drm/i915: Whitelist context-local timestamp in the gen9\n cmdparser (git-fixes).\n\n - drm/i915: work around false-positive maybe-uninitialized\n warning (git-fixes).\n\n - drm/mcde: dsi: Fix return value check in mcde_dsi_bind()\n (git-fixes).\n\n - drm/qxl: lost qxl_bo_kunmap_atomic_page in\n qxl_image_init_helper() (git-fixes).\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider\n (git-fixes).\n\n - drm/vkms: Hold gem object while still in-use\n (git-fixes).\n\n - dwc3: Remove check for HWO flag in\n dwc3_gadget_ep_reclaim_trb_sg() (git-fixes).\n\n - e1000e: Disable TSO for buffer overrun workaround\n (git-fixes).\n\n - e1000e: Do not wake up the system via WOL if device\n wakeup is disabled (git-fixes).\n\n - EDAC/amd64: Add PCI device IDs for family 17h, model 70h\n (bsc#1165975).\n\n - EDAC/ghes: Setup DIMM label from DMI and use it in error\n reports (bsc#1168779).\n\n - EDAC/skx: Use the mcmtr register to retrieve\n close_pg/bank_xor_enable (bsc#1152489).\n\n - EDAC/synopsys: Do not dump uninitialized pinf->col\n (bsc#1152489).\n\n - efi/efivars: Add missing kobject_put() in sysfs entry\n creation error path (git-fixes).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader\n randomness (jsc#SLE-12424).\n\n - efi: READ_ONCE rng seed size before munmap\n (jsc#SLE-12424).\n\n - efi/tpm: Verify event log header before parsing\n (bsc#1173461).\n\n - eventpoll: fix missing wakeup for ovflist in\n ep_poll_callback (bsc#1159867).\n\n - evm: Check also if *tfm is an error pointer in\n init_desc() (git-fixes).\n\n - evm: Fix a small race in init_desc() (git-fixes).\n\n - evm: Fix possible memory leak in evm_calc_hmac_or_hash()\n (git-fixes).\n\n - evm: Fix RCU list related warnings (git-fixes).\n\n - extcon: adc-jack: Fix an error handling path in\n 'adc_jack_probe()' (git-fixes).\n\n - fanotify: fix ignore mask logic for events on child and\n on dir (bsc#1172719).\n\n - fdt: add support for rng-seed (jsc#SLE-12424).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12424).\n\n - firmware: imx: scu: Fix corruption of header\n (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in\n imx_scu_probe() (git-fixes).\n\n - firmware: imx-scu: Support one TX and one RX\n (git-fixes).\n\n - firmware: imx: warn on unexpected RX (git-fixes).\n\n - firmware: qcom_scm: fix bogous abuse of dma-direct\n internals (git-fixes).\n\n - firmware: xilinx: Fix an error handling path in\n 'zynqmp_firmware_probe()' (git-fixes).\n\n - Fix a regression of AF_ALG crypto interface hang with\n aes_s390 (bsc#1167651)\n\n - fpga: dfl: afu: Corrected error handling levels\n (git-fixes).\n\n - fs: Do not check if there is a fsnotify watcher on\n pseudo inodes (bsc#1158765).\n\n - fsnotify: Rearrange fast path to minimise overhead when\n there is no watcher (bsc#1158765).\n\n - genetlink: clean up family attributes allocations\n (git-fixes).\n\n - genetlink: fix memory leaks in\n genl_family_rcv_msg_dumpit() (bsc#1154353).\n\n - gpio: bcm-kona: Fix return value of\n bcm_kona_gpio_probe() (git-fixes).\n\n - gpio: dwapb: Append MODULE_ALIAS for platform driver\n (git-fixes).\n\n - gpio: dwapb: Call acpi_gpiochip_free_interrupts() on\n GPIO chip de-registration (git-fixes).\n\n - gpio: exar: Fix bad handling for ida_simple_get error\n path (git-fixes).\n\n - gpiolib: Document that GPIO line names are not globally\n unique (git-fixes).\n\n - gpio: pca953x: Fix pca953x_gpio_set_config (git-fixes).\n\n - gpio: pxa: Fix return value of pxa_gpio_probe()\n (git-fixes).\n\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown\n (git-fixes).\n\n - gpu/drm: Ingenic: Fix opaque pointer casted to wrong\n type (git-fixes).\n\n - habanalabs: Align protection bits configuration of all\n TPCs (git-fixes).\n\n - HID: alps: Add AUI1657 device ID (git-fixes).\n\n - HID: alps: ALPS_1657 is too specific; use\n U1_UNICORN_LEGACY instead (git-fixes).\n\n - HID: i2c-hid: add Schneider SCL142ALM to descriptor\n override (git-fixes).\n\n - HID: i2c-hid: reset Synaptics SYNA2393 on resume\n (git-fixes).\n\n - HID: intel-ish-hid: avoid bogus uninitialized-variable\n warning (git-fixes).\n\n - HID: multitouch: add eGalaxTouch P80H84 support\n (git-fixes).\n\n - HID: multitouch: enable multi-input as a quirk for some\n devices (git-fixes).\n\n - HID: quirks: Add HID_QUIRK_NO_INIT_REPORTS quirk for\n Dell K12A keyboard-dock (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles\n (git-fixes).\n\n - hsr: check protocol version in hsr_newlink()\n (networking-stable-20_04_17).\n\n - i2c: acpi: put device when verifying client fails\n (git-fixes).\n\n - i2c: altera: Fix race between xfer_msg and isr thread\n (git-fixes).\n\n - i2c: designware-pci: Add support for Elkhart Lake PSE\n I2C (jsc#SLE-12734).\n\n - i2c: designware-pci: Fix BUG_ON during device removal\n (jsc#SLE-12734).\n\n - i2c: designware-pci: Switch over to MSI interrupts\n (jsc#SLE-12734).\n\n - i2c: dev: Fix the race between the release of i2c_dev\n and cdev (git-fixes).\n\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe\n (git-fixes).\n\n - i2c: mux: demux-pinctrl: Fix an error handling path in\n 'i2c_demux_pinctrl_probe()' (git-fixes).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED\n (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal\n (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011\n ltc#183538).\n\n - ice: Fix error return code in ice_add_prof()\n (jsc#SLE-7926).\n\n - ice: Fix inability to set channels when down\n (jsc#SLE-7926).\n\n - ieee80211: Fix incorrect mask for default PE duration\n (git-fixes).\n\n - iio: adc: stm32-adc: fix device used to request dma\n (git-fixes).\n\n - iio: adc: stm32-adc: Use dma_request_chan() instead\n dma_request_slave_channel() (git-fixes).\n\n - iio: adc: stm32-dfsdm: fix device used to request dma\n (git-fixes).\n\n - iio: adc: stm32-dfsdm: Use dma_request_chan() instead\n dma_request_slave_channel() (git-fixes).\n\n - iio: adc: ti-ads8344: Fix channel selection (git-fixes).\n\n - iio: buffer: Do not allow buffers without any channels\n enabled to be activated (git-fixes).\n\n - iio:chemical:pms7003: Fix timestamp alignment and\n prevent data leak (git-fixes).\n\n - iio:chemical:sps30: Fix timestamp alignment (git-fixes).\n\n - iio: dac: vf610: Fix an error handling path in\n 'vf610_dac_probe()' (git-fixes).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering\n (git-fixes).\n\n - iio: sca3000: Remove an erroneous 'get_device()'\n (git-fixes).\n\n - iio: vcnl4000: Fix i2c swapped word reading (git-fixes).\n\n - ima: Call ima_calc_boot_aggregate() in\n ima_eventdigest_init() (bsc#1172223).\n\n - ima: Directly assign the ima_default_policy pointer to\n ima_rules (bsc#1172223)\n\n - ima: Directly free *entry in ima_alloc_init_template()\n if digests is NULL (bsc#1172223).\n\n - ima: Remove __init annotation from ima_pcrread()\n (git-fixes).\n\n - include/asm-generic/topology.h: guard cpumask_of_node()\n macro argument (bsc#1148868).\n\n - Input: dlink-dir685-touchkeys - fix a typo in driver\n name (git-fixes).\n\n - Input: edt-ft5x06 - fix get_default register write\n access (git-fixes).\n\n - Input: evdev - call input_flush_device() on release(),\n not flush() (git-fixes).\n\n - Input: i8042 - add ThinkPad S230u to i8042 reset list\n (git-fixes).\n\n - Input: mms114 - fix handling of mms345l (git-fixes).\n\n - Input: synaptics - add a second working PNP_ID for\n Lenovo T470s (git-fixes).\n\n - Input: synaptics-rmi4 - fix error return code in\n rmi_driver_probe() (git-fixes).\n\n - Input: synaptics-rmi4 - really fix attn_data\n use-after-free (git-fixes).\n\n - Input: usbtouchscreen - add support for BonXeon TP\n (git-fixes).\n\n - Input: xpad - add custom init packet for Xbox One S\n controllers (git-fixes).\n\n - iocost: check active_list of all the ancestors in\n iocg_activate() (bsc#1173206).\n\n - iocost: do not let vrate run wild while there's no\n saturation signal (bsc1173206).\n\n - iocost: over-budget forced IOs should schedule async\n delay (bsc#1173206).\n\n - iommu/amd: Call domain_flush_complete() in\n update_domain() (bsc#1172061).\n\n - iommu/amd: Do not flush Device Table in iommu_map_page()\n (bsc#1172062).\n\n - iommu/amd: Do not loop forever when trying to increase\n address space (bsc#1172063).\n\n - iommu/amd: Fix legacy interrupt remapping for\n x2APIC-enabled system (bsc#1172393).\n\n - iommu/amd: Fix over-read of ACPI UID from IVRS table\n (bsc#1172064).\n\n - iommu/amd: Fix race in\n increase_address_space()/fetch_pte() (bsc#1172065).\n\n - iommu/amd: Update Device Table in\n increase_address_space() (bsc#1172066).\n\n - iommu: Fix reference count leak in iommu_group_alloc\n (bsc#1172394).\n\n - iommu/qcom: Fix local_base status check (bsc#1172067).\n\n - iommu/virtio: Reverse arguments to list_add\n (bsc#1172068).\n\n - ipv4: Update fib_select_default to handle nexthop\n objects (networking-stable-20_04_27).\n\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n\n - ipvs: Improve robustness to the ipvs sysctl (git-fixes).\n\n - irqchip/al-fic: Add support for irq retrigger\n (jsc#SLE-10505).\n\n - irqchip/ti-sci-inta: Fix processing of masked irqs\n (git-fixes).\n\n - irqchip/versatile-fpga: Apply clear-mask earlier\n (git-fixes).\n\n - irqchip/versatile-fpga: Handle chained IRQs properly\n (git-fixes).\n\n - iwlwifi: avoid debug max amsdu config overwriting itself\n (git-fixes).\n\n - iwlwifi: mvm: limit maximum queue appropriately\n (git-fixes).\n\n - iwlwifi: pcie: handle QuZ configs with killer NICs as\n well (bsc#1172374).\n\n - jbd2: fix data races at struct journal_head\n (bsc#1173438).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become\n defined (jsc#SLE-12424).\n\n - kabi/severities: Ingnore get_dev_data() The function is\n internal to the AMD IOMMU driver and must not be called\n by any third-party.\n\n - kABI workaround for struct hdac_bus changes (git-fixes).\n\n - ktest: Add timeout for ssh sync testing (git-fixes).\n\n - KVM: Check validity of resolved slot when searching\n memslots (bsc#1172069).\n\n - KVM: x86/mmu: Set mmio_value to '0' if reserved #PF\n can't be generated (bsc#1171904).\n\n - KVM: x86: only do L1TF workaround on affected processors\n (bsc#1171904).\n\n - l2tp: Allow management of tunnels and session in user\n namespace (networking-stable-20_04_17).\n\n - libbpf: Fix perf_buffer__free() API for sparse allocs\n (bsc#1155518).\n\n - libceph: ignore pool overlay and cache logic on\n redirects (bsc#1172938).\n\n - lib: devres: add a helper function for ioremap_uc\n (git-fixes).\n\n - libertas_tf: avoid a null dereference in pointer priv\n (git-fixes).\n\n - lib/lzo: fix ambiguous encoding bug in lzo-rle\n (git-fixes).\n\n - libnvdimm/btt: fix variable 'rc' set but not used\n (bsc#1162400).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm: cover up nd_region changes (bsc#1162400).\n\n - libnvdimm/dax: Pick the right alignment default when\n creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check\n (bsc#1171759).\n\n - libnvdimm/namespace: Enforce memremap_compat_align()\n (bsc#1162400).\n\n - libnvdimm/namsepace: Do not set claim_class on error\n (bsc#1162400).\n\n - libnvdimm/of_pmem: Provide a unique name for bus\n provider (bsc#1171739).\n\n - libnvdimm: Out of bounds read in __nd_ioctl()\n (bsc#1065729).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we\n notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to\n pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if\n pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific\n probe errors (bsc#1171743).\n\n - libnvdimm/region: Fix build error (bsc#1162400).\n\n - libnvdimm/region: Introduce an 'align' attribute\n (bsc#1162400).\n\n - libnvdimm/region: Introduce NDD_LABELING (bsc#1162400).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align\n check (bsc#1171759).\n\n - lib: Uplevel the pmem 'region' ida to a global allocator\n (bc#1162400).\n\n - list: Add hlist_unhashed_lockless() (bsc#1173438).\n\n - livepatch: Apply vmlinux-specific KLP relocations early\n (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static\n (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections\n from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - locktorture: Allow CPU-hotplug to be disabled via\n --bootargs (bsc#1173068).\n\n - lpfc_debugfs: get rid of pointless access_ok()\n (bsc#1171530).\n\n - lpfc: fix axchg pointer reference after free and double\n frees (bsc#1171530).\n\n - lpfc: Fix pointer checks and comments in LS receive\n refactoring (bsc#1171530).\n\n - lpfc: Fix return value in __lpfc_nvme_ls_abort\n (bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver\n devloss_tmo (bcs#1173060).\n\n - mac80211: mesh: fix discovery timer re-arming issue /\n crash (git-fixes).\n\n - mailbox: zynqmp-ipi: Fix NULL vs IS_ERR() check in\n zynqmp_ipi_mbox_probe() (git-fixes).\n\n - Make the 'Reducing compressed framebufer size' message\n be DRM_INFO_ONCE() (git-fixes).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - media: cedrus: Program output format during each run\n (git-fixes).\n\n - media: dvb: return -EREMOTEIO on i2c transfer failure\n (git-fixes).\n\n - media: platform: fcp: Set appropriate DMA parameters\n (git-fixes).\n\n - media: Revert 'staging: imgu: Address a compiler warning\n on alignment' (git-fixes).\n\n - media: staging: ipu3: Fix stale list entries on\n parameter queue failure (git-fixes).\n\n - media: staging: ipu3-imgu: Move alignment attribute to\n field (git-fixes).\n\n - mei: release me_cl object reference (git-fixes).\n\n - mfd: intel-lpss: Add Intel Tiger Lake PCI IDs\n (jsc#SLE-12737).\n\n - mfd: intel-lpss: Use devm_ioremap_uc for MMIO\n (git-fixes).\n\n - mfd: stmfx: Fix stmfx_irq_init error path (git-fixes).\n\n - mfd: stmfx: Reset chip on resume as supply was disabled\n (git-fixes).\n\n - misc: fastrpc: fix potential fastrpc_invoke_ctx leak\n (git-fixes).\n\n - misc: rtsx: Add short delay after exit from ASPM\n (git-fixes).\n\n - mlxsw: Fix some IS_ERR() vs NULL bugs\n (networking-stable-20_04_27).\n\n - mm: adjust vm_committed_as_batch according to vm\n overcommit policy (bnc#1173271).\n\n - mmc: block: Fix use-after-free issue for rpmb\n (git-fixes).\n\n - mmc: core: Use DEFINE_DEBUGFS_ATTRIBUTE instead of\n DEFINE_SIMPLE_ATTRIBUTE (git-fixes).\n\n - mmc: fix compilation of user API (git-fixes).\n\n - mmc: meson-mx-sdio: trigger a soft reset after a timeout\n or CRC error (git-fixes).\n\n - mmc: mmci_sdmmc: fix DMA API warning overlapping\n mappings (git-fixes).\n\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start\n point (git-fixes).\n\n - mmc: sdhci-msm: Clear tuning done flag while hs400\n tuning (git-fixes).\n\n - mmc: sdio: Fix potential NULL pointer error in\n mmc_sdio_init_card() (git-fixes).\n\n - mmc: sdio: Fix several potential memory leaks in\n mmc_sdio_init_card() (git-fixes).\n\n - mmc: tmio: Further fixup runtime PM management at remove\n (git-fixes).\n\n - mmc: uniphier-sd: call devm_request_irq() after\n tmio_mmc_host_probe() (git-fixes).\n\n - mm: do not prepare anon_vma if vma has VM_WIPEONFORK\n (bsc#1169681).\n\n - mm: memcontrol: fix memory.low proportional distribution\n (bsc#1168230).\n\n - mm/memremap: drop unused SECTION_SIZE and SECTION_MASK\n (bsc#1162400 bsc#1170895 ltc#184375 ltc#185686).\n\n - mm/memremap_pages: Introduce memremap_compat_align()\n (bsc#1162400).\n\n - mm/memremap_pages: Kill unused __devm_memremap_pages()\n (bsc#1162400).\n\n - mm/util.c: make vm_memory_committed() more accurate\n (bnc#1173271).\n\n - mt76: mt76x02u: Add support for newer versions of the\n XBox One wifi adapter (git-fixes).\n\n - mtd: Fix mtd not registered due to nvmem name collision\n (git-fixes).\n\n - mtd: rawnand: brcmnand: correctly verify erased pages\n (git-fixes).\n\n - mtd: rawnand: brcmnand: fix CS0 layout (git-fixes).\n\n - mtd: rawnand: brcmnand: fix hamming oob layout\n (git-fixes).\n\n - mtd: rawnand: diskonchip: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: Fix nand_gpio_waitrdy() (git-fixes).\n\n - mtd: rawnand: ingenic: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: marvell: Fix probe error path (git-fixes).\n\n - mtd: rawnand: marvell: Fix the condition on a return\n code (git-fixes).\n\n - mtd: rawnand: marvell: Use nand_cleanup() when the\n device is not yet registered (git-fixes).\n\n - mtd: rawnand: mtk: Fix the probe error path (git-fixes).\n\n - mtd: rawnand: onfi: Fix redundancy detection check\n (git-fixes).\n\n - mtd: rawnand: orion: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: oxnas: Keep track of registered devices\n (git-fixes).\n\n - mtd: rawnand: oxnas: Release all devices in the\n _remove() path (git-fixes).\n\n - mtd: rawnand: pasemi: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: plat_nand: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: sharpsl: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: socrates: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: sunxi: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: timings: Fix default tR_max and tCCS_min\n timings (git-fixes).\n\n - mtd: rawnand: tmio: Fix the probe error path\n (git-fixes).\n\n - mtd: rawnand: xway: Fix the probe error path\n (git-fixes).\n\n - mtd: spinand: Propagate ECC information to the MTD\n structure (git-fixes).\n\n - mtd: spi-nor: intel-spi: Add support for Intel Tiger\n Lake SPI serial flash (jsc#SLE-12737).\n\n - mwifiex: avoid -Wstringop-overflow warning (git-fixes).\n\n - mwifiex: Fix memory corruption in dump_station\n (git-fixes).\n\n - net: bcmgenet: correct per TX/RX ring statistics\n (networking-stable-20_04_27).\n\n - net: dsa: b53: b53_arl_rw_op() needs to select IVL or\n SVL (networking-stable-20_04_27).\n\n - net: dsa: b53: Fix ARL register definitions\n (networking-stable-20_04_27).\n\n - net: dsa: b53: Lookup VID in ARL searches when VLAN is\n enabled (networking-stable-20_04_27).\n\n - net: dsa: b53: Rework ARL bin logic\n (networking-stable-20_04_27).\n\n - net: dsa: declare lockless TX feature for slave ports\n (bsc#1154353).\n\n - net: dsa: mt7530: fix tagged frames pass-through in\n VLAN-unaware mode (networking-stable-20_04_17).\n\n - net: ena: xdp: update napi budget for DROP and ABORTED\n (bsc#1154492).\n\n - net: ena: xdp: XDP_TX: fix memory leak (bsc#1154492).\n\n - netfilter: connlabels: prefer static lock initialiser\n (git-fixes).\n\n - netfilter: nf_queue: enqueue skbs with NULL dst\n (git-fixes).\n\n - netfilter: nf_tables_offload: return EOPNOTSUPP if rule\n specifies no actions (git-fixes).\n\n - netfilter: nft_tproxy: Fix port selector on Big Endian\n (git-fixes).\n\n - netfilter: nft_tunnel: add the missing ERSPAN_VERSION\n nla_policy (git-fixes).\n\n - netfilter: not mark a spinlock as __read_mostly\n (git-fixes).\n\n - net: ipv4: devinet: Fix crash when add/del multicast IP\n with autojoin (networking-stable-20_04_17).\n\n - net: ipv6: do not consider routes via gateways for\n anycast address check (networking-stable-20_04_17).\n\n - net/mlx4_en: avoid indirect call in TX completion\n (networking-stable-20_04_27).\n\n - net/mlx5e: Add missing release firmware call\n (networking-stable-20_04_17).\n\n - net/mlx5e: Fix pfnum in devlink port attribute\n (networking-stable-20_04_17).\n\n - net/mlx5e: Fix stats update for matchall classifier\n (jsc#SLE-8464).\n\n - net/mlx5e: replace EINVAL in mlx5e_flower_parse_meta()\n (jsc#SLE-8464).\n\n - net/mlx5: Fix cleaning unmanaged flow tables\n (jsc#SLE-8464).\n\n - net/mlx5: Fix crash upon suspend/resume (bsc#1172365).\n\n - net/mlx5: Fix frequent ioread PCI access during recovery\n (networking-stable-20_04_17).\n\n - net: netrom: Fix potential nr_neigh refcnt leak in\n nr_add_node (networking-stable-20_04_27).\n\n - net: openvswitch: ovs_ct_exit to be done under ovs_lock\n (networking-stable-20_04_27).\n\n - net: phy: propagate an error back to the callers of\n phy_sfp_probe (bsc#1154353).\n\n - net: qrtr: send msgs from local of same id as broadcast\n (networking-stable-20_04_17).\n\n - net: revert default NAPI poll timeout to 2 jiffies\n (networking-stable-20_04_17).\n\n - net: revert 'net: get rid of an signed integer overflow\n in ip_idents_reserve()' (bnc#1158748 (network\n regression)).\n\n - net: tun: record RX queue in skb before do_xdp_generic()\n (networking-stable-20_04_17).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad\n DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - net/x25: Fix x25_neigh refcnt leak when receiving frame\n (networking-stable-20_04_27).\n\n - NFC: st21nfca: add missed kfree_skb() in an error path\n (git-fixes).\n\n - nfs: add minor version to nfs_server_key for fscache\n (bsc#1172467).\n\n - nfsd4: make drc_slab global, not per-net (git-fixes).\n\n - nfsd: always check return value of find_any_file\n (bsc#1172208).\n\n - NFS: Fix fscache super_cookie index_key from changing\n after umount (git-fixes).\n\n - nfs: fix NULL deference in nfs4_get_valid_delegation.\n\n - nfs: fscache: use timespec64 in inode auxdata\n (git-fixes).\n\n - nfs: set invalid blocks after NFSv4 writes (git-fixes).\n\n - NFSv4.1 fix rpc_call_done assignment for\n BIND_CONN_TO_SESSION (git-fixes).\n\n - NFSv4: Fix fscache cookie aux_data to ensure change_attr\n is included (git-fixes).\n\n - ntb: intel: add hw workaround for NTB BAR alignment\n (jsc#SLE-12710).\n\n - ntb: intel: Add Icelake (gen4) support for Intel NTB\n (jsc#SLE-12710).\n\n - ntb: intel: fix static declaration (jsc#SLE-12710).\n\n - nvdimm: Avoid race between probe and reading device\n attributes (bsc#1170442).\n\n - nvme-fc: avoid gcc-10 zero-length-bounds warning\n (bsc#1173206).\n\n - nvme-fc: do not call nvme_cleanup_cmd() for AENs\n (bsc#1171688).\n\n - nvme-fc: print proper nvme-fc devloss_tmo value\n (bsc#1172391).\n\n - objtool: Allow no-op CFI ops in alternatives\n (bsc#1169514).\n\n - objtool: Clean instruction state before each function\n validation (bsc#1169514).\n\n - objtool: Fix !CFI insn_state propagation (bsc#1169514).\n\n - objtool: Fix ORC vs alternatives (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - objtool: Remove check preventing branches within\n alternative (bsc#1169514).\n\n - objtool: Rename struct cfi_state (bsc#1169514).\n\n - objtool: Uniquely identify alternative instruction\n groups (bsc#1169514).\n\n - p54usb: add AirVasT USB stick device-id (git-fixes).\n\n - panic: do not print uninitialized taint_flags\n (bsc#1172814).\n\n - PCI: Allow pci_resize_resource() for devices on root bus\n (git-fixes).\n\n - PCI: amlogic: meson: Do not use FAST_LINK_MODE to set up\n link (git-fixes).\n\n - PCI: brcmstb: Assert fundamental reset on initialization\n (git-fixes).\n\n - PCI: brcmstb: Assert fundamental reset on initialization\n (git-fixes).\n\n - PCI: brcmstb: Fix window register offset from 4 to 8\n (git-fixes).\n\n - PCI: brcmstb: Fix window register offset from 4 to 8\n (git-fixes).\n\n - pcie: mobiveil: remove patchset v9 Prepare to backport\n upstream version.\n\n - PCI: Fix pci_register_host_bridge() device_register()\n error handling (git-fixes).\n\n - PCI: mobiveil: Add 8-bit and 16-bit CSR register\n accessors (bsc#1161495).\n\n - PCI: mobiveil: Add callback function for interrupt\n initialization (bsc#1161495).\n\n - PCI: mobiveil: Add callback function for link up check\n (bsc#1161495).\n\n - PCI: mobiveil: Add Header Type field check\n (bsc#1161495).\n\n - PCI: mobiveil: Add PCIe Gen4 RC driver for Layerscape\n SoCs (bsc#1161495).\n\n - PCI: mobiveil: Allow mobiveil_host_init() to be used to\n re-init host (bsc#1161495).\n\n - PCI: mobiveil: Collect the interrupt related operations\n into a function (bsc#1161495).\n\n - PCI: mobiveil: Fix sparse different address space\n warnings (bsc#1161495).\n\n - PCI: mobiveil: Fix unmet dependency warning for\n PCIE_MOBIVEIL_PLAT (bsc#1161495).\n\n - PCI: mobiveil: Introduce a new structure\n mobiveil_root_port (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011451\n (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: add Workaround for A-011577\n (bsc#1161495).\n\n - PCI: mobiveil: ls_pcie_g4: fix SError when accessing\n config space (bsc#1161495).\n\n - PCI: mobiveil: Modularize the Mobiveil PCIe Host Bridge\n IP driver (bsc#1161495).\n\n - PCI: mobiveil: Move the host initialization into a\n function (bsc#1161495).\n\n - PCI/PM: Adjust pcie_wait_for_link_delay() for caller\n delay (git-fixes).\n\n - PCI/PM: Call .bridge_d3() hook only if non-NULL\n (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (git-fixes).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings\n from Upstream Port (git-fixes).\n\n - PCI: rcar: Fix incorrect programming of OB windows\n (git-fixes).\n\n - PCI: v3-semi: Fix a memory leak in v3_pci_probe() error\n handling paths (git-fixes).\n\n - PCI: vmd: Filter resource type bits from shadow register\n (git-fixes).\n\n - pcm_native: result of put_user() needs to be checked\n (git-fixes).\n\n - perf/core: Fix endless multiplex timer (git-fixes).\n\n - perf/core: fix parent pid/tid in task exit events\n (git-fixes).\n\n - pinctrl: freescale: imx: Fix an error handling path in\n 'imx_pinctrl_probe()' (git-fixes).\n\n - pinctrl: freescale: imx: Use 'devm_of_iomap()' to avoid\n a resource leak in case of error in\n 'imx_pinctrl_probe()' (git-fixes).\n\n - pinctrl: imxl: Fix an error handling path in\n 'imx1_pinctrl_core_probe()' (git-fixes).\n\n - pinctrl: intel: Add Intel Tiger Lake pin controller\n support (jsc#SLE-12737).\n\n - pinctrl: ocelot: Fix GPIO interrupt decoding on Jaguar2\n (git-fixes).\n\n - pinctrl: rza1: Fix wrong array assignment of\n rza1l_swio_entries (git-fixes).\n\n - pinctrl: samsung: Correct setting of eint wakeup mask on\n s5pv210 (git-fixes).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend\n for EINT_TYPE GPIOs (git-fixes).\n\n - pinctrl: sprd: Fix the incorrect pull-up definition\n (git-fixes).\n\n - pinctrl: stmfx: stmfx_pinconf_set does not require to\n get direction anymore (git-fixes).\n\n - pinctrl: tigerlake: Tiger Lake uses _HID enumeration\n (jsc#SLE-12737).\n\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA\n and T200TA (git-fixes).\n\n - platform/x86: dell-laptop: do not register micmute LED\n if there is no token (git-fixes).\n\n - platform/x86: intel-vbtn: Also handle tablet-mode switch\n on 'Detachable' and 'Portable' chassis-types\n (git-fixes).\n\n - platform/x86: intel-vbtn: Do not advertise switches to\n userspace if they are not there (git-fixes).\n\n - platform/x86: intel-vbtn: Only blacklist SW_TABLET_MODE\n on the 9 / 'Laptop' chasis-type (git-fixes).\n\n - platform/x86: intel-vbtn: Split keymap into buttons and\n switches parts (git-fixes).\n\n - platform/x86: intel-vbtn: Use acpi_evaluate_integer()\n (git-fixes).\n\n - PM: runtime: clk: Fix clk_pm_runtime_get() error path\n (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding\n (git-fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR\n (bsc#1065729).\n\n - powerpc/64s/exception: Fix machine check no-loss idle\n wakeup (bsc#1156395).\n\n - powerpc/64s/kuap: Restore AMR in system reset exception\n (bsc#1156395).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after\n feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage()\n related functions (bsc#1171759).\n\n - powerpc/bpf: Enable bpf_probe_read(, str)() on powerpc\n again (bsc#1172344).\n\n - powerpc/fadump: Account for memory_limit while reserving\n memory (jsc#SLE-9099 git-fixes).\n\n - powerpc/fadump: consider reserved ranges while reserving\n memory (jsc#SLE-9099 git-fixes).\n\n - powerpc/fadump: use static allocation for reserved\n memory ranges (jsc#SLE-9099 git-fixes).\n\n - powerpc/kuap: PPC_KUAP_DEBUG should depend on PPC_KUAP\n (bsc#1156395).\n\n - powerpc/powernv: Fix a warning message (bsc#1156395).\n\n - powerpc/setup_64: Set cache-line-size based on\n cache-block-size (bsc#1065729).\n\n - powerpc/xive: Clear the page tables for the ESB IO\n mapping (bsc#1085030).\n\n - power: reset: qcom-pon: reg write mask depends on pon\n generation (git-fixes).\n\n - power: supply: bq24257_charger: Replace depends on\n REGMAP_I2C with select (git-fixes).\n\n - power: supply: core: fix HWMON temperature labels\n (git-fixes).\n\n - power: supply: core: fix memory leak in HWMON error path\n (git-fixes).\n\n - power: supply: lp8788: Fix an error handling path in\n 'lp8788_charger_probe()' (git-fixes).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile\n (git-fixes).\n\n - printk: queue wake_up_klogd irq_work only if per-CPU\n areas are ready (bsc#1172095).\n\n - proc/meminfo: avoid open coded reading of\n vm_committed_as (bnc#1173271).\n\n - pwm: sun4i: Move pwm_calculate() out of spin_lock()\n (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet\n Adapter variant (git-fixes).\n\n - r8169: Revive default chip version for r8168\n (bsc#1173085).\n\n - raid5: remove gfp flags from scribble_alloc()\n (bsc#1166985).\n\n - random: fix data races at timer_rand_state\n (bsc#1173438).\n\n - rcu: Avoid data-race in rcu_gp_fqs_check_wake()\n (bsc#1171828).\n\n - rcu: Fix data-race due to atomic_t copy-by-value\n (bsc#1171828).\n\n - rcu: Make rcu_read_unlock_special() checks match\n raise_softirq_irqoff() (bsc#1172046).\n\n - rcu: Simplify rcu_read_unlock_special() deferred wakeups\n (bsc#1172046).\n\n - rcutorture: Add 100-CPU configuration (bsc#1173068).\n\n - rcutorture: Add worst-case call_rcu() forward-progress\n results (bsc#1173068).\n\n - rcutorture: Dispense with Dracut for initrd creation\n (bsc#1173068).\n\n - rcutorture: Make kvm-find-errors.sh abort on bad\n directory (bsc#1173068).\n\n - rcutorture: Remove CONFIG_HOTPLUG_CPU=n from scenarios\n (bsc#1173068).\n\n - rcutorture: Summarize summary of build and run results\n (bsc#1173068).\n\n - rcutorture: Test TREE03 with the threadirqs kernel boot\n parameter (bsc#1173068).\n\n - rcu: Use *_ONCE() to protect lockless ->expmask accesses\n (bsc#1171828).\n\n - rcu: Use WRITE_ONCE() for assignments to ->pprev for\n hlist_nulls (bsc#1173438).\n\n - RDMA/bnxt_re: Remove dead code from rcfw (bsc#1170774).\n\n - RDMA/core: Move and rename trace_cm_id_create()\n (jsc#SLE-8449).\n\n - RDMA/mlx5: Fix NULL pointer dereference in\n destroy_prefetch_work (jsc#SLE-8446).\n\n - RDMA/nl: Do not permit empty devices names during\n RDMA_NLDEV_CMD_NEWLINK/SET (bsc#1172841).\n\n - RDMA/srpt: Fix disabling device management\n (jsc#SLE-8449).\n\n - RDMA/uverbs: Make the event_queue fds return POLLERR\n when disassociated (jsc#SLE-8449).\n\n - remoteproc: Add missing '\\n' in log messages\n (git-fixes).\n\n - remoteproc: Fall back to using parent memory pool if no\n dedicated available (git-fixes).\n\n - remoteproc: Fix and restore the parenting hierarchy for\n vdev (git-fixes).\n\n - remoteproc: Fix IDR initialisation in rproc_alloc()\n (git-fixes).\n\n - Revert 'drm/amd/display: disable dcn20 abm feature for\n bring up' (git-fixes).\n\n - Revert 'fs/seq_file.c: seq_read(): add info message\n about buggy .next functions' (bsc#1172751) The message\n floods dmesg and its benefit is marginal in default\n kernel.\n\n - Revert 'pinctrl: freescale: imx: Use 'devm_of_iomap()'\n to avoid a resource leak in case of error in\n 'imx_pinctrl_probe()'' (git-fixes).\n\n - rpm/kernel-source.spec.in: Add obsolete_rebuilds\n (boo#1172073).\n\n - rpm/modules.fips: * add aes-ce-ccm and des3_ede-x86_64\n (boo#173030) * add aes_ti and aes_neon_bs (boo#1172956)\n\n - rtc: mc13xxx: fix a double-unlock issue (git-fixes).\n\n - rtc: rv3028: Add missed check for devm_regmap_init_i2c()\n (git-fixes).\n\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup()\n (git-fixes).\n\n - rtw88: fix an issue about leak system resources\n (git-fixes).\n\n - rxrpc: Fix call RCU cleanup using non-bh-safe locks\n (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194,\n LTC#185911).\n\n - s390/pci: Log new handle in clp_disable_fh()\n (git-fixes).\n\n - sched/cfs: change initial value of runnable_avg\n (bsc#1158765).\n\n - sched/core: Check cpus_mask, not cpus_ptr in\n __set_cpus_allowed_ptr(), to fix mask corruption\n (bnc#1155798 (CPU scheduler functional and performance\n backports)).\n\n - sched/core: Fix PI boosting between RT and DEADLINE\n tasks (bsc#1172823).\n\n - sched/core: Fix PI boosting between RT and DEADLINE\n tasks (git fixes (sched)).\n\n - sched/core: Fix ttwu() race (bnc#1155798 (CPU scheduler\n functional and performance backports)).\n\n - sched/core: s/WF_ON_RQ/WQ_ON_CPU/ (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n\n - sched/cpuacct: Fix charge cpuacct.usage_sys (bnc#1155798\n (CPU scheduler functional and performance backports)).\n\n - sched/deadline: Initialize ->dl_boosted (bsc#1172823).\n\n - sched/deadline: Initialize ->dl_boosted (git fixes\n (sched)).\n\n - sched: etf: do not assume all sockets are full blown\n (networking-stable-20_04_27).\n\n - sched/fair: find_idlest_group(): Remove unused sd_flag\n parameter (bnc#1155798 (CPU scheduler functional and\n performance backports)).\n\n - sched/fair: Fix enqueue_task_fair() warning some more\n (bnc#1155798 (CPU scheduler functional and performance\n backports)).\n\n - sched/fair: fix nohz next idle balance (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n\n - sched/fair: Optimize dequeue_task_fair() (bnc#1155798\n (CPU scheduler functional and performance backports)).\n\n - sched/fair: Optimize enqueue_task_fair() (bnc#1155798\n (CPU scheduler functional and performance backports)).\n\n - sched/fair: Simplify the code of should_we_balance()\n (bnc#1155798 (CPU scheduler functional and performance\n backports)).\n\n - sched: Make newidle_balance() static again (bnc#1155798\n (CPU scheduler functional and performance backports)).\n\n - sched: Offload wakee task activation if it the wakee is\n descheduling (bnc#1158748, bnc#1159781).\n\n - sched: Optimize ttwu() spinning on p->on_cpu\n (bnc#1158748, bnc#1159781).\n\n - sched/pelt: Sync util/runnable_sum with PELT window when\n propagating (bnc#1155798 (CPU scheduler functional and\n performance backports)).\n\n - scripts/decodecode: fix trapping instruction formatting\n (bsc#1065729).\n\n - scsi: ibmvscsi: Do not send host info in adapter info\n MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Change default queue allocation for reduced\n memory consumption (bsc#1164777 bsc#1164780 bsc#1165211\n jsc#SLE-8654).\n\n - scsi: lpfc: Copyright updates for 12.6.0.4 patches\n (bsc#1171530).\n\n - scsi: lpfc: fix build failure with DEBUGFS disabled\n (bsc#1171530).\n\n - scsi: lpfc: Fix incomplete NVME discovery when target\n (bsc#1171530).\n\n - scsi: lpfc: Fix lpfc_nodelist leak when processing\n unsolicited event (bsc#1164777 bsc#1164780 bsc#1165211\n jsc#SLE-8654).\n\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix memory leak on lpfc_bsg_write_ebuf_set\n func (bsc#1171530).\n\n - scsi: lpfc: Fix negation of else clause in\n lpfc_prep_node_fc4type (bsc#1164777 bsc#1164780\n bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Fix noderef and address space warnings\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: fix spelling mistakes of asynchronous\n (bsc#1171530).\n\n - scsi: lpfc: Maintain atomic consistency of queue_claimed\n flag (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Make lpfc_defer_acc_rsp static\n (bsc#1171530).\n\n - scsi: lpfc: remove duplicate unloading checks\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove re-binding of nvme rport during\n registration (bsc#1164777 bsc#1164780 bsc#1165211\n jsc#SLE-8654).\n\n - scsi: lpfc: Remove redundant initialization to variable\n rc (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls\n (bsc#1164777 bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164777\n bsc#1164780 bsc#1165211 jsc#SLE-8654).\n\n - scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN\n macro with __BIG_ENDIAN_BITFIELD macro (bsc#1173206).\n\n - scsi: qla2xxx: Delete all sessions before unregister\n local nvme port (jsc#SLE-9714 jsc#SLE-10327\n jsc#SLE-10334 bsc#1157169).\n\n - scsi: qla2xxx: Do not log message when reading port\n speed via sysfs (jsc#SLE-9714 jsc#SLE-10327\n jsc#SLE-10334 bsc#1157169).\n\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all\n in NPIV (jsc#SLE-9714 jsc#SLE-10327 jsc#SLE-10334\n bsc#1157169).\n\n - scsi: sd_zbc: Fix sd_zbc_complete() (bsc#1173206).\n\n - scsi: smartpqi: Update attribute name to\n `driver_version` (bsc#1173206).\n\n - scsi: zfcp: add diagnostics buffer for exchange config\n data (bsc#1158050).\n\n - scsi: zfcp: auto variables for dereferenced structs in\n open port handler (bsc#1158050).\n\n - scsi: zfcp: diagnostics buffer caching and use for\n exchange port data (bsc#1158050).\n\n - scsi: zfcp: enhance handling of FC Endpoint Security\n errors (bsc#1158050).\n\n - scsi: zfcp: expose fabric name as common fc_host sysfs\n attribute (bsc#1158050).\n\n - scsi: zfcp: Fence adapter status propagation for common\n statuses (bsc#1158050).\n\n - scsi: zfcp: Fence early sysfs interfaces for accesses of\n shost objects (bsc#1158050).\n\n - scsi: zfcp: Fence fc_host updates during link-down\n handling (bsc#1158050).\n\n - scsi: zfcp: fix fc_host attributes that should be\n unknown on local link down (bsc#1158050).\n\n - scsi: zfcp: fix wrong data and display format of SFP+\n temperature (bsc#1158050).\n\n - scsi: zfcp: implicitly refresh config-data diagnostics\n when reading sysfs (bsc#1158050).\n\n - scsi: zfcp: implicitly refresh port-data diagnostics\n when reading sysfs (bsc#1158050).\n\n - scsi: zfcp: introduce sysfs interface for diagnostics of\n local SFP transceiver (bsc#1158050).\n\n - scsi: zfcp: introduce sysfs interface to read the local\n B2B-Credit (bsc#1158050).\n\n - scsi: zfcp: log FC Endpoint Security errors\n (bsc#1158050).\n\n - scsi: zfcp: log FC Endpoint Security of connections\n (bsc#1158050).\n\n - scsi: zfcp: Move allocation of the shost object to after\n xconf- and xport-data (bsc#1158050).\n\n - scsi: zfcp: Move fc_host updates during xport data\n handling into fenced function (bsc#1158050).\n\n - scsi: zfcp: move maximum age of diagnostic buffers into\n a per-adapter variable (bsc#1158050).\n\n - scsi: zfcp: Move p-t-p port allocation to after xport\n data (bsc#1158050).\n\n - scsi: zfcp: Move shost modification after QDIO (re-)open\n into fenced function (bsc#1158050).\n\n - scsi: zfcp: Move shost updates during xconfig data\n handling into fenced function (bsc#1158050).\n\n - scsi: zfcp: proper indentation to reduce confusion in\n zfcp_erp_required_act (bsc#1158050).\n\n - scsi: zfcp: report FC Endpoint Security in sysfs\n (bsc#1158050).\n\n - scsi: zfcp: signal incomplete or error for sync exchange\n config/port data (bsc#1158050).\n\n - scsi: zfcp: support retrieval of SFP Data via Exchange\n Port Data (bsc#1158050).\n\n - scsi: zfcp: trace FC Endpoint Security of FCP devices\n and connections (bsc#1158050).\n\n - scsi: zfcp: wire previously driver-specific sysfs\n attributes also to fc_host (bsc#1158050).\n\n - selftests/bpf: CONFIG_IPV6_SEG6_BPF required for\n test_seg6_loop.o (bsc#1155518).\n\n - selftests/bpf: CONFIG_LIRC required for\n test_lirc_mode2.sh (bsc#1155518).\n\n - selftests/bpf: Fix invalid memory reads in core_relo\n selftest (bsc#1155518).\n\n - selftests/bpf: Fix memory leak in extract_build_id()\n (bsc#1155518).\n\n - selftests/bpf, flow_dissector: Close TAP device FD after\n the test (bsc#1155518).\n\n - selftests/timens: handle a case when alarm clocks are\n not supported (bsc#1164648,jsc#SLE-11493).\n\n - serial: 8250: Fix max baud limit in generic 8250 port\n (git-fixes).\n\n - slimbus: core: Fix mismatch in of_node_get/put\n (git-fixes).\n\n - soc: mediatek: cmdq: return send msg error code\n (git-fixes).\n\n - soc: qcom: rpmh: Dirt can only make you dirtier, not\n cleaner (git-fixes).\n\n - soc: qcom: rpmh: Invalidate SLEEP and WAKE TCSes before\n flushing new data (git-fixes).\n\n - soc: qcom: rpmh-rsc: Allow using free WAKE TCS for\n active request (git-fixes).\n\n - soc: qcom: rpmh-rsc: Clear active mode configuration for\n wake TCS (git-fixes).\n\n - soc: qcom: rpmh: Update dirty flag only when data\n changes (git-fixes).\n\n - soc/tegra: pmc: Select GENERIC_PINCONF (git-fixes).\n\n - spi: bcm2835aux: Fix controller unregister order\n (git-fixes).\n\n - spi: bcm2835: Fix controller unregister order\n (git-fixes).\n\n - spi: bcm-qspi: Handle clock probe deferral (git-fixes).\n\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0\n (git-fixes).\n\n - SPI: designware: pci: Switch over to MSI interrupts\n (jsc#SLE-12735).\n\n - spi: dt-bindings: spi-controller: Fix #address-cells for\n slave mode (git-fixes).\n\n - spi: dw: Add SPI Rx-done wait method to DMA-based\n transfer (git-fixes).\n\n - spi: dw: Add SPI Tx-done wait method to DMA-based\n transfer (git-fixes).\n\n - spi: dw: Fix controller unregister order (git-fixes).\n\n - spi: dw: Fix native CS being unset (git-fixes).\n\n - spi: dw-pci: Add MODULE_DEVICE_TABLE (jsc#SLE-12735).\n\n - spi: dw-pci: Add runtime power management support\n (jsc#SLE-12735).\n\n - spi: dw-pci: Add support for Intel Elkhart Lake PSE SPI\n (jsc#SLE-12735).\n\n - spi: dw-pci: Fix Chip Select amount on Intel Elkhart\n Lake PSE SPI (jsc#SLE-12735).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error\n (git-fixes).\n\n - spi: dw: Zero DMA Tx and Rx configurations on stack\n (git-fixes).\n\n - spi: Fix controller unregister order (git-fixes).\n\n - spi: fsl: do not map irq during probe (git-fixes).\n\n - spi: fsl: use platform_get_irq() instead of\n of_irq_to_resource() (git-fixes).\n\n - spi: pxa2xx: Fix controller unregister order\n (git-fixes).\n\n - spi: pxa2xx: Fix runtime PM ref imbalance on probe error\n (git-fixes).\n\n - spi: Respect DataBitLength field of SpiSerialBusV2()\n ACPI resource (git-fixes).\n\n - spi: spi-fsl-dspi: Change usage pattern of SPI_MCR_* and\n SPI_CTAR_* macros (git-fixes).\n\n - spi: spi-fsl-dspi: Do not access reserved fields in\n SPI_MCR (git-fixes).\n\n - spi: spi-fsl-dspi: Fix 16-bit word order in 32-bit XSPI\n mode (git-fixes).\n\n - spi: spi-fsl-dspi: Replace interruptible wait queue with\n a simple completion (git-fixes).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable\n devices (git-fixes).\n\n - staging: iio: ad2s1210: Fix SPI reading (git-fixes).\n\n - staging: kpc2000: fix error return code in\n kp2000_pcie_probe() (git-fixes).\n\n - staging: rtl8712: Fix\n IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (git-fixes).\n\n - staging: sm750fb: add missing case while setting\n FB_VISUAL (git-fixes).\n\n - sun6i: dsi: fix gcc-4.8 (bsc#1152489)\n\n - SUNRPC: Signalled ASYNC tasks need to exit (git-fixes).\n\n - supported.conf: Add pinctrl-tigerlake as supported\n\n - supported.conf: Mark two hwtracing helper modules as\n externally supported (bsc#1170879)\n\n - svcrdma: Fix leak of svc_rdma_recv_ctxt objects\n (git-fixes).\n\n - tcp: cache line align MAX_TCP_HEADER\n (networking-stable-20_04_27).\n\n - team: fix hang in team_mode_get()\n (networking-stable-20_04_27).\n\n - thermal: intel: intel_pch_thermal: Add Comet Lake (CML)\n platform support (jsc#SLE-12668).\n\n - tick/sched: Annotate lockless access to\n last_jiffies_update (bsc#1173438).\n\n - timer: Use hlist_unhashed_lockless() in timer_pending()\n (bsc#1173438).\n\n - torture: Allow 'CFLIST' to specify default list of\n scenarios (bsc#1173068).\n\n - torture: Expand last_ts variable in kvm-test-1-run.sh\n (bsc#1173068).\n\n - torture: Handle jitter for CPUs that cannot be offlined\n (bsc#1173068).\n\n - torture: Handle systems lacking the mpstat command\n (bsc#1173068).\n\n - torture: Hoist calls to lscpu to higher-level kvm.sh\n script (bsc#1173068).\n\n - torture: Make results-directory date format\n completion-friendly (bsc#1173068).\n\n - torture: Use gawk instead of awk for systime() function\n (bsc#1173068).\n\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send()\n (bsc#1065729).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (git-fixes).\n\n - tty: n_gsm: Fix SOF skipping (git-fixes).\n\n - tty: n_gsm: Fix waking up upper tty layer when room\n available (git-fixes).\n\n - tty: serial: add missing spin_lock_init for SiFive\n serial console (git-fixes).\n\n - tun: correct header offsets in napi frags mode\n (git-fixes).\n\n - Update config files: Add CONFIG_PINCTRL_TIGERLAKE=m\n\n - Update patch reference for intel_th patch\n (jsc#SLE-12705)\n\n - Update the patch reference for ish-hid fix\n (jsc#SLE-12683)\n\n - usb: core: Fix misleading driver bug report (git-fixes).\n\n - usb: core: hub: limit HUB_QUIRK_DISABLE_AUTOSUSPEND to\n USB5534B (git-fixes).\n\n - usb: dwc2: gadget: move gadget resume after the core is\n in L0 state (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt)\n (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer\n (git-fixes).\n\n - usb: dwc3: pci: Enable extcon driver for Intel\n Merrifield (git-fixes).\n\n - usb: gadget: audio: Fix a missing error return value in\n audio_bind() (git-fixes).\n\n - usb: gadget: fix illegal array access in binding with\n UDC (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe\n (git-fixes).\n\n - usb: gadget: legacy: fix error return code in cdc_bind()\n (git-fixes).\n\n - usb: gadget: legacy: fix error return code in\n gncm_bind() (git-fixes).\n\n - usb: gadget: legacy: fix redundant initialization\n warnings (git-fixes).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer\n before null check (git-fixes).\n\n - usb: gadget: net2272: Fix a memory leak in an error\n handling path in 'net2272_plat_probe()' (git-fixes).\n\n - usb: gadget: udc: atmel: Make some symbols static\n (git-fixes).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL\n check in s3c2410_udc_nuke (git-fixes).\n\n - usb: host: ehci-mxc: Add error handling in\n ehci_mxc_drv_probe() (git-fixes).\n\n - usb: host: xhci-plat: keep runtime active when removing\n host (git-fixes).\n\n - usb: musb: Fix runtime PM imbalance on error\n (git-fixes).\n\n - usb: musb: start session in resume for host port\n (git-fixes).\n\n - usb: ohci-sm501: fix error return code in\n ohci_hcd_sm501_drv_probe() (git-fixes).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions\n (git-fixes).\n\n - usb: serial: qcserial: add DW5816e QDL support\n (git-fixes).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal\n errors (git-fixes).\n\n - usb: usbfs: correct kernel->user page attribute mismatch\n (git-fixes).\n\n - usb: usbfs: fix mmap dma mismatch (git-fixes).\n\n - vfio: avoid possible overflow in\n vfio_iommu_type1_pin_pages (git-fixes).\n\n - vfio: Ignore -ENODEV when getting MSI cookie\n (git-fixes).\n\n - vfio/mdev: Fix reference count leak in\n add_mdev_supported_type (git-fixes).\n\n - vfio/pci: fix memory leaks in alloc_perm_bits()\n (git-fixes).\n\n - vfio/type1: Fix VA->PA translation for PFNMAP VMAs in\n vaddr_get_pfn() (git-fixes).\n\n - video: fbdev: w100fb: Fix a potential double free\n (git-fixes).\n\n - virtio-blk: handle block_device_operations callbacks\n after hot unplug (git fixes (block drivers)).\n\n - vmxnet3: add geneve and vxlan tunnel offload support\n (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash\n (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled\n (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is\n encapsulated (bsc#1172484).\n\n - vrf: Check skb for XFRM_TRANSFORMED flag\n (networking-stable-20_04_27).\n\n - vrf: Fix IPv6 with qdisc and xfrm\n (networking-stable-20_04_27).\n\n - vsprintf: do not obfuscate NULL and error pointers\n (bsc#1172086).\n\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual\n console (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation\n checks (git-fixes).\n\n - vxlan: use the correct nlattr array in\n NL_SET_ERR_MSG_ATTR (networking-stable-20_04_27).\n\n - w1: omap-hdq: cleanup to add missing newline for some\n dev_dbg (git-fixes).\n\n - watchdog: imx_sc_wdt: Fix reboot on crash (git-fixes).\n\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()'\n (git-fixes).\n\n - wireguard: device: avoid circular netns references\n (git-fixes).\n\n - wireguard: noise: do not assign initiation time in if\n condition (git-fixes).\n\n - wireguard: noise: read preshared key while taking lock\n (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: noise: separate receive counter from send\n counter (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: queueing: preserve flow hash across packet\n scrubbing (bsc#1169021 jsc#SLE-12250).\n\n - wireguard: receive: account for napi_gro_receive never\n returning GRO_DROP (git-fixes).\n\n - wireguard: selftests: use newer iproute2 for gcc-10\n (bsc#1169021 jsc#SLE-12250).\n\n - work around mvfs bug (bsc#1162063).\n\n - workqueue: do not use wq_select_unbound_cpu() for bound\n works (git-fixes).\n\n - workqueue: Remove the warning in wq_worker_sleeping()\n (git-fixes).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum\n (bsc#1152489).\n\n - x86: Fix early boot crash on gcc-10, third try\n (bsc#1152489).\n\n - x86/mm/cpa: Flush direct map alias during cpa\n (bsc#1152489).\n\n - x86/PCI: Mark Intel C620 MROMs as having non-compliant\n BARs (git-fixes).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk\n (git-fixes).\n\n - x86/resctrl: Fix invalid attempt at removing the default\n resource group (bsc#1152489).\n\n - x86/resctrl: Preserve CDP enable over CPU hotplug\n (bsc#1152489).\n\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for\n inactive tasks (bsc#1058115).\n\n - xfrm: Always set XFRM_TRANSFORMED in\n xfrm(4,6)_output_finish (networking-stable-20_04_27).\n\n - xfrm: fix error in comment (git fixes (block drivers)).\n\n - xfs: clean up the error handling in xfs_swap_extents\n (git-fixes).\n\n - xfs: do not commit sunit/swidth updates to disk if that\n would cause repair failures (bsc#1172169).\n\n - xfs: do not fail unwritten extent conversion on\n writeback due to edquot (bsc#1158242).\n\n - xfs: fix duplicate verification from xfs_qm_dqflush()\n (git-fixes).\n\n - xfs: force writes to delalloc regions to unwritten\n (bsc#1158242).\n\n - xfs: measure all contiguous previous extents for\n prealloc size (bsc#1158242).\n\n - xfs: preserve default grace interval during quotacheck\n (bsc#1172170).\n\n - xfs: refactor agfl length computation function\n (bsc#1172169).\n\n - xfs: split the sunit parameter update into two parts\n (bsc#1172169).\n\n - wireguard: selftests: initalize ipv6 members to NULL to\n squelch clang warning (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1058115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152472\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152489\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1153274\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154492\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1156395\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1157169\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158050\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158242\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158748\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158765\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1159781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1159867\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1160947\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1161495\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1164648\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1164777\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1164780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165211\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165975\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1166985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167651\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168230\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168779\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169681\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170774\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170879\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170895\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171219\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171220\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171513\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171662\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171828\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171915\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171982\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172046\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172061\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172065\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172068\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172086\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172095\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172169\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172208\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172223\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172342\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172365\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172366\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172374\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172391\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172453\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172467\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172814\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172823\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172938\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172939\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172940\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172984\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172986\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172987\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172989\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172990\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173068\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173085\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173139\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173206\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173271\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173461\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-rebuild\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-base-5.3.18-lp152.26.2.lp152.8.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-base-rebuild-5.3.18-lp152.26.2.lp152.8.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-docs-html-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-macros-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-qa-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debugsource-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-vanilla-5.3.18-lp152.26.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-syms-5.3.18-lp152.26.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-debuginfo / kernel-debug-debugsource / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:31", "description": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-06T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2134-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_138-default", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2134-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139364", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2134-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139364);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-20810\", \"CVE-2019-20812\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10773\", \"CVE-2020-12771\", \"CVE-2020-13974\", \"CVE-2020-14416\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2134-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth may have allowed an unauthenticated user\nto complete authentication without pairing credentials via adjacent\naccess. An unauthenticated, adjacent attacker could impersonate a\nBluetooth BR/EDR master or slave to pair with a previously paired\nremote device to successfully complete the authentication procedure\nwithout knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the\nSELinux subsystem. This flaw occurs while importing the Commercial IP\nSecurity Option (CIPSO) protocol's category bitmap into the SELinux\nextensible bitmap via the' ebitmap_netlbl_import' routine. This flaw\nallowed a remote network user to crash the system kernel, resulting in\na denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook\nimplementation, where it incorrectly assumed that an skb would only\ncontain a single netlink message. The hook would incorrectly only\nvalidate the first netlink message in the skb and allow or deny the\nrest of the messages within the skb with the granted permission\nwithout further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the\nprb_calc_retire_blk_tmo() function in net/packet/af_packet.c can\nresult in a denial of service (CPU consumption and soft lockup) in a\ncertain failure case involving TPACKET_V3, aka CID-b43d1f9f7067\n(bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace\ncore dumps. This flaw allowed an attacker with a local account to\ncrash a trivial program and exfiltrate private kernel data\n(bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled\nafter it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl\ncommand. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux\nscheduler logical bug allows an attacker to turn off the SSBD\nprotection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled\nwhen STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\nk_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call\nsnd_card_free for a failure path, which causes a memory leak, aka\nCID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170383\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172049\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20812/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10711/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10732/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10751/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10768/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202134-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?a3821185\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud 7 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-7-2020-2134=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP2-2020-2134=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-2134=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-2134=1\n\nSUSE Linux Enterprise High Availability 12-SP2 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP2-2020-2134=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_138-default\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_121-92_138-default-1-3.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-debuginfo-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debuginfo-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debugsource-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-devel-4.4.121-92.138.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-syms-4.4.121-92.138.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:51", "description": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. This flaw allowed a remote network user to crash the system kernel, resulting in a denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook implementation, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace core dumps. This flaw allowed an attacker with a local account to crash a trivial program and exfiltrate private kernel data (bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-07T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2152-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20810", "CVE-2019-20812", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10711", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-13974", "CVE-2020-14416"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-kgraft", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_127-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_127-default-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2152-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139408", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2152-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139408);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-20810\", \"CVE-2019-20812\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10773\", \"CVE-2020-12771\", \"CVE-2020-13974\", \"CVE-2020-14416\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2152-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth may have allowed an unauthenticated user\nto complete authentication without pairing credentials via adjacent\naccess. An unauthenticated, adjacent attacker could impersonate a\nBluetooth BR/EDR master or slave to pair with a previously paired\nremote device to successfully complete the authentication procedure\nwithout knowing the link key (bnc#1171988).\n\nCVE-2020-10711: A NULL pointer dereference flaw was found in the\nSELinux subsystem. This flaw occurs while importing the Commercial IP\nSecurity Option (CIPSO) protocol's category bitmap into the SELinux\nextensible bitmap via the' ebitmap_netlbl_import' routine. This flaw\nallowed a remote network user to crash the system kernel, resulting in\na denial of service (bnc#1171191).\n\nCVE-2020-10751: A flaw was found in the SELinux LSM hook\nimplementation, where it incorrectly assumed that an skb would only\ncontain a single netlink message. The hook would incorrectly only\nvalidate the first netlink message in the skb and allow or deny the\nrest of the messages within the skb with the granted permission\nwithout further processing (bnc#1171189).\n\nCVE-2019-20812: An issue was discovered in the\nprb_calc_retire_blk_tmo() function in net/packet/af_packet.c can\nresult in a denial of service (CPU consumption and soft lockup) in a\ncertain failure case involving TPACKET_V3, aka CID-b43d1f9f7067\n(bnc#1172453).\n\nCVE-2020-10732: A flaw was found in the implementation of userspace\ncore dumps. This flaw allowed an attacker with a local account to\ncrash a trivial program and exfiltrate private kernel data\n(bnc#1171220).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\nk_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call\nsnd_card_free for a failure path, which causes a memory leak, aka\nCID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1146351\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1149652\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152457\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1164910\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171220\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172453\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20812/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10711/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10732/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10751/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202152-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5ce337e5\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-2152=1\n\nSUSE OpenStack Cloud 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-8-2020-2152=1\n\nSUSE Linux Enterprise Server for SAP 12-SP3 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP3-2020-2152=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-2152=1\n\nSUSE Linux Enterprise Server 12-SP3-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-2152=1\n\nSUSE Linux Enterprise High Availability 12-SP3 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP3-2020-2152=1\n\nSUSE Enterprise Storage 5 :\n\nzypper in -t patch SUSE-Storage-5-2020-2152=1\n\nHPE Helion Openstack 8 :\n\nzypper in -t patch HPE-Helion-OpenStack-8-2020-2152=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-kgraft\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_127-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_127-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-default-kgraft-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_127-default-1-4.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_127-default-debuginfo-1-4.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-debuginfo-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debuginfo-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debugsource-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-devel-4.4.180-94.127.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-syms-4.4.180-94.127.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:29", "description": "The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where indirect branch speculation could be enabled even though it was diabled before (bnc#1172783).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local account to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction Barrier was disabled in certain circumstances, leaving the system open to a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c, if k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt ACPI variable, which could be used by attackers to bypass lockdown or secure boot restrictions (bnc#1173567).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c because it did not call snd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c, related to invalid length checks for variable elements in a beacon head (bnc#1152107).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-04T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2107-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20810", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2107-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139310", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2107-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139310);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2020:2107-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 15 SP1 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using\nACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect\n(bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in\ndrivers/md/bcache/btree.c has a deadlock if a coalescing operation\nfails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the\ncmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in\nthe slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c\n(bnc#1162002).\n\nCVE-2020-10768: Fixed an issue with the prctl() function, where\nindirect branch speculation could be enabled even though it was\ndiabled before (bnc#1172783).\n\nCVE-2020-10766: Fixed an issue which allowed an attacker with a local\naccount to disable SSBD protection (bnc#1172781).\n\nCVE-2020-10767: Fixed an issue where Indirect Branch Prediction\nBarrier was disabled in certain circumstances, leaving the system open\nto a spectre v2 style attack (bnc#1172782).\n\nCVE-2020-13974: Fixed a integer overflow in drivers/tty/vt/keyboard.c,\nif k_ascii is called several times in a row (bnc#1172775).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition\nincdev_get of char_dev.c. This could lead to local escalation of\nprivilege. User interaction is not needed for exploitation\n(bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. This flaw allowed a local\nattacker with user privileges to cause a denial of service\n(bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM\nimplementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt\nACPI variable, which could be used by attackers to bypass lockdown or\nsecure boot restrictions (bnc#1173567).\n\nCVE-2019-20810: Fixed a memory leak in go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c because it did not call\nsnd_card_free for a failure path (bnc#1172458).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c,\nrelated to invalid length checks for variable elements in a beacon\nhead (bnc#1152107).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172538\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10768/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202107-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f8d3e199\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Product-WE-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Live Patching 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Live-Patching-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Legacy Software 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Legacy-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP1 :\n\nzypper in -t patch\nSUSE-SLE-Module-Development-Tools-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-Basesystem-15-SP1-2020-2107=1\n\nSUSE Linux Enterprise High Availability 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Product-HA-15-SP1-2020-2107=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-16746\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"reiserfs-kmp-default-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"kernel-zfcpdump-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-base-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-default-devel-debuginfo-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-obs-build-debugsource-4.12.14-197.48.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"kernel-syms-4.12.14-197.48.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:58", "description": "The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: net/wireless/nl80211.c did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-06T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2121-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20810", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2020-11-30T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2121-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139362", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2121-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139362);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/30\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2121-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP4 LTSS kernel was updated to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c\nwhere incorrect access permissions for the efivar_ssdt ACPI variable\ncould be used by attackers to bypass lockdown or secure boot\nrestrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a\nmemory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: net/wireless/nl80211.c did not check the length of\nvariable elements in a beacon head, leading to a buffer overflow\n(bnc#1152107).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. When a payload longer than\n4 bytes, and is not following 4-byte alignment boundary guidelines, it\ncauses a buffer over-read threat, leading to a system crash. This flaw\nallowed a local attacker with user privileges to cause a denial of\nservice (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled\nafter it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl\ncommand. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux\nscheduler logical bug allows an attacker to turn off the SSBD\nprotection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled\nwhen STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\nk_ascii is called several times in a row, aka CID-b86dab054059.\n(bnc#1172775).\n\nCVE-2019-20810: go7007_snd_init in\ndrivers/media/usb/go7007/snd-go7007.c in the Linux kernel did not call\nsnd_card_free for a failure path, which causes a memory leak, aka\nCID-9453264ef586 (bnc#1172458).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104967\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152472\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1161016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20810/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10766/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10767/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10768/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-13974/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202121-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f55783c2\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2020-2121=1\n\nSUSE OpenStack Cloud 9 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-9-2020-2121=1\n\nSUSE Linux Enterprise Server for SAP 12-SP4 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP4-2020-2121=1\n\nSUSE Linux Enterprise Server 12-SP4-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2020-2121=1\n\nSUSE Linux Enterprise Live Patching 12-SP4 :\n\nzypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2020-2121=1\n\nSUSE Linux Enterprise High Availability 12-SP4 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP4-2020-2121=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-16746\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-debuginfo-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debuginfo-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debugsource-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-devel-4.12.14-95.57.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-syms-4.12.14-95.57.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:03:59", "description": "An update of the linux package has been released.", "cvss3": {}, "published": "2020-07-07T00:00:00", "type": "nessus", "title": "Photon OS 3.0: Linux PHSA-2020-3.0-0108", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-20810", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-12888", "CVE-2020-13974"], "modified": "2020-07-09T00:00:00", "cpe": ["p-cpe:/a:vmware:photonos:linux", "cpe:/o:vmware:photonos:3.0"], "id": "PHOTONOS_PHSA-2020-3_0-0108_LINUX.NASL", "href": "https://www.tenable.com/plugins/nessus/138181", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2020-3.0-0108. The text\n# itself is copyright (C) VMware, Inc.\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(138181);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/07/09\");\n\n script_cve_id(\n \"CVE-2019-20810\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-12888\",\n \"CVE-2020-13974\"\n );\n\n script_name(english:\"Photon OS 3.0: Linux PHSA-2020-3.0-0108\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the linux package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-3.0-108.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-13974\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/06/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:3.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/PhotonOS/release\");\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, \"PhotonOS\");\nif (release !~ \"^VMware Photon (?:Linux|OS) 3\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"PhotonOS 3.0\");\n\nif (!get_kb_item(\"Host/PhotonOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"PhotonOS\", cpu);\n\nflag = 0;\n\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", reference:\"linux-api-headers-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-devel-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-docs-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-drivers-gpu-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-hmacgen-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-oprofile-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-sound-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-devel-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-docs-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-drivers-gpu-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-drivers-intel-sgx-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-drivers-sound-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-devel-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-docs-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-hmacgen-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-hmacgen-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-oprofile-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-python3-perf-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-devel-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-docs-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-hmacgen-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-lkcm-4.19.129-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-tools-4.19.129-1.ph3\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:21", "description": "The SUSE Linux Enterprise 15 GA LTSS kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: An issue was discovered in net/wireless/nl80211.c which did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-10768: Indirect branch speculation could have been enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\nCVE-2020-10766: Fixed Rogue cross-process SSBD shutdown, where a Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (bnc#1172781).\n\nCVE-2020-10767: Indirect Branch Prediction Barrier was force-disabled when STIBP is unavailable or enhanced IBRS is available.\n(bnc#1172782).\n\nCVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii is called several times in a row, aka CID-b86dab054059 (bnc#1172775).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-04T00:00:00", "type": "nessus", "title": "SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2106-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-obs-build", "p-cpe:/a:novell:suse_linux:kernel-obs-build-debugsource", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base", "p-cpe:/a:novell:suse_linux:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-vanilla-debugsource", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-zfcpdump-debugsource", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default", "p-cpe:/a:novell:suse_linux:reiserfs-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2106-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139309", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2106-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139309);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14416\"