ID UBUNTU_USN-4426-1.NASL Type nessus Reporter Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2020-07-22T00:00:00
Description
Jason A. Donenfeld discovered that the ACPI implementation in the
Linux kernel did not properly restrict loading SSDT code from an EFI
variable. A privileged attacker could use this to bypass Secure Boot
lockdown restrictions and execute arbitrary code in the kernel.
(CVE-2019-20908) Fan Yang discovered that the mremap implementation in
the Linux kernel did not properly handle DAX Huge Pages. A local
attacker with access to DAX storage could use this to gain
administrative privileges. (CVE-2020-10757) Mauricio Faria de Oliveira
discovered that the aufs implementation in the Linux kernel improperly
managed inode reference counts in the vfsub_dentry_open() method. A
local attacker could use this vulnerability to cause a denial of
service. (CVE-2020-11935) Jason A. Donenfeld discovered that the ACPI
implementation in the Linux kernel did not properly restrict loading
ACPI tables via configfs. A privileged attacker could use this to
bypass Secure Boot lockdown restrictions and execute arbitrary code in
the kernel. (CVE-2020-15780).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Ubuntu Security Notice USN-4426-1. The text
# itself is copyright (C) Canonical, Inc. See
# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered
# trademark of Canonical, Inc.
#
include("compat.inc");
if (description)
{
script_id(138835);
script_version("1.4");
script_set_attribute(attribute:"plugin_modification_date", value:"2020/09/17");
script_cve_id("CVE-2019-20908", "CVE-2020-10757", "CVE-2020-11935", "CVE-2020-15780");
script_xref(name:"USN", value:"4426-1");
script_name(english:"Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4426-1)");
script_summary(english:"Checks dpkg output for updated packages.");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Ubuntu host is missing one or more security-related
patches."
);
script_set_attribute(
attribute:"description",
value:
"Jason A. Donenfeld discovered that the ACPI implementation in the
Linux kernel did not properly restrict loading SSDT code from an EFI
variable. A privileged attacker could use this to bypass Secure Boot
lockdown restrictions and execute arbitrary code in the kernel.
(CVE-2019-20908) Fan Yang discovered that the mremap implementation in
the Linux kernel did not properly handle DAX Huge Pages. A local
attacker with access to DAX storage could use this to gain
administrative privileges. (CVE-2020-10757) Mauricio Faria de Oliveira
discovered that the aufs implementation in the Linux kernel improperly
managed inode reference counts in the vfsub_dentry_open() method. A
local attacker could use this vulnerability to cause a denial of
service. (CVE-2020-11935) Jason A. Donenfeld discovered that the ACPI
implementation in the Linux kernel did not properly restrict loading
ACPI tables via configfs. A privileged attacker could use this to
bypass Secure Boot lockdown restrictions and execute arbitrary code in
the kernel. (CVE-2020-15780).
Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://usn.ubuntu.com/4426-1/"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-15780");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-aws");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-azure");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-gcp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-generic");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-generic-lpae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-gke");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-kvm");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-lowlatency");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-oem");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-oracle");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-raspi2");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-snapdragon");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws-hwe");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws-lts-18.04");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp-lts-18.04");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke-4.15");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle-lts-18.04");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:16.04");
script_set_attribute(attribute:"cpe", value:"cpe:/o:canonical:ubuntu_linux:18.04:-:lts");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/06/09");
script_set_attribute(attribute:"patch_publication_date", value:"2020/07/27");
script_set_attribute(attribute:"plugin_publication_date", value:"2020/07/22");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Ubuntu Local Security Checks");
script_dependencies("ssh_get_info.nasl", "linux_alt_patch_detect.nasl");
script_require_keys("Host/cpu", "Host/Ubuntu", "Host/Ubuntu/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("ubuntu.inc");
include("ksplice.inc");
if ( ! get_kb_item("Host/local_checks_enabled") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/Ubuntu/release");
if ( isnull(release) ) audit(AUDIT_OS_NOT, "Ubuntu");
release = chomp(release);
if (! preg(pattern:"^(16\.04|18\.04)$", string:release)) audit(AUDIT_OS_NOT, "Ubuntu 16.04 / 18.04", "Ubuntu " + release);
if ( ! get_kb_item("Host/Debian/dpkg-l") ) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Ubuntu", cpu);
if (get_one_kb_item("Host/ksplice/kernel-cves"))
{
rm_kb_item(name:"Host/uptrack-uname-r");
cve_list = make_list("CVE-2019-20908", "CVE-2020-10757", "CVE-2020-11935", "CVE-2020-15780");
if (ksplice_cves_check(cve_list))
{
audit(AUDIT_PATCH_INSTALLED, "KSplice hotfix for USN-4426-1");
}
else
{
_ubuntu_report = ksplice_reporting_text();
}
}
flag = 0;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.15.0-1050-oracle", pkgver:"4.15.0-1050.54~16.04.1")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.15.0-1079-aws", pkgver:"4.15.0-1079.83~16.04.1")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.15.0-1080-gcp", pkgver:"4.15.0-1080.90~16.04.1")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.15.0-1092-azure", pkgver:"4.15.0-1092.102~16.04.1")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.15.0-112-generic", pkgver:"4.15.0-112.113~16.04.1")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.15.0-112-generic-lpae", pkgver:"4.15.0-112.113~16.04.1")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-4.15.0-112-lowlatency", pkgver:"4.15.0-112.113~16.04.1")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-aws-hwe", pkgver:"4.15.0.1079.76")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-gcp", pkgver:"4.15.0.1080.82")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-gke", pkgver:"4.15.0.1080.82")) flag++;
if (ubuntu_check(osver:"16.04", pkgname:"linux-image-oracle", pkgver:"4.15.0.1050.41")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-1050-oracle", pkgver:"4.15.0-1050.54")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-1066-gke", pkgver:"4.15.0-1066.69")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-1067-raspi2", pkgver:"4.15.0-1067.71")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-1071-kvm", pkgver:"4.15.0-1071.72")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-1079-aws", pkgver:"4.15.0-1079.83")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-1080-gcp", pkgver:"4.15.0-1080.90")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-1083-snapdragon", pkgver:"4.15.0-1083.91")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-1092-azure", pkgver:"4.15.0-1092.102")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-1093-oem", pkgver:"4.15.0-1093.103")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-112-generic", pkgver:"4.15.0-112.113")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-112-generic-lpae", pkgver:"4.15.0-112.113")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-4.15.0-112-lowlatency", pkgver:"4.15.0-112.113")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-aws-lts-18.04", pkgver:"4.15.0.1079.81")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-gcp-lts-18.04", pkgver:"4.15.0.1080.96")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-generic", pkgver:"4.15.0.112.100")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-generic-lpae", pkgver:"4.15.0.112.100")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-gke", pkgver:"4.15.0.1066.68")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-gke-4.15", pkgver:"4.15.0.1066.68")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-kvm", pkgver:"4.15.0.1071.67")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-lowlatency", pkgver:"4.15.0.112.100")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-oem", pkgver:"4.15.0.1093.96")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-oracle-lts-18.04", pkgver:"4.15.0.1050.59")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-raspi2", pkgver:"4.15.0.1067.65")) flag++;
if (ubuntu_check(osver:"18.04", pkgname:"linux-image-virtual", pkgver:"4.15.0.112.100")) flag++;
if (flag)
{
security_report_v4(
port : 0,
severity : SECURITY_HOLE,
extra : ubuntu_report_get()
);
exit(0);
}
else
{
tested = ubuntu_pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "linux-image-4.15-aws / linux-image-4.15-azure / etc");
}
{"id": "UBUNTU_USN-4426-1.NASL", "bulletinFamily": "scanner", "title": "Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4426-1)", "description": "Jason A. Donenfeld discovered that the ACPI implementation in the\nLinux kernel did not properly restrict loading SSDT code from an EFI\nvariable. A privileged attacker could use this to bypass Secure Boot\nlockdown restrictions and execute arbitrary code in the kernel.\n(CVE-2019-20908) Fan Yang discovered that the mremap implementation in\nthe Linux kernel did not properly handle DAX Huge Pages. A local\nattacker with access to DAX storage could use this to gain\nadministrative privileges. (CVE-2020-10757) Mauricio Faria de Oliveira\ndiscovered that the aufs implementation in the Linux kernel improperly\nmanaged inode reference counts in the vfsub_dentry_open() method. A\nlocal attacker could use this vulnerability to cause a denial of\nservice. (CVE-2020-11935) Jason A. Donenfeld discovered that the ACPI\nimplementation in the Linux kernel did not properly restrict loading\nACPI tables via configfs. A privileged attacker could use this to\nbypass Secure Boot lockdown restrictions and execute arbitrary code in\nthe kernel. (CVE-2020-15780).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "published": "2020-07-22T00:00:00", "modified": "2020-07-22T00:00:00", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/138835", "reporter": "Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://usn.ubuntu.com/4426-1/"], "cvelist": ["CVE-2020-11935", "CVE-2020-15780", "CVE-2020-10757", "CVE-2019-20908"], "type": "nessus", "lastseen": "2020-09-18T11:05:43", "edition": 4, "viewCount": 21, "enchantments": {"dependencies": {"references": [{"type": "ubuntu", "idList": ["USN-4483-1", "USN-4427-1", "USN-4440-1", "USN-4439-1", "USN-4425-1", "USN-4426-1"]}, {"type": "cve", "idList": ["CVE-2020-10757", "CVE-2019-20908", "CVE-2020-15780"]}, {"type": "nessus", "idList": ["REDHAT-RHSA-2020-3222.NASL", "ORACLELINUX_ELSA-2020-5791.NASL", "UBUNTU_USN-4439-1.NASL", "REDHAT-RHSA-2020-3218.NASL", "ORACLELINUX_ELSA-2020-3218.NASL", "FEDORA_2020-07F0BE216F.NASL", "REDHAT-RHSA-2020-3219.NASL", "UBUNTU_USN-4425-1.NASL", "UBUNTU_USN-4440-1.NASL", "REDHAT-RHSA-2020-3228.NASL"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-3218", "ELSA-2020-3010", "ELSA-2020-5756", "ELSA-2020-5791", "ELSA-2020-5792", "ELSA-2020-5755", "ELSA-2020-5804", "ELSA-2020-3220"]}, {"type": "redhat", "idList": ["RHSA-2020:3218", "RHSA-2020:3219", "RHSA-2020:3041", "RHSA-2020:3598", "RHSA-2020:3226", "RHSA-2020:3016", "RHSA-2020:3228", "RHSA-2020:3221", "RHSA-2020:3220", "RHSA-2020:3222"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310877977", "OPENVAS:1361412562310704699", "OPENVAS:1361412562310877951", "OPENVAS:1361412562310853206"]}, {"type": "fedora", "idList": ["FEDORA:2A755608EC25", "FEDORA:055473124314"]}, {"type": "centos", "idList": ["CESA-2020:3220"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2020:1153-1", "OPENSUSE-SU-2020:0801-1", "OPENSUSE-SU-2020:1236-1"]}, {"type": "amazon", "idList": ["ALAS2-2020-1465", "ALAS-2020-1401"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2242-1:573AF", "DEBIAN:DSA-4699-1:122C4"]}], "modified": "2020-09-18T11:05:43", "rev": 2}, "score": {"value": 8.5, "vector": "NONE", "modified": "2020-09-18T11:05:43", "rev": 2}, "vulnersScore": 8.5}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4426-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138835);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/17\");\n\n script_cve_id(\"CVE-2019-20908\", \"CVE-2020-10757\", \"CVE-2020-11935\", \"CVE-2020-15780\");\n script_xref(name:\"USN\", value:\"4426-1\");\n\n script_name(english:\"Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4426-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Jason A. Donenfeld discovered that the ACPI implementation in the\nLinux kernel did not properly restrict loading SSDT code from an EFI\nvariable. A privileged attacker could use this to bypass Secure Boot\nlockdown restrictions and execute arbitrary code in the kernel.\n(CVE-2019-20908) Fan Yang discovered that the mremap implementation in\nthe Linux kernel did not properly handle DAX Huge Pages. A local\nattacker with access to DAX storage could use this to gain\nadministrative privileges. (CVE-2020-10757) Mauricio Faria de Oliveira\ndiscovered that the aufs implementation in the Linux kernel improperly\nmanaged inode reference counts in the vfsub_dentry_open() method. A\nlocal attacker could use this vulnerability to cause a denial of\nservice. (CVE-2020-11935) Jason A. Donenfeld discovered that the ACPI\nimplementation in the Linux kernel did not properly restrict loading\nACPI tables via configfs. A privileged attacker could use this to\nbypass Secure Boot lockdown restrictions and execute arbitrary code in\nthe kernel. (CVE-2020-15780).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4426-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-oem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws-hwe\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws-lts-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp-lts-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke-4.15\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle-lts-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/06/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(16\\.04|18\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 16.04 / 18.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-20908\", \"CVE-2020-10757\", \"CVE-2020-11935\", \"CVE-2020-15780\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4426-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.15.0-1050-oracle\", pkgver:\"4.15.0-1050.54~16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.15.0-1079-aws\", pkgver:\"4.15.0-1079.83~16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.15.0-1080-gcp\", pkgver:\"4.15.0-1080.90~16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.15.0-1092-azure\", pkgver:\"4.15.0-1092.102~16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.15.0-112-generic\", pkgver:\"4.15.0-112.113~16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.15.0-112-generic-lpae\", pkgver:\"4.15.0-112.113~16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.15.0-112-lowlatency\", pkgver:\"4.15.0-112.113~16.04.1\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-aws-hwe\", pkgver:\"4.15.0.1079.76\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-gcp\", pkgver:\"4.15.0.1080.82\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-gke\", pkgver:\"4.15.0.1080.82\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-oracle\", pkgver:\"4.15.0.1050.41\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-1050-oracle\", pkgver:\"4.15.0-1050.54\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-1066-gke\", pkgver:\"4.15.0-1066.69\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-1067-raspi2\", pkgver:\"4.15.0-1067.71\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-1071-kvm\", pkgver:\"4.15.0-1071.72\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-1079-aws\", pkgver:\"4.15.0-1079.83\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-1080-gcp\", pkgver:\"4.15.0-1080.90\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-1083-snapdragon\", pkgver:\"4.15.0-1083.91\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-1092-azure\", pkgver:\"4.15.0-1092.102\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-1093-oem\", pkgver:\"4.15.0-1093.103\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-112-generic\", pkgver:\"4.15.0-112.113\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-112-generic-lpae\", pkgver:\"4.15.0-112.113\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-4.15.0-112-lowlatency\", pkgver:\"4.15.0-112.113\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-aws-lts-18.04\", pkgver:\"4.15.0.1079.81\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gcp-lts-18.04\", pkgver:\"4.15.0.1080.96\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-generic\", pkgver:\"4.15.0.112.100\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-generic-lpae\", pkgver:\"4.15.0.112.100\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gke\", pkgver:\"4.15.0.1066.68\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gke-4.15\", pkgver:\"4.15.0.1066.68\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-kvm\", pkgver:\"4.15.0.1071.67\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-lowlatency\", pkgver:\"4.15.0.112.100\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-oem\", pkgver:\"4.15.0.1093.96\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-oracle-lts-18.04\", pkgver:\"4.15.0.1050.59\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-raspi2\", pkgver:\"4.15.0.1067.65\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-virtual\", pkgver:\"4.15.0.112.100\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-4.15-aws / linux-image-4.15-azure / etc\");\n}\n", "naslFamily": "Ubuntu Local Security Checks", "pluginID": "138835", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws-lts-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-aws", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke-4.15", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-oem", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws-hwe", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle-lts-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp-lts-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oem", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15-gke", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke"], "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "scheme": null}
{"ubuntu": [{"lastseen": "2020-07-28T03:37:51", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11935", "CVE-2020-15780", "CVE-2020-10757", "CVE-2019-20908"], "description": "Jason A. Donenfeld discovered that the ACPI implementation in the Linux \nkernel did not properly restrict loading SSDT code from an EFI variable. A \nprivileged attacker could use this to bypass Secure Boot lockdown \nrestrictions and execute arbitrary code in the kernel. (CVE-2019-20908)\n\nFan Yang discovered that the mremap implementation in the Linux kernel did \nnot properly handle DAX Huge Pages. A local attacker with access to DAX \nstorage could use this to gain administrative privileges. (CVE-2020-10757)\n\nMauricio Faria de Oliveira discovered that the aufs implementation in the \nLinux kernel improperly managed inode reference counts in the \nvfsub_dentry_open() method. A local attacker could use this vulnerability \nto cause a denial of service. (CVE-2020-11935)\n\nJason A. Donenfeld discovered that the ACPI implementation in the Linux \nkernel did not properly restrict loading ACPI tables via configfs. A \nprivileged attacker could use this to bypass Secure Boot lockdown \nrestrictions and execute arbitrary code in the kernel. (CVE-2020-15780)", "edition": 5, "modified": "2020-07-27T00:00:00", "published": "2020-07-27T00:00:00", "id": "USN-4426-1", "href": "https://ubuntu.com/security/notices/USN-4426-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-04T05:15:54", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11935", "CVE-2019-19462", "CVE-2020-15780", "CVE-2019-16089"], "description": "It was discovered that the network block device (nbd) implementation in the \nLinux kernel did not properly check for error conditions in some \nsituations. An attacker could possibly use this to cause a denial of \nservice (system crash). (CVE-2019-16089)\n\nIt was discovered that the kernel->user space relay implementation in the \nLinux kernel did not properly check return values in some situations. A \nlocal attacker could possibly use this to cause a denial of service (system \ncrash). (CVE-2019-19462)\n\nMauricio Faria de Oliveira discovered that the aufs implementation in the \nLinux kernel improperly managed inode reference counts in the \nvfsub_dentry_open() method. A local attacker could use this vulnerability \nto cause a denial of service. (CVE-2020-11935)\n\nJason A. Donenfeld discovered that the ACPI implementation in the Linux \nkernel did not properly restrict loading ACPI tables via configfs. A \nprivileged attacker could use this to bypass Secure Boot lockdown \nrestrictions and execute arbitrary code in the kernel. (CVE-2020-15780)", "edition": 5, "modified": "2020-07-27T00:00:00", "published": "2020-07-27T00:00:00", "id": "USN-4425-1", "href": "https://ubuntu.com/security/notices/USN-4425-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-04T05:22:03", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11935", "CVE-2019-19462", "CVE-2019-20810", "CVE-2020-10732", "CVE-2020-10768", "CVE-2020-10766", "CVE-2020-15780", "CVE-2020-10757", "CVE-2019-20908", "CVE-2020-13974", "CVE-2019-16089", "CVE-2020-10767"], "description": "It was discovered that the network block device (nbd) implementation in the \nLinux kernel did not properly check for error conditions in some \nsituations. An attacker could possibly use this to cause a denial of \nservice (system crash). (CVE-2019-16089)\n\nIt was discovered that the kernel->user space relay implementation in the \nLinux kernel did not properly check return values in some situations. A \nlocal attacker could possibly use this to cause a denial of service (system \ncrash). (CVE-2019-19462)\n\nChuhong Yuan discovered that go7007 USB audio device driver in the Linux \nkernel did not properly deallocate memory in some failure conditions. A \nphysically proximate attacker could use this to cause a denial of service \n(memory exhaustion). (CVE-2019-20810)\n\nJason A. Donenfeld discovered that the ACPI implementation in the Linux \nkernel did not properly restrict loading SSDT code from an EFI variable. A \nprivileged attacker could use this to bypass Secure Boot lockdown \nrestrictions and execute arbitrary code in the kernel. (CVE-2019-20908)\n\nIt was discovered that the elf handling code in the Linux kernel did not \ninitialize memory before using it in certain situations. A local attacker \ncould use this to possibly expose sensitive information (kernel memory). \n(CVE-2020-10732)\n\nFan Yang discovered that the mremap implementation in the Linux kernel did \nnot properly handle DAX Huge Pages. A local attacker with access to DAX \nstorage could use this to gain administrative privileges. (CVE-2020-10757)\n\nIt was discovered that the Linux kernel did not correctly apply Speculative \nStore Bypass Disable (SSBD) mitigations in certain situations. A local \nattacker could possibly use this to expose sensitive information. \n(CVE-2020-10766)\n\nIt was discovered that the Linux kernel did not correctly apply Indirect \nBranch Predictor Barrier (IBPB) mitigations in certain situations. A local \nattacker could possibly use this to expose sensitive information. \n(CVE-2020-10767)\n\nIt was discovered that the Linux kernel could incorrectly enable Indirect \nBranch Speculation after it has been disabled for a process via a prctl() \ncall. A local attacker could possibly use this to expose sensitive \ninformation. (CVE-2020-10768)\n\nMauricio Faria de Oliveira discovered that the aufs implementation in the \nLinux kernel improperly managed inode reference counts in the \nvfsub_dentry_open() method. A local attacker could use this vulnerability \nto cause a denial of service. (CVE-2020-11935)\n\nIt was discovered that the Virtual Terminal keyboard driver in the Linux \nkernel contained an integer overflow. A local attacker could possibly use \nthis to have an unspecified impact. (CVE-2020-13974)\n\nJason A. Donenfeld discovered that the ACPI implementation in the Linux \nkernel did not properly restrict loading ACPI tables via configfs. A \nprivileged attacker could use this to bypass Secure Boot lockdown \nrestrictions and execute arbitrary code in the kernel. (CVE-2020-15780)", "edition": 3, "modified": "2020-07-31T00:00:00", "published": "2020-07-31T00:00:00", "id": "USN-4440-1", "href": "https://ubuntu.com/security/notices/USN-4440-1", "title": "linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-04T05:15:19", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11935", "CVE-2019-19462", "CVE-2019-20810", "CVE-2019-12380", "CVE-2020-10732", "CVE-2020-10768", "CVE-2019-19036", "CVE-2020-10766", "CVE-2020-15780", "CVE-2020-10757", "CVE-2019-20908", "CVE-2020-13974", "CVE-2019-16089", "CVE-2020-10767"], "description": "It was discovered that the network block device (nbd) implementation in the \nLinux kernel did not properly check for error conditions in some \nsituations. An attacker could possibly use this to cause a denial of \nservice (system crash). (CVE-2019-16089)\n\nIt was discovered that the btrfs file system implementation in the Linux \nkernel did not properly validate file system metadata in some situations. \nAn attacker could use this to construct a malicious btrfs image that, when \nmounted, could cause a denial of service (system crash). (CVE-2019-19036)\n\nIt was discovered that the kernel->user space relay implementation in the \nLinux kernel did not properly check return values in some situations. A \nlocal attacker could possibly use this to cause a denial of service (system \ncrash). (CVE-2019-19462)\n\nChuhong Yuan discovered that go7007 USB audio device driver in the Linux \nkernel did not properly deallocate memory in some failure conditions. A \nphysically proximate attacker could use this to cause a denial of service \n(memory exhaustion). (CVE-2019-20810)\n\nIt was discovered that the elf handling code in the Linux kernel did not \ninitialize memory before using it in certain situations. A local attacker \ncould use this to possibly expose sensitive information (kernel memory). \n(CVE-2020-10732)\n\nFan Yang discovered that the mremap implementation in the Linux kernel did \nnot properly handle DAX Huge Pages. A local attacker with access to DAX \nstorage could use this to gain administrative privileges. (CVE-2020-10757)\n\nIt was discovered that the Linux kernel did not correctly apply Speculative \nStore Bypass Disable (SSBD) mitigations in certain situations. A local \nattacker could possibly use this to expose sensitive information. \n(CVE-2020-10766)\n\nIt was discovered that the Linux kernel did not correctly apply Indirect \nBranch Predictor Barrier (IBPB) mitigations in certain situations. A local \nattacker could possibly use this to expose sensitive information. \n(CVE-2020-10767)\n\nIt was discovered that the Linux kernel could incorrectly enable Indirect \nBranch Speculation after it has been disabled for a process via a prctl() \ncall. A local attacker could possibly use this to expose sensitive \ninformation. (CVE-2020-10768)\n\nMauricio Faria de Oliveira discovered that the aufs implementation in the \nLinux kernel improperly managed inode reference counts in the \nvfsub_dentry_open() method. A local attacker could use this vulnerability \nto cause a denial of service. (CVE-2020-11935)\n\nIt was discovered that the Virtual Terminal keyboard driver in the Linux \nkernel contained an integer overflow. A local attacker could possibly use \nthis to have an unspecified impact. (CVE-2020-13974)\n\nIt was discovered that the efi subsystem in the Linux kernel did not handle \nmemory allocation failures during early boot in some situations. A local \nattacker could possibly use this to cause a denial of service (system \ncrash). (CVE-2019-12380)\n\nJason A. Donenfeld discovered that the ACPI implementation in the Linux \nkernel did not properly restrict loading SSDT code from an EFI variable. \nA privileged attacker could use this to bypass Secure Boot lockdown \nrestrictions and execute arbitrary code in the kernel. (CVE-2019-20908)\n\nJason A. Donenfeld discovered that the ACPI implementation in the Linux \nkernel did not properly restrict loading ACPI tables via configfs. A \nprivileged attacker could use this to bypass Secure Boot lockdown \nrestrictions and execute arbitrary code in the kernel. (CVE-2020-15780)", "edition": 2, "modified": "2020-07-27T00:00:00", "published": "2020-07-27T00:00:00", "id": "USN-4439-1", "href": "https://ubuntu.com/security/notices/USN-4439-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-04T05:18:57", "bulletinFamily": "unix", "cvelist": ["CVE-2020-11935", "CVE-2019-20810", "CVE-2019-12380", "CVE-2020-10732", "CVE-2020-10768", "CVE-2019-19947", "CVE-2020-10766", "CVE-2019-20908", "CVE-2020-13974", "CVE-2020-10767"], "description": "It was discovered that the Kvaser CAN/USB driver in the Linux kernel did \nnot properly initialize memory in certain situations. A local attacker \ncould possibly use this to expose sensitive information (kernel memory). \n(CVE-2019-19947)\n\nChuhong Yuan discovered that go7007 USB audio device driver in the Linux \nkernel did not properly deallocate memory in some failure conditions. A \nphysically proximate attacker could use this to cause a denial of service \n(memory exhaustion). (CVE-2019-20810)\n\nJason A. Donenfeld discovered that the ACPI implementation in the Linux \nkernel did not properly restrict loading SSDT code from an EFI variable. A \nprivileged attacker could use this to bypass Secure Boot lockdown \nrestrictions and execute arbitrary code in the kernel. (CVE-2019-20908)\n\nIt was discovered that the elf handling code in the Linux kernel did not \ninitialize memory before using it in certain situations. A local attacker \ncould use this to possibly expose sensitive information (kernel memory). \n(CVE-2020-10732)\n\nIt was discovered that the Linux kernel did not correctly apply Speculative \nStore Bypass Disable (SSBD) mitigations in certain situations. A local \nattacker could possibly use this to expose sensitive information. \n(CVE-2020-10766)\n\nIt was discovered that the Linux kernel did not correctly apply Indirect \nBranch Predictor Barrier (IBPB) mitigations in certain situations. A local \nattacker could possibly use this to expose sensitive information. \n(CVE-2020-10767)\n\nIt was discovered that the Linux kernel could incorrectly enable Indirect \nBranch Speculation after it has been disabled for a process via a prctl() \ncall. A local attacker could possibly use this to expose sensitive \ninformation. (CVE-2020-10768)\n\nMauricio Faria de Oliveira discovered that the aufs implementation in the \nLinux kernel improperly managed inode reference counts in the \nvfsub_dentry_open() method. A local attacker could use this vulnerability \nto cause a denial of service. (CVE-2020-11935)\n\nIt was discovered that the Virtual Terminal keyboard driver in the Linux \nkernel contained an integer overflow. A local attacker could possibly use \nthis to have an unspecified impact. (CVE-2020-13974)\n\nIt was discovered that the efi subsystem in the Linux kernel did not handle \nmemory allocation failures during early boot in some situations. A local \nattacker could possibly use this to cause a denial of service (system \ncrash). (CVE-2019-12380)", "edition": 3, "modified": "2020-07-27T00:00:00", "published": "2020-07-27T00:00:00", "id": "USN-4427-1", "href": "https://ubuntu.com/security/notices/USN-4427-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-04T05:27:28", "bulletinFamily": "unix", "cvelist": ["CVE-2019-20810", "CVE-2020-24394", "CVE-2020-12656", "CVE-2020-10768", "CVE-2020-15393", "CVE-2020-14356", "CVE-2020-10766", "CVE-2020-10757", "CVE-2020-10781", "CVE-2020-13974", "CVE-2020-12771", "CVE-2020-12655", "CVE-2020-10767"], "description": "Chuhong Yuan discovered that go7007 USB audio device driver in the Linux \nkernel did not properly deallocate memory in some failure conditions. A \nphysically proximate attacker could use this to cause a denial of service \n(memory exhaustion). (CVE-2019-20810)\n\nFan Yang discovered that the mremap implementation in the Linux kernel did \nnot properly handle DAX Huge Pages. A local attacker with access to DAX \nstorage could use this to gain administrative privileges. (CVE-2020-10757)\n\nIt was discovered that the Linux kernel did not correctly apply Speculative \nStore Bypass Disable (SSBD) mitigations in certain situations. A local \nattacker could possibly use this to expose sensitive information. \n(CVE-2020-10766)\n\nIt was discovered that the Linux kernel did not correctly apply Indirect \nBranch Predictor Barrier (IBPB) mitigations in certain situations. A local \nattacker could possibly use this to expose sensitive information. \n(CVE-2020-10767)\n\nIt was discovered that the Linux kernel could incorrectly enable Indirect \nBranch Speculation after it has been disabled for a process via a prctl() \ncall. A local attacker could possibly use this to expose sensitive \ninformation. (CVE-2020-10768)\n\nLuca Bruno discovered that the zram module in the Linux kernel did not \nproperly restrict unprivileged users from accessing the hot_add sysfs file. \nA local attacker could use this to cause a denial of service (memory \nexhaustion). (CVE-2020-10781)\n\nIt was discovered that the XFS file system implementation in the Linux \nkernel did not properly validate meta data in some circumstances. An \nattacker could use this to construct a malicious XFS image that, when \nmounted, could cause a denial of service. (CVE-2020-12655)\n\nIt was discovered that the bcache subsystem in the Linux kernel did not \nproperly release a lock in some error conditions. A local attacker could \npossibly use this to cause a denial of service. (CVE-2020-12771)\n\nIt was discovered that the Virtual Terminal keyboard driver in the Linux \nkernel contained an integer overflow. A local attacker could possibly use \nthis to have an unspecified impact. (CVE-2020-13974)\n\nIt was discovered that the cgroup v2 subsystem in the Linux kernel did not \nproperly perform reference counting in some situations, leading to a NULL \npointer dereference. A local attacker could use this to cause a denial of \nservice or possibly gain administrative privileges. (CVE-2020-14356)\n\nKyungtae Kim discovered that the USB testing driver in the Linux kernel did \nnot properly deallocate memory on disconnect events. A physically proximate \nattacker could use this to cause a denial of service (memory exhaustion). \n(CVE-2020-15393)\n\nIt was discovered that the NFS server implementation in the Linux kernel \ndid not properly honor umask settings when setting permissions while \ncreating file system objects if the underlying file system did not support \nACLs. An attacker could possibly use this to expose sensitive information \nor violate system integrity. (CVE-2020-24394)\n\nIt was discovered that the Kerberos SUNRPC GSS implementation in the Linux \nkernel did not properly deallocate memory on module unload. A local \nprivileged attacker could possibly use this to cause a denial of service \n(memory exhaustion). (CVE-2020-12656)", "edition": 1, "modified": "2020-09-03T00:00:00", "published": "2020-09-03T00:00:00", "id": "USN-4483-1", "href": "https://ubuntu.com/security/notices/USN-4483-1", "title": "Linux kernel vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "cve": [{"lastseen": "2020-12-09T21:41:50", "description": "An issue was discovered in drivers/firmware/efi/efi.c in the Linux kernel before 5.4. Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032.", "edition": 19, "cvss3": {"exploitabilityScore": 0.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 6.7, "privilegesRequired": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-07-15T22:15:00", "title": "CVE-2019-20908", "type": "cve", "cwe": ["CWE-269"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-20908"], "modified": "2020-08-14T18:29:00", "cpe": ["cpe:/o:canonical:ubuntu_linux:18.04", "cpe:/o:opensuse:leap:15.1", "cpe:/o:canonical:ubuntu_linux:16.04"], "id": "CVE-2019-20908", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20908", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"]}, {"lastseen": "2020-12-09T22:03:09", "description": "An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.", "edition": 21, "cvss3": {"exploitabilityScore": 0.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 6.7, "privilegesRequired": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-07-15T22:15:00", "title": "CVE-2020-15780", "type": "cve", "cwe": ["CWE-863"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.2, "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-15780"], "modified": "2020-08-21T06:15:00", "cpe": [], "id": "CVE-2020-15780", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15780", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}, "cpe23": []}, {"lastseen": "2020-12-09T22:03:04", "description": "A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.", "edition": 15, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-06-09T13:15:00", "title": "CVE-2020-10757", "type": "cve", "cwe": ["CWE-119", "CWE-269"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.4, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 6.9, "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-10757"], "modified": "2020-09-15T15:15:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "cpe:/o:opensuse:leap:15.1", "cpe:/o:linux:linux_kernel:5.6.16", "cpe:/o:redhat:enterprise_linux:7.0", "cpe:/o:linux:linux_kernel:4.5", "cpe:/a:redhat:enterprise_mrg:2.0", "cpe:/o:redhat:enterprise_linux:8.0", "cpe:/o:fedoraproject:fedora:31"], "id": "CVE-2020-10757", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-10757", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5:rc6:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5:rc7:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.5:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.6.16:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"]}], "nessus": [{"lastseen": "2020-11-19T05:32:42", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3219 advisory.\n\n - kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n - kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "edition": 4, "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-30T00:00:00", "title": "RHEL 8 : kernel-rt (RHSA-2020:3219)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-15780", "CVE-2019-20908"], "modified": "2020-07-30T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra", "cpe:/a:redhat:rhel_e4s:8.2::realtime", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug", "cpe:/o:redhat:rhel_tus:8.2", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel", "cpe:/a:redhat:rhel_aus:8.2::nfv", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm", "cpe:/a:redhat:rhel_tus:8.2::realtime", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-core", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm", "cpe:/o:redhat:rhel_eus:8.4", "cpe:/a:redhat:rhel_eus:8.2::realtime", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel", "cpe:/o:redhat:rhel_e4s:8.2", "cpe:/a:redhat:rhel_tus:8.2::nfv", "cpe:/a:redhat:rhel_eus:8.2::nfv", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra", "cpe:/a:redhat:rhel_aus:8.2::realtime", "cpe:/a:redhat:rhel_eus:8.4::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-rt", "cpe:/a:redhat:rhel_eus:8.4::realtime", "cpe:/o:redhat:rhel_aus:8.2", "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:rhel_e4s:8.2::nfv", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_eus:8.2", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules"], "id": "REDHAT-RHSA-2020-3219.NASL", "href": "https://www.tenable.com/plugins/nessus/139183", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:3219. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139183);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\"CVE-2019-20908\", \"CVE-2020-15780\");\n script_xref(name:\"RHSA\", value:\"2020:3219\");\n\n script_name(english:\"RHEL 8 : kernel-rt (RHSA-2020:3219)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3219 advisory.\n\n - kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n - kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/284.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-20908\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-15780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:3219\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1852942\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1852962\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(284);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:enterprise_linux:8::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:enterprise_linux:8::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_aus:8.2::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_aus:8.2::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.2::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.2::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.2::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.2::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.4::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.4::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_tus:8.2::nfv\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_tus:8.2::realtime\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'enterprise_linux_8_nfv': [\n 'rhel-8-for-x86_64-nfv-debug-rpms',\n 'rhel-8-for-x86_64-nfv-rpms',\n 'rhel-8-for-x86_64-nfv-source-rpms',\n 'rhel-8-for-x86_64-nfv-tus-debug-rpms',\n 'rhel-8-for-x86_64-nfv-tus-rpms',\n 'rhel-8-for-x86_64-nfv-tus-source-rpms'\n ],\n 'enterprise_linux_8_realtime': [\n 'rhel-8-for-x86_64-rt-debug-rpms',\n 'rhel-8-for-x86_64-rt-rpms',\n 'rhel-8-for-x86_64-rt-source-rpms',\n 'rhel-8-for-x86_64-rt-tus-debug-rpms',\n 'rhel-8-for-x86_64-rt-tus-rpms',\n 'rhel-8-for-x86_64-rt-tus-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:3219');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n cve_list = make_list('CVE-2019-20908', 'CVE-2020-15780');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:3219');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\npkgs = [\n {'reference':'kernel-rt-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-core-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-core-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-devel-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-kvm-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-modules-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-debug-modules-extra-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-devel-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-kvm-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-modules-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']},\n {'reference':'kernel-rt-modules-extra-4.18.0-193.14.3.rt13.67.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_nfv', 'enterprise_linux_8_realtime']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-rt / kernel-rt-core / kernel-rt-debug / kernel-rt-debug-core / etc');\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-14T17:30:58", "description": "From Red Hat Security Advisory 2020:3218 :\n\nThe remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2020:3218 advisory.\n\n - kernel: lockdown: bypass through ACPI write via\n efivar_ssdt (CVE-2019-20908)\n\n - kernel: lockdown: bypass through ACPI write via\n acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.", "edition": 3, "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-08-03T00:00:00", "title": "Oracle Linux 8 : kernel (ELSA-2020-3218)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-15780", "CVE-2019-20908"], "modified": "2020-08-03T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-debug-core", "p-cpe:/a:oracle:linux:kernel-debug", "p-cpe:/a:oracle:linux:kernel-modules-extra", "p-cpe:/a:oracle:linux:kernel-devel", "p-cpe:/a:oracle:linux:kernel-doc", "p-cpe:/a:oracle:linux:kernel-tools", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:python3-perf", "p-cpe:/a:oracle:linux:bpftool", "cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:kernel-core", "p-cpe:/a:oracle:linux:kernel-debug-devel", "p-cpe:/a:oracle:linux:kernel-modules", "p-cpe:/a:oracle:linux:kernel-debug-modules-extra", "p-cpe:/a:oracle:linux:kernel-debug-modules", "p-cpe:/a:oracle:linux:kernel-tools-libs", "p-cpe:/a:oracle:linux:kernel-headers", "p-cpe:/a:oracle:linux:kernel-cross-headers", "p-cpe:/a:oracle:linux:kernel-abi-whitelists", "p-cpe:/a:oracle:linux:kernel", "p-cpe:/a:oracle:linux:kernel-tools-libs-devel"], "id": "ORACLELINUX_ELSA-2020-3218.NASL", "href": "https://www.tenable.com/plugins/nessus/139275", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:3218 and \n# Oracle Linux Security Advisory ELSA-2020-3218 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139275);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/06\");\n\n script_cve_id(\"CVE-2019-20908\", \"CVE-2020-15780\");\n script_xref(name:\"RHSA\", value:\"2020:3218\");\n\n script_name(english:\"Oracle Linux 8 : kernel (ELSA-2020-3218)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"From Red Hat Security Advisory 2020:3218 :\n\nThe remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2020:3218 advisory.\n\n - kernel: lockdown: bypass through ACPI write via\n efivar_ssdt (CVE-2019-20908)\n\n - kernel: lockdown: bypass through ACPI write via\n acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2020-July/010187.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python3-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 8\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-20908\", \"CVE-2020-15780\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2020-3218\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"4.18\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"bpftool-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-abi-whitelists-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-abi-whitelists-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-core-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-core-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-cross-headers-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-cross-headers-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-core-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-core-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-devel-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-devel-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-modules-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-modules-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-debug-modules-extra-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-debug-modules-extra-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-devel-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-devel-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-doc-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-doc-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-headers-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-headers-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-modules-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-modules-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-modules-extra-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-modules-extra-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-tools-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-tools-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-tools-libs-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-tools-libs-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_exists(release:\"EL8\", rpm:\"kernel-tools-libs-devel-4.18.0\") && rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"perf-4.18.0-193.14.3.el8_2\")) flag++;\nif (rpm_check(release:\"EL8\", cpu:\"x86_64\", reference:\"python3-perf-4.18.0-193.14.3.el8_2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-19T05:32:54", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3228 advisory.\n\n - kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n - kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "edition": 4, "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-30T00:00:00", "title": "RHEL 8 : kernel (RHSA-2020:3228)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-15780", "CVE-2019-20908"], "modified": "2020-07-30T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers", "p-cpe:/a:redhat:enterprise_linux:bpftool", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "cpe:/o:redhat:rhel_e4s:8.0::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-core", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-core", "cpe:/o:redhat:rhel_e4s:8.0", "p-cpe:/a:redhat:enterprise_linux:python3-perf"], "id": "REDHAT-RHSA-2020-3228.NASL", "href": "https://www.tenable.com/plugins/nessus/139191", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:3228. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139191);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\"CVE-2019-20908\", \"CVE-2020-15780\");\n script_xref(name:\"RHSA\", value:\"2020:3228\");\n\n script_name(english:\"RHEL 8 : kernel (RHSA-2020:3228)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3228 advisory.\n\n - kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n - kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/284.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-20908\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-15780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:3228\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1852942\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1852962\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(284);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.0::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python3-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'rhel_e4s_8_0_baseos': [\n 'rhel-8-for-x86_64-baseos-e4s-debug-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:3228');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n cve_list = make_list('CVE-2019-20908', 'CVE-2020-15780');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:3228');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\npkgs = [\n {'reference':'bpftool-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'bpftool-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'bpftool-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-abi-whitelists-4.18.0-80.27.2.el8_0', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-core-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-core-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-core-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-cross-headers-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-cross-headers-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-cross-headers-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-core-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-core-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-core-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-devel-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-devel-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-devel-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-modules-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-modules-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-modules-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-modules-extra-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-modules-extra-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-debug-modules-extra-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-devel-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-devel-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-devel-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-headers-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-headers-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-headers-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-modules-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-modules-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-modules-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-modules-extra-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-modules-extra-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-modules-extra-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-tools-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-tools-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-tools-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-tools-libs-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-tools-libs-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-zfcpdump-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-zfcpdump-core-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-zfcpdump-devel-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-zfcpdump-modules-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'kernel-zfcpdump-modules-extra-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'perf-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'perf-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'perf-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'python3-perf-4.18.0-80.27.2.el8_0', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'python3-perf-4.18.0-80.27.2.el8_0', 'cpu':'s390x', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']},\n {'reference':'python3-perf-4.18.0-80.27.2.el8_0', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_0', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_0_baseos']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-whitelists / kernel-core / etc');\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-19T05:32:42", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3218 advisory.\n\n - kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n - kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "edition": 4, "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-30T00:00:00", "title": "RHEL 8 : kernel (RHSA-2020:3218)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-15780", "CVE-2019-20908"], "modified": "2020-07-30T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers", "cpe:/o:redhat:rhel_tus:8.2", "cpe:/a:redhat:enterprise_linux:8::crb", "p-cpe:/a:redhat:enterprise_linux:bpftool", "cpe:/a:redhat:rhel_eus:8.4::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules", "cpe:/o:redhat:rhel_eus:8.4", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "cpe:/a:redhat:rhel_eus:8.2::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel", "cpe:/o:redhat:rhel_eus:8.2::baseos", "cpe:/o:redhat:enterprise_linux:8::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "cpe:/o:redhat:rhel_e4s:8.2", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "cpe:/a:redhat:rhel_e4s:8.2::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "cpe:/o:redhat:rhel_aus:8.2::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra", "cpe:/o:redhat:rhel_tus:8.2::baseos", "cpe:/o:redhat:rhel_aus:8.2", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-core", "cpe:/a:redhat:rhel_tus:8.2::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_eus:8.2", "cpe:/o:redhat:rhel_e4s:8.2::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-core", "cpe:/a:redhat:rhel_aus:8.2::crb", "p-cpe:/a:redhat:enterprise_linux:python3-perf", "cpe:/o:redhat:rhel_eus:8.4::baseos"], "id": "REDHAT-RHSA-2020-3218.NASL", "href": "https://www.tenable.com/plugins/nessus/139188", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:3218. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139188);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\"CVE-2019-20908\", \"CVE-2020-15780\");\n script_xref(name:\"RHSA\", value:\"2020:3218\");\n\n script_name(english:\"RHEL 8 : kernel (RHSA-2020:3218)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3218 advisory.\n\n - kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n - kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/284.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-20908\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-15780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:3218\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1852942\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1852962\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(284);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.2::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.2::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.2::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.2::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:enterprise_linux:8::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_aus:8.2::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.2::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.2::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.4::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_tus:8.2::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python3-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'enterprise_linux_8_baseos': [\n 'rhel-8-for-aarch64-baseos-debug-rpms',\n 'rhel-8-for-aarch64-baseos-rpms',\n 'rhel-8-for-aarch64-baseos-source-rpms',\n 'rhel-8-for-s390x-baseos-debug-rpms',\n 'rhel-8-for-s390x-baseos-rpms',\n 'rhel-8-for-s390x-baseos-source-rpms',\n 'rhel-8-for-x86_64-baseos-debug-rpms',\n 'rhel-8-for-x86_64-baseos-rpms',\n 'rhel-8-for-x86_64-baseos-source-rpms'\n ],\n 'enterprise_linux_8_crb': [\n 'codeready-builder-for-rhel-8-aarch64-debug-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-source-rpms',\n 'codeready-builder-for-rhel-8-aarch64-rpms',\n 'codeready-builder-for-rhel-8-aarch64-source-rpms',\n 'codeready-builder-for-rhel-8-s390x-debug-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-source-rpms',\n 'codeready-builder-for-rhel-8-s390x-rpms',\n 'codeready-builder-for-rhel-8-s390x-source-rpms',\n 'codeready-builder-for-rhel-8-x86_64-debug-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-source-rpms',\n 'codeready-builder-for-rhel-8-x86_64-rpms',\n 'codeready-builder-for-rhel-8-x86_64-source-rpms'\n ],\n 'rhel_eus_8_2_baseos': [\n 'rhel-8-for-aarch64-baseos-eus-debug-rpms',\n 'rhel-8-for-aarch64-baseos-eus-rpms',\n 'rhel-8-for-aarch64-baseos-eus-source-rpms',\n 'rhel-8-for-s390x-baseos-eus-debug-rpms',\n 'rhel-8-for-s390x-baseos-eus-rpms',\n 'rhel-8-for-s390x-baseos-eus-source-rpms',\n 'rhel-8-for-x86_64-baseos-aus-debug-rpms',\n 'rhel-8-for-x86_64-baseos-aus-rpms',\n 'rhel-8-for-x86_64-baseos-aus-source-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-debug-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-source-rpms',\n 'rhel-8-for-x86_64-baseos-eus-debug-rpms',\n 'rhel-8-for-x86_64-baseos-eus-rpms',\n 'rhel-8-for-x86_64-baseos-eus-source-rpms',\n 'rhel-8-for-x86_64-baseos-tus-debug-rpms',\n 'rhel-8-for-x86_64-baseos-tus-rpms',\n 'rhel-8-for-x86_64-baseos-tus-source-rpms'\n ],\n 'rhel_eus_8_2_crb': [\n 'codeready-builder-for-rhel-8-aarch64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-source-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-source-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:3218');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n cve_list = make_list('CVE-2019-20908', 'CVE-2020-15780');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:3218');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\npkgs = [\n {'reference':'bpftool-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'bpftool-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'bpftool-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-abi-whitelists-4.18.0-193.14.3.el8_2', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-core-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-core-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-core-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-cross-headers-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-cross-headers-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-cross-headers-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-core-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-core-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-core-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-devel-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-devel-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-devel-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-devel-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-devel-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-devel-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-headers-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-headers-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-headers-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-extra-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-extra-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-modules-extra-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-libs-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-libs-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-libs-devel-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-tools-libs-devel-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-core-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-devel-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-modules-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'kernel-zfcpdump-modules-extra-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'perf-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'perf-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'perf-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'python3-perf-4.18.0-193.14.3.el8_2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'python3-perf-4.18.0-193.14.3.el8_2', 'cpu':'s390x', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']},\n {'reference':'python3-perf-4.18.0-193.14.3.el8_2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['enterprise_linux_8_baseos', 'enterprise_linux_8_crb', 'rhel_eus_8_2_baseos', 'rhel_eus_8_2_crb']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-whitelists / kernel-core / etc');\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-18T11:05:40", "description": "It was discovered that the network block device (nbd) implementation\nin the Linux kernel did not properly check for error conditions in\nsome situations. An attacker could possibly use this to cause a denial\nof service (system crash). (CVE-2019-16089) It was discovered that the\nkernel->user space relay implementation in the Linux kernel did not\nproperly check return values in some situations. A local attacker\ncould possibly use this to cause a denial of service (system crash).\n(CVE-2019-19462) Mauricio Faria de Oliveira discovered that the aufs\nimplementation in the Linux kernel improperly managed inode reference\ncounts in the vfsub_dentry_open() method. A local attacker could use\nthis vulnerability to cause a denial of service. (CVE-2020-11935)\nJason A. Donenfeld discovered that the ACPI implementation in the\nLinux kernel did not properly restrict loading ACPI tables via\nconfigfs. A privileged attacker could use this to bypass Secure Boot\nlockdown restrictions and execute arbitrary code in the kernel.\n(CVE-2020-15780).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 4, "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-22T00:00:00", "title": "Ubuntu 18.04 LTS / 20.04 : Linux kernel vulnerabilities (USN-4425-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-11935", "CVE-2019-19462", "CVE-2020-15780", "CVE-2019-16089"], "modified": "2020-07-22T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-18.04", "cpe:/o:canonical:ubuntu_linux:20.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-osp1", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-raspi", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic-lpae", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi-hwe-18.04", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gkeop-5.4", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oem", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke"], "id": "UBUNTU_USN-4425-1.NASL", "href": "https://www.tenable.com/plugins/nessus/138834", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4425-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(138834);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/17\");\n\n script_cve_id(\"CVE-2019-16089\", \"CVE-2019-19462\", \"CVE-2020-11935\", \"CVE-2020-15780\");\n script_xref(name:\"USN\", value:\"4425-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS / 20.04 : Linux kernel vulnerabilities (USN-4425-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that the network block device (nbd) implementation\nin the Linux kernel did not properly check for error conditions in\nsome situations. An attacker could possibly use this to cause a denial\nof service (system crash). (CVE-2019-16089) It was discovered that the\nkernel->user space relay implementation in the Linux kernel did not\nproperly check return values in some situations. A local attacker\ncould possibly use this to cause a denial of service (system crash).\n(CVE-2019-19462) Mauricio Faria de Oliveira discovered that the aufs\nimplementation in the Linux kernel improperly managed inode reference\ncounts in the vfsub_dentry_open() method. A local attacker could use\nthis vulnerability to cause a denial of service. (CVE-2020-11935)\nJason A. Donenfeld discovered that the ACPI implementation in the\nLinux kernel did not properly restrict loading ACPI tables via\nconfigfs. A privileged attacker could use this to bypass Secure Boot\nlockdown restrictions and execute arbitrary code in the kernel.\n(CVE-2020-15780).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4425-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.4-raspi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gkeop-5.4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-osp1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-virtual-hwe-18.04\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:20.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/22\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(18\\.04|20\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 18.04 / 20.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-16089\", \"CVE-2019-19462\", \"CVE-2020-11935\", \"CVE-2020-15780\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4425-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.4.0-1015-raspi\", pkgver:\"5.4.0-1015.15~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.4.0-1022-azure\", pkgver:\"5.4.0-1022.22~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.4.0-42-generic\", pkgver:\"5.4.0-42.46~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.4.0-42-generic-lpae\", pkgver:\"5.4.0-42.46~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.4.0-42-lowlatency\", pkgver:\"5.4.0-42.46~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-generic-hwe-18.04\", pkgver:\"5.4.0.42.46~18.04.35\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-generic-lpae-hwe-18.04\", pkgver:\"5.4.0.42.46~18.04.35\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gkeop-5.4\", pkgver:\"5.4.0.42.46~18.04.35\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-lowlatency-hwe-18.04\", pkgver:\"5.4.0.42.46~18.04.35\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-raspi-hwe-18.04\", pkgver:\"5.4.0.1015.19\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-snapdragon-hwe-18.04\", pkgver:\"5.4.0.42.46~18.04.35\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-virtual-hwe-18.04\", pkgver:\"5.4.0.42.46~18.04.35\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1015-raspi\", pkgver:\"5.4.0-1015.15\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1020-aws\", pkgver:\"5.4.0-1020.20\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1021-gcp\", pkgver:\"5.4.0-1021.21\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1021-oracle\", pkgver:\"5.4.0-1021.21\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-1022-azure\", pkgver:\"5.4.0-1022.22\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-30-generic\", pkgver:\"5.4.0-30.34\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-42-generic\", pkgver:\"5.4.0-42.46\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-42-generic-lpae\", pkgver:\"5.4.0-42.46\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-5.4.0-42-lowlatency\", pkgver:\"5.4.0-42.46\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-aws\", pkgver:\"5.4.0.1020.21\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-gcp\", pkgver:\"5.4.0.1021.19\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-generic\", pkgver:\"5.4.0.30.37\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-generic-lpae\", pkgver:\"5.4.0.42.45\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-gke\", pkgver:\"5.4.0.1021.19\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-kvm\", pkgver:\"5.4.0.1020.19\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-lowlatency\", pkgver:\"5.4.0.42.45\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-oem\", pkgver:\"5.4.0.42.45\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-oem-osp1\", pkgver:\"5.4.0.42.45\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-oracle\", pkgver:\"5.4.0.1021.19\")) flag++;\nif (ubuntu_check(osver:\"20.04\", pkgname:\"linux-image-virtual\", pkgver:\"5.4.0.30.37\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-5.4-aws / linux-image-5.4-azure / linux-image-5.4-gcp / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-18T11:05:49", "description": "It was discovered that the network block device (nbd) implementation\nin the Linux kernel did not properly check for error conditions in\nsome situations. An attacker could possibly use this to cause a denial\nof service (system crash). (CVE-2019-16089) It was discovered that the\nkernel->user space relay implementation in the Linux kernel did not\nproperly check return values in some situations. A local attacker\ncould possibly use this to cause a denial of service (system crash).\n(CVE-2019-19462) Chuhong Yuan discovered that go7007 USB audio device\ndriver in the Linux kernel did not properly deallocate memory in some\nfailure conditions. A physically proximate attacker could use this to\ncause a denial of service (memory exhaustion). (CVE-2019-20810) Jason\nA. Donenfeld discovered that the ACPI implementation in the Linux\nkernel did not properly restrict loading SSDT code from an EFI\nvariable. A privileged attacker could use this to bypass Secure Boot\nlockdown restrictions and execute arbitrary code in the kernel.\n(CVE-2019-20908) It was discovered that the elf handling code in the\nLinux kernel did not initialize memory before using it in certain\nsituations. A local attacker could use this to possibly expose\nsensitive information (kernel memory). (CVE-2020-10732) Fan Yang\ndiscovered that the mremap implementation in the Linux kernel did not\nproperly handle DAX Huge Pages. A local attacker with access to DAX\nstorage could use this to gain administrative privileges.\n(CVE-2020-10757) It was discovered that the Linux kernel did not\ncorrectly apply Speculative Store Bypass Disable (SSBD) mitigations in\ncertain situations. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10766) It was discovered that the\nLinux kernel did not correctly apply Indirect Branch Predictor Barrier\n(IBPB) mitigations in certain situations. A local attacker could\npossibly use this to expose sensitive information. (CVE-2020-10767) It\nwas discovered that the Linux kernel could incorrectly enable indirect\nbranch speculation after it has been disabled for a process via a\nprctl() call. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10768) Mauricio Faria de Oliveira\ndiscovered that the aufs implementation in the Linux kernel improperly\nmanaged inode reference counts in the vfsub_dentry_open() method. A\nlocal attacker could use this vulnerability to cause a denial of\nservice. (CVE-2020-11935) It was discovered that the Virtual Terminal\nkeyboard driver in the Linux kernel contained an integer overflow. A\nlocal attacker could possibly use this to have an unspecified impact.\n(CVE-2020-13974) Jason A. Donenfeld discovered that the ACPI\nimplementation in the Linux kernel did not properly restrict loading\nACPI tables via configfs. A privileged attacker could use this to\nbypass Secure Boot lockdown restrictions and execute arbitrary code in\nthe kernel. (CVE-2020-15780).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 3, "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-28T00:00:00", "title": "Ubuntu 18.04 LTS : linux kernel vulnerabilities (USN-4440-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-11935", "CVE-2019-19462", "CVE-2019-20810", "CVE-2020-10732", "CVE-2020-10768", "CVE-2020-10766", "CVE-2020-15780", "CVE-2020-10757", "CVE-2019-20908", "CVE-2020-13974", "CVE-2019-16089", "CVE-2020-10767"], "modified": "2020-07-28T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-azure", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke-5.3", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-oracle", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gkeop-5.3", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-gke", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-azure"], "id": "UBUNTU_USN-4440-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139028", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4440-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139028);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/17\");\n\n script_cve_id(\"CVE-2019-16089\", \"CVE-2019-19462\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-10732\", \"CVE-2020-10757\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-11935\", \"CVE-2020-13974\", \"CVE-2020-15780\");\n script_xref(name:\"USN\", value:\"4440-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS : linux kernel vulnerabilities (USN-4440-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that the network block device (nbd) implementation\nin the Linux kernel did not properly check for error conditions in\nsome situations. An attacker could possibly use this to cause a denial\nof service (system crash). (CVE-2019-16089) It was discovered that the\nkernel->user space relay implementation in the Linux kernel did not\nproperly check return values in some situations. A local attacker\ncould possibly use this to cause a denial of service (system crash).\n(CVE-2019-19462) Chuhong Yuan discovered that go7007 USB audio device\ndriver in the Linux kernel did not properly deallocate memory in some\nfailure conditions. A physically proximate attacker could use this to\ncause a denial of service (memory exhaustion). (CVE-2019-20810) Jason\nA. Donenfeld discovered that the ACPI implementation in the Linux\nkernel did not properly restrict loading SSDT code from an EFI\nvariable. A privileged attacker could use this to bypass Secure Boot\nlockdown restrictions and execute arbitrary code in the kernel.\n(CVE-2019-20908) It was discovered that the elf handling code in the\nLinux kernel did not initialize memory before using it in certain\nsituations. A local attacker could use this to possibly expose\nsensitive information (kernel memory). (CVE-2020-10732) Fan Yang\ndiscovered that the mremap implementation in the Linux kernel did not\nproperly handle DAX Huge Pages. A local attacker with access to DAX\nstorage could use this to gain administrative privileges.\n(CVE-2020-10757) It was discovered that the Linux kernel did not\ncorrectly apply Speculative Store Bypass Disable (SSBD) mitigations in\ncertain situations. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10766) It was discovered that the\nLinux kernel did not correctly apply Indirect Branch Predictor Barrier\n(IBPB) mitigations in certain situations. A local attacker could\npossibly use this to expose sensitive information. (CVE-2020-10767) It\nwas discovered that the Linux kernel could incorrectly enable indirect\nbranch speculation after it has been disabled for a process via a\nprctl() call. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10768) Mauricio Faria de Oliveira\ndiscovered that the aufs implementation in the Linux kernel improperly\nmanaged inode reference counts in the vfsub_dentry_open() method. A\nlocal attacker could use this vulnerability to cause a denial of\nservice. (CVE-2020-11935) It was discovered that the Virtual Terminal\nkeyboard driver in the Linux kernel contained an integer overflow. A\nlocal attacker could possibly use this to have an unspecified impact.\n(CVE-2020-13974) Jason A. Donenfeld discovered that the ACPI\nimplementation in the Linux kernel did not properly restrict loading\nACPI tables via configfs. A privileged attacker could use this to\nbypass Secure Boot lockdown restrictions and execute arbitrary code in\nthe kernel. (CVE-2020-15780).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4440-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.3-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke-5.3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gkeop-5.3\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(18\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 18.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-16089\", \"CVE-2019-19462\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-10732\", \"CVE-2020-10757\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-11935\", \"CVE-2020-13974\", \"CVE-2020-15780\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4440-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1030-oracle\", pkgver:\"5.3.0-1030.32~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1030-raspi2\", pkgver:\"5.3.0-1030.32~18.04.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1032-aws\", pkgver:\"5.3.0-1032.34~18.04.2\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1032-gcp\", pkgver:\"5.3.0-1032.34~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1032-gke\", pkgver:\"5.3.0-1032.34~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-1034-azure\", pkgver:\"5.3.0-1034.35~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-64-generic\", pkgver:\"5.3.0-64.58~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-64-generic-lpae\", pkgver:\"5.3.0-64.58~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.3.0-64-lowlatency\", pkgver:\"5.3.0-64.58~18.04.1\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-azure\", pkgver:\"5.3.0.1034.30\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gcp\", pkgver:\"5.3.0.1032.26\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gke-5.3\", pkgver:\"5.3.0.1032.17\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gkeop-5.3\", pkgver:\"5.3.0.64.120\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-oracle\", pkgver:\"5.3.0.1030.27\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-5.3-aws / linux-image-5.3-azure / linux-image-5.3-gcp / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-18T11:05:48", "description": "It was discovered that the network block device (nbd) implementation\nin the Linux kernel did not properly check for error conditions in\nsome situations. An attacker could possibly use this to cause a denial\nof service (system crash). (CVE-2019-16089) It was discovered that the\nbtrfs file system implementation in the Linux kernel did not properly\nvalidate file system metadata in some situations. An attacker could\nuse this to construct a malicious btrfs image that, when mounted,\ncould cause a denial of service (system crash). (CVE-2019-19036) It\nwas discovered that the kernel->user space relay implementation in the\nLinux kernel did not properly check return values in some situations.\nA local attacker could possibly use this to cause a denial of service\n(system crash). (CVE-2019-19462) Chuhong Yuan discovered that go7007\nUSB audio device driver in the Linux kernel did not properly\ndeallocate memory in some failure conditions. A physically proximate\nattacker could use this to cause a denial of service (memory\nexhaustion). (CVE-2019-20810) It was discovered that the elf handling\ncode in the Linux kernel did not initialize memory before using it in\ncertain situations. A local attacker could use this to possibly expose\nsensitive information (kernel memory). (CVE-2020-10732) Fan Yang\ndiscovered that the mremap implementation in the Linux kernel did not\nproperly handle DAX Huge Pages. A local attacker with access to DAX\nstorage could use this to gain administrative privileges.\n(CVE-2020-10757) It was discovered that the Linux kernel did not\ncorrectly apply Speculative Store Bypass Disable (SSBD) mitigations in\ncertain situations. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10766) It was discovered that the\nLinux kernel did not correctly apply Indirect Branch Predictor Barrier\n(IBPB) mitigations in certain situations. A local attacker could\npossibly use this to expose sensitive information. (CVE-2020-10767) It\nwas discovered that the Linux kernel could incorrectly enable indirect\nbranch speculation after it has been disabled for a process via a\nprctl() call. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10768) Mauricio Faria de Oliveira\ndiscovered that the aufs implementation in the Linux kernel improperly\nmanaged inode reference counts in the vfsub_dentry_open() method. A\nlocal attacker could use this vulnerability to cause a denial of\nservice. (CVE-2020-11935) It was discovered that the Virtual Terminal\nkeyboard driver in the Linux kernel contained an integer overflow. A\nlocal attacker could possibly use this to have an unspecified impact.\n(CVE-2020-13974) It was discovered that the efi subsystem in the Linux\nkernel did not handle memory allocation failures during early boot in\nsome situations. A local attacker could possibly use this to cause a\ndenial of service (system crash). (CVE-2019-12380) Jason A. Donenfeld\ndiscovered that the ACPI implementation in the Linux kernel did not\nproperly restrict loading SSDT code from an EFI variable. A privileged\nattacker could use this to bypass Secure Boot lockdown restrictions\nand execute arbitrary code in the kernel. (CVE-2019-20908) Jason A.\nDonenfeld discovered that the ACPI implementation in the Linux kernel\ndid not properly restrict loading ACPI tables via configfs. A\nprivileged attacker could use this to bypass Secure Boot lockdown\nrestrictions and execute arbitrary code in the kernel.\n(CVE-2020-15780).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 3, "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-28T00:00:00", "title": "Ubuntu 18.04 LTS : Linux kernel vulnerabilities (USN-4439-1)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-11935", "CVE-2019-19462", "CVE-2019-20810", "CVE-2019-12380", "CVE-2020-10732", "CVE-2020-10768", "CVE-2019-19036", "CVE-2020-10766", "CVE-2020-15780", "CVE-2020-10757", "CVE-2019-20908", "CVE-2020-13974", "CVE-2019-16089", "CVE-2020-10767"], "modified": "2020-07-28T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-gke", "p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-osp1", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts", "p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-oem-osp1", "p-cpe:/a:canonical:ubuntu_linux:linux-image-gke-5.0"], "id": "UBUNTU_USN-4439-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139027", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4439-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139027);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/17\");\n\n script_cve_id(\"CVE-2019-12380\", \"CVE-2019-16089\", \"CVE-2019-19036\", \"CVE-2019-19462\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-10732\", \"CVE-2020-10757\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-11935\", \"CVE-2020-13974\", \"CVE-2020-15780\");\n script_xref(name:\"USN\", value:\"4439-1\");\n\n script_name(english:\"Ubuntu 18.04 LTS : Linux kernel vulnerabilities (USN-4439-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that the network block device (nbd) implementation\nin the Linux kernel did not properly check for error conditions in\nsome situations. An attacker could possibly use this to cause a denial\nof service (system crash). (CVE-2019-16089) It was discovered that the\nbtrfs file system implementation in the Linux kernel did not properly\nvalidate file system metadata in some situations. An attacker could\nuse this to construct a malicious btrfs image that, when mounted,\ncould cause a denial of service (system crash). (CVE-2019-19036) It\nwas discovered that the kernel->user space relay implementation in the\nLinux kernel did not properly check return values in some situations.\nA local attacker could possibly use this to cause a denial of service\n(system crash). (CVE-2019-19462) Chuhong Yuan discovered that go7007\nUSB audio device driver in the Linux kernel did not properly\ndeallocate memory in some failure conditions. A physically proximate\nattacker could use this to cause a denial of service (memory\nexhaustion). (CVE-2019-20810) It was discovered that the elf handling\ncode in the Linux kernel did not initialize memory before using it in\ncertain situations. A local attacker could use this to possibly expose\nsensitive information (kernel memory). (CVE-2020-10732) Fan Yang\ndiscovered that the mremap implementation in the Linux kernel did not\nproperly handle DAX Huge Pages. A local attacker with access to DAX\nstorage could use this to gain administrative privileges.\n(CVE-2020-10757) It was discovered that the Linux kernel did not\ncorrectly apply Speculative Store Bypass Disable (SSBD) mitigations in\ncertain situations. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10766) It was discovered that the\nLinux kernel did not correctly apply Indirect Branch Predictor Barrier\n(IBPB) mitigations in certain situations. A local attacker could\npossibly use this to expose sensitive information. (CVE-2020-10767) It\nwas discovered that the Linux kernel could incorrectly enable indirect\nbranch speculation after it has been disabled for a process via a\nprctl() call. A local attacker could possibly use this to expose\nsensitive information. (CVE-2020-10768) Mauricio Faria de Oliveira\ndiscovered that the aufs implementation in the Linux kernel improperly\nmanaged inode reference counts in the vfsub_dentry_open() method. A\nlocal attacker could use this vulnerability to cause a denial of\nservice. (CVE-2020-11935) It was discovered that the Virtual Terminal\nkeyboard driver in the Linux kernel contained an integer overflow. A\nlocal attacker could possibly use this to have an unspecified impact.\n(CVE-2020-13974) It was discovered that the efi subsystem in the Linux\nkernel did not handle memory allocation failures during early boot in\nsome situations. A local attacker could possibly use this to cause a\ndenial of service (system crash). (CVE-2019-12380) Jason A. Donenfeld\ndiscovered that the ACPI implementation in the Linux kernel did not\nproperly restrict loading SSDT code from an EFI variable. A privileged\nattacker could use this to bypass Secure Boot lockdown restrictions\nand execute arbitrary code in the kernel. (CVE-2019-20908) Jason A.\nDonenfeld discovered that the ACPI implementation in the Linux kernel\ndid not properly restrict loading ACPI tables via configfs. A\nprivileged attacker could use this to bypass Secure Boot lockdown\nrestrictions and execute arbitrary code in the kernel.\n(CVE-2020-15780).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/4439-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-5.0-oem-osp1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-gke-5.0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-oem-osp1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/05/28\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/27\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/28\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2020 Canonical, Inc. / NASL script (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(18\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 18.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-12380\", \"CVE-2019-16089\", \"CVE-2019-19036\", \"CVE-2019-19462\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-10732\", \"CVE-2020-10757\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-11935\", \"CVE-2020-13974\", \"CVE-2020-15780\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-4439-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.0.0-1045-gke\", pkgver:\"5.0.0-1045.46\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-5.0.0-1065-oem-osp1\", pkgver:\"5.0.0-1065.70\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-gke-5.0\", pkgver:\"5.0.0.1045.30\")) flag++;\nif (ubuntu_check(osver:\"18.04\", pkgname:\"linux-image-oem-osp1\", pkgver:\"5.0.0.1065.63\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-5.0-gke / linux-image-5.0-oem-osp1 / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-19T05:32:46", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3222 advisory.\n\n - kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n - kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n - kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n - kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n - kernel: Indirect Branch Prediction Barrier is force- disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n - kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n - kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n - kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n - Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\n - kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "edition": 4, "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-30T00:00:00", "title": "RHEL 8 : kernel (RHSA-2020:3222)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-12888", "CVE-2020-12654", "CVE-2020-10768", "CVE-2020-10766", "CVE-2020-12653", "CVE-2019-19807", "CVE-2020-15780", "CVE-2020-10757", "CVE-2019-20908", "CVE-2020-10767"], "modified": "2020-07-30T00:00:00", "cpe": ["cpe:/o:redhat:rhel_eus:8.1", "p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers", "p-cpe:/a:redhat:enterprise_linux:bpftool", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra", "cpe:/o:redhat:rhel_e4s:8.1::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "cpe:/o:redhat:rhel_e4s:8.1", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel", "cpe:/a:redhat:rhel_eus:8.1::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra", "p-cpe:/a:redhat:enterprise_linux:perf", "cpe:/o:redhat:rhel_eus:8.1::baseos", "p-cpe:/a:redhat:enterprise_linux:kernel-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-core", "p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core", "cpe:/a:redhat:rhel_e4s:8.1::crb", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-core", "p-cpe:/a:redhat:enterprise_linux:python3-perf"], "id": "REDHAT-RHSA-2020-3222.NASL", "href": "https://www.tenable.com/plugins/nessus/139187", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:3222. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(139187);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\n \"CVE-2019-19807\",\n \"CVE-2019-20908\",\n \"CVE-2020-10757\",\n \"CVE-2020-10766\",\n \"CVE-2020-10767\",\n \"CVE-2020-10768\",\n \"CVE-2020-12653\",\n \"CVE-2020-12654\",\n \"CVE-2020-12888\",\n \"CVE-2020-15780\"\n );\n script_xref(name:\"RHSA\", value:\"2020:3222\");\n\n script_name(english:\"RHEL 8 : kernel (RHSA-2020:3222)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:3222 advisory.\n\n - kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n - kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n - kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n - kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n - kernel: Indirect Branch Prediction Barrier is force- disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n - kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n - kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n - kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n - Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\n - kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/119.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/120.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/122.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/248.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/284.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/416.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/440.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-19807\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-20908\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10757\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10766\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10767\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10768\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12653\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12654\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-12888\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-15780\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:3222\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1786078\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1831868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1832530\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1836244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1842525\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1845840\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1845867\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1845868\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1852942\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1852962\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(119, 120, 122, 248, 284, 416, 440);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/12/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.1::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.1\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.1::baseos\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_e4s:8.1::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:redhat:rhel_eus:8.1::crb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-cross-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-zfcpdump-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python3-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8\\.1([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 8.1', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'rhel_e4s_8_1_baseos': [\n 'rhel-8-for-x86_64-baseos-e4s-debug-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-source-rpms'\n ],\n 'rhel_eus_8_1_baseos': [\n 'rhel-8-for-aarch64-baseos-eus-debug-rpms',\n 'rhel-8-for-aarch64-baseos-eus-rpms',\n 'rhel-8-for-aarch64-baseos-eus-source-rpms',\n 'rhel-8-for-s390x-baseos-eus-debug-rpms',\n 'rhel-8-for-s390x-baseos-eus-rpms',\n 'rhel-8-for-s390x-baseos-eus-source-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-debug-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-rpms',\n 'rhel-8-for-x86_64-baseos-e4s-source-rpms',\n 'rhel-8-for-x86_64-baseos-eus-debug-rpms',\n 'rhel-8-for-x86_64-baseos-eus-rpms',\n 'rhel-8-for-x86_64-baseos-eus-source-rpms'\n ],\n 'rhel_eus_8_1_crb': [\n 'codeready-builder-for-rhel-8-aarch64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-rpms',\n 'codeready-builder-for-rhel-8-aarch64-eus-source-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-rpms',\n 'codeready-builder-for-rhel-8-s390x-eus-source-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-debug-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-rpms',\n 'codeready-builder-for-rhel-8-x86_64-eus-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:3222');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n cve_list = make_list('CVE-2019-19807', 'CVE-2019-20908', 'CVE-2020-10757', 'CVE-2020-10766', 'CVE-2020-10767', 'CVE-2020-10768', 'CVE-2020-12653', 'CVE-2020-12654', 'CVE-2020-12888', 'CVE-2020-15780');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:3222');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\npkgs = [\n {'reference':'bpftool-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'bpftool-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'bpftool-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-abi-whitelists-4.18.0-147.24.2.el8_1', 'sp':'1', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-core-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-core-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-core-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-cross-headers-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-cross-headers-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-cross-headers-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-core-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-core-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-core-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-devel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-devel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-devel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-debug-modules-extra-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-devel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-devel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-devel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-headers-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-headers-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-headers-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-extra-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-extra-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-modules-extra-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-libs-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-libs-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-libs-devel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-tools-libs-devel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-core-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-devel-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-modules-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'kernel-zfcpdump-modules-extra-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'perf-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'perf-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'perf-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'python3-perf-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'aarch64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'python3-perf-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'s390x', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']},\n {'reference':'python3-perf-4.18.0-147.24.2.el8_1', 'sp':'1', 'cpu':'x86_64', 'release':'8', 'el_string':'el8_1', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_8_1_baseos', 'rhel_eus_8_1_baseos', 'rhel_eus_8_1_crb']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-whitelists / kernel-core / etc');\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-14T17:32:56", "description": "Description of changes:\n\n[4.14.35-1902.304.6.3.el7uek]\n- Revert 'uek-rpm: Move grub boot menu update to posttrans stage.' (Somasundaram Krishnasamy) [Orabug: 31358100]\n\n[4.14.35-1902.304.6.2.el7uek]\n- certs: Remove Oracle cert compiled into the kernel (Eric Snowberg) [Orabug: 31668611]\n- efi: Restrict efivar_ssdt_load when the kernel is locked down (Matthew Garrett) [Orabug: 31662729] {CVE-2019-20908}\n\n[4.14.35-1902.304.6.1.el7uek]\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (Divya Indi) [Orabug: 31652801]", "edition": 3, "cvss3": {"score": 6.7, "vector": "AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-07-30T00:00:00", "title": "Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5791)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-20908"], "modified": "2020-07-30T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-tools", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek-debug"], "id": "ORACLELINUX_ELSA-2020-5791.NASL", "href": "https://www.tenable.com/plugins/nessus/139166", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-5791.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139166);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/03\");\n\n script_cve_id(\"CVE-2019-20908\");\n\n script_name(english:\"Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5791)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"Description of changes:\n\n[4.14.35-1902.304.6.3.el7uek]\n- Revert 'uek-rpm: Move grub boot menu update to posttrans stage.' (Somasundaram Krishnasamy) [Orabug: 31358100]\n\n[4.14.35-1902.304.6.2.el7uek]\n- certs: Remove Oracle cert compiled into the kernel (Eric Snowberg) [Orabug: 31668611]\n- efi: Restrict efivar_ssdt_load when the kernel is locked down (Matthew Garrett) [Orabug: 31662729] {CVE-2019-20908}\n\n[4.14.35-1902.304.6.1.el7uek]\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (Divya Indi) [Orabug: 31652801]\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2020-July/010165.html\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected unbreakable enterprise kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/15\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/07/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2019-20908\"); \n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for ELSA-2020-5791\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nkernel_major_minor = get_kb_item(\"Host/uname/major_minor\");\nif (empty_or_null(kernel_major_minor)) exit(1, \"Unable to determine kernel major-minor level.\");\nexpected_kernel_major_minor = \"4.14\";\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, \"running kernel level \" + expected_kernel_major_minor + \", it is running kernel level \" + kernel_major_minor);\n\nflag = 0;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-4.14.35\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-4.14.35-1902.304.6.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-debug-4.14.35\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-debug-4.14.35-1902.304.6.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-debug-devel-4.14.35\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-debug-devel-4.14.35-1902.304.6.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-devel-4.14.35\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-devel-4.14.35-1902.304.6.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-doc-4.14.35\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-doc-4.14.35-1902.304.6.3.el7uek\")) flag++;\nif (rpm_exists(release:\"EL7\", rpm:\"kernel-uek-tools-4.14.35\") && rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"kernel-uek-tools-4.14.35-1902.304.6.3.el7uek\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"affected kernel\");\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-19T05:33:59", "description": "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:3598 advisory.\n\n - kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "edition": 3, "cvss3": {"score": 7.8, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2020-09-01T00:00:00", "title": "RHEL 7 : kernel (RHSA-2020:3598)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-10757"], "modified": "2020-09-01T00:00:00", "cpe": ["cpe:/o:redhat:rhel_e4s:7.7::computenode", "cpe:/o:redhat:rhel_e4s:7.7::server", "p-cpe:/a:redhat:enterprise_linux:bpftool", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "cpe:/o:redhat:rhel_tus:7.7::computenode", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "cpe:/o:redhat:rhel_eus:7.7::computenode", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "cpe:/o:redhat:rhel_tus:7.7", "cpe:/o:redhat:rhel_aus:7.7", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "cpe:/o:redhat:rhel_aus:7.7::computenode", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-bootwrapper", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel", "cpe:/o:redhat:rhel_eus:7.7::server", "cpe:/o:redhat:rhel_e4s:7.7", "cpe:/o:redhat:rhel_eus:7.7", "cpe:/o:redhat:rhel_aus:7.7::server", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:perf", "cpe:/o:redhat:rhel_tus:7.7::server"], "id": "REDHAT-RHSA-2020-3598.NASL", "href": "https://www.tenable.com/plugins/nessus/140124", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:3598. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140124);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/18\");\n\n script_cve_id(\"CVE-2020-10757\");\n script_xref(name:\"RHSA\", value:\"2020:3598\");\n\n script_name(english:\"RHEL 7 : kernel (RHSA-2020:3598)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:3598 advisory.\n\n - kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://cwe.mitre.org/data/definitions/119.html\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2020-10757\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:3598\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1842525\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-10757\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_cwe_id(119);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/06/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/01\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:7.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:7.7::computenode\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:7.7::server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:7.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:7.7::computenode\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:7.7::server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:7.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:7.7::computenode\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:7.7::server\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:7.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:7.7::computenode\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:7.7::server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-bootwrapper\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('misc_func.inc');\ninclude('rpm.inc');\ninclude('ksplice.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item('Host/RedHat/release');\nif (isnull(release) || 'Red Hat' >!< release) audit(AUDIT_OS_NOT, 'Red Hat');\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7\\.7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Red Hat 7.7', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nrepositories = {\n 'rhel_e4s_7_7_server': [\n 'rhel-7-server-aus-debug-rpms',\n 'rhel-7-server-aus-rpms',\n 'rhel-7-server-aus-source-rpms',\n 'rhel-7-server-e4s-debug-rpms',\n 'rhel-7-server-e4s-rpms',\n 'rhel-7-server-e4s-source-rpms',\n 'rhel-7-server-tus-debug-rpms',\n 'rhel-7-server-tus-rpms',\n 'rhel-7-server-tus-source-rpms'\n ],\n 'rhel_eus_7_7_computenode': [\n 'rhel-7-hpc-node-eus-debug-rpms',\n 'rhel-7-hpc-node-eus-optional-debug-rpms',\n 'rhel-7-hpc-node-eus-optional-rpms',\n 'rhel-7-hpc-node-eus-optional-source-rpms',\n 'rhel-7-hpc-node-eus-rpms',\n 'rhel-7-hpc-node-eus-source-rpms'\n ],\n 'rhel_eus_7_7_server': [\n 'rhel-7-for-system-z-eus-debug-rpms',\n 'rhel-7-for-system-z-eus-optional-debug-rpms',\n 'rhel-7-for-system-z-eus-optional-rpms',\n 'rhel-7-for-system-z-eus-optional-source-rpms',\n 'rhel-7-for-system-z-eus-rpms',\n 'rhel-7-for-system-z-eus-source-rpms',\n 'rhel-7-server-aus-debug-rpms',\n 'rhel-7-server-aus-optional-debug-rpms',\n 'rhel-7-server-aus-optional-rpms',\n 'rhel-7-server-aus-optional-source-rpms',\n 'rhel-7-server-aus-rpms',\n 'rhel-7-server-aus-source-rpms',\n 'rhel-7-server-e4s-debug-rpms',\n 'rhel-7-server-e4s-optional-debug-rpms',\n 'rhel-7-server-e4s-optional-rpms',\n 'rhel-7-server-e4s-optional-source-rpms',\n 'rhel-7-server-e4s-rpms',\n 'rhel-7-server-e4s-source-rpms',\n 'rhel-7-server-eus-debug-rpms',\n 'rhel-7-server-eus-optional-debug-rpms',\n 'rhel-7-server-eus-optional-rpms',\n 'rhel-7-server-eus-optional-source-rpms',\n 'rhel-7-server-eus-rpms',\n 'rhel-7-server-eus-source-rpms',\n 'rhel-7-server-tus-debug-rpms',\n 'rhel-7-server-tus-optional-debug-rpms',\n 'rhel-7-server-tus-optional-rpms',\n 'rhel-7-server-tus-optional-source-rpms',\n 'rhel-7-server-tus-rpms',\n 'rhel-7-server-tus-source-rpms',\n 'rhel-ha-for-rhel-7-server-e4s-debug-rpms',\n 'rhel-ha-for-rhel-7-server-e4s-rpms',\n 'rhel-ha-for-rhel-7-server-e4s-source-rpms',\n 'rhel-ha-for-rhel-7-server-eus-debug-rpms',\n 'rhel-ha-for-rhel-7-server-eus-rpms',\n 'rhel-ha-for-rhel-7-server-eus-source-rpms',\n 'rhel-ha-for-rhel-7-server-tus-debug-rpms',\n 'rhel-ha-for-rhel-7-server-tus-rpms',\n 'rhel-ha-for-rhel-7-server-tus-source-rpms',\n 'rhel-rs-for-rhel-7-server-eus-debug-rpms',\n 'rhel-rs-for-rhel-7-server-eus-rpms',\n 'rhel-rs-for-rhel-7-server-eus-source-rpms'\n ],\n 'rhel_tus_7_7_server': [\n 'rhel-ha-for-rhel-7-server-tus-debug-rpms',\n 'rhel-ha-for-rhel-7-server-tus-rpms',\n 'rhel-ha-for-rhel-7-server-tus-source-rpms'\n ]\n};\n\nfound_repos = NULL;\nhost_repo_list = get_kb_list('Host/RedHat/repo-list/*');\nif (!(empty_or_null(host_repo_list))) {\n found_repos = make_list();\n foreach repo_key (keys(repositories)) {\n foreach repo ( repositories[repo_key] ) {\n if (get_kb_item('Host/RedHat/repo-list/' + repo)) {\n append_element(var:found_repos, value:repo_key);\n break;\n }\n }\n }\n if(empty_or_null(found_repos)) audit(AUDIT_RHSA_NOT_AFFECTED, 'RHSA-2020:3598');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n rm_kb_item(name:'Host/uptrack-uname-r');\n cve_list = make_list('CVE-2020-10757');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for RHSA-2020:3598');\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\npkgs = [\n {'reference':'bpftool-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'bpftool-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-abi-whitelists-3.10.0-1062.33.1.el7', 'sp':'7', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-debug-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-debug-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-debug-devel-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-debug-devel-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-devel-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-devel-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-headers-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-headers-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-kdump-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-kdump-devel-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-tools-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-tools-libs-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'kernel-tools-libs-devel-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'perf-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'perf-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'python-perf-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']},\n {'reference':'python-perf-3.10.0-1062.33.1.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'repo_list':['rhel_e4s_7_7_server', 'rhel_eus_7_7_computenode', 'rhel_eus_7_7_server', 'rhel_tus_7_7_server']}\n];\n\nflag = 0;\nforeach package_array ( pkgs ) {\n reference = NULL;\n release = NULL;\n sp = NULL;\n cpu = NULL;\n el_string = NULL;\n rpm_spec_vers_cmp = NULL;\n epoch = NULL;\n allowmaj = NULL;\n repo_list = NULL;\n if (!empty_or_null(package_array['repo_list'])) repo_list = package_array['repo_list'];\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'RHEL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (reference && release) {\n repocheck = FALSE;\n if (empty_or_null(found_repos))\n {\n repocheck = TRUE;\n }\n else\n {\n foreach repo (repo_list) {\n if (contains_element(var:found_repos, value:repo))\n {\n repocheck = TRUE;\n break;\n }\n }\n }\n if (repocheck && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n if (empty_or_null(host_repo_list)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'bpftool / kernel / kernel-abi-whitelists / kernel-debug / etc');\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "redhat": [{"lastseen": "2020-07-29T20:04:13", "bulletinFamily": "unix", "cvelist": ["CVE-2019-20908", "CVE-2020-10713", "CVE-2020-15780"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n* kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837433)\n\n* [Regression] RHEL8.2 RC - [Boston/DD2.1] [RHEL8.2/kernel-4.18.0-193.el8.ppc64le] Host kernel crashes while running storage test bucket on KVM guest (iscsi) (BZ#1852048)\n\n* RHEL8.2 - s390/mm: fix panic in gup_fast on large pud (BZ#1853336)", "modified": "2020-07-29T22:12:01", "published": "2020-07-29T21:13:27", "id": "RHSA-2020:3218", "href": "https://access.redhat.com/errata/RHSA-2020:3218", "type": "redhat", "title": "(RHSA-2020:3218) Moderate: kernel security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-29T22:09:48", "bulletinFamily": "unix", "cvelist": ["CVE-2019-20908", "CVE-2020-10713", "CVE-2020-15780"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n* kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837431)", "modified": "2020-07-30T00:11:15", "published": "2020-07-29T23:56:28", "id": "RHSA-2020:3228", "href": "https://access.redhat.com/errata/RHSA-2020:3228", "type": "redhat", "title": "(RHSA-2020:3228) Moderate: kernel security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-29T20:06:09", "bulletinFamily": "unix", "cvelist": ["CVE-2019-20908", "CVE-2020-10713", "CVE-2020-15780"], "description": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n* kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837441)\n\n* kernel-rt: update RT source tree to the RHEL-8.2.z3 source tree (BZ#1856816)", "modified": "2020-07-29T22:12:00", "published": "2020-07-29T21:13:32", "id": "RHSA-2020:3219", "href": "https://access.redhat.com/errata/RHSA-2020:3219", "type": "redhat", "title": "(RHSA-2020:3219) Moderate: kernel-rt security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-04T18:04:13", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19807", "CVE-2019-20908", "CVE-2020-10713", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12888", "CVE-2020-15780"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\n* kernel: lockdown: bypass through ACPI write via efivar_ssdt (CVE-2019-20908)\n\n* kernel: lockdown: bypass through ACPI write via acpi_configfs (CVE-2020-15780)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [DELL EMC 8.1 BUG] : Observing Multiple \"hw csum failure\" while installing RHEL 8.1 on iSCSI LUN (BZ#1821374)\n\n* kernel: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837432)\n\n* deadlock between modprobe and netns exit (BZ#1845163)\n\n* exit_boot failed when install RHEL8.1 (BZ#1846179)\n\n* http request is taking more time for endpoint running on different host via nodeport service (BZ#1847127)\n\n* RHEL8.1 - s390/cio: fix virtio-ccw DMA without PV (BZ#1847534)\n\n* RHEL8.1 - zEDC problems on z14 (genwqe/pci) (BZ#1847939)\n\n* NVMe/FC with DM-MP unexpected I/O failure during \"transitioning\" [EIOP-8345] (BZ#1854678)\n\n* Backport conntrack race condition fixes (BZ#1854953)\n\n* nf_conntrack module unload fail and refcount become to negative (BZ#1854954)", "modified": "2020-07-29T23:25:01", "published": "2020-07-29T23:04:18", "id": "RHSA-2020:3222", "href": "https://access.redhat.com/errata/RHSA-2020:3222", "type": "redhat", "title": "(RHSA-2020:3222) Important: kernel security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-09-01T16:08:56", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10757"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [7.7 - Backport request] kernel: scsi: ses: don't ask for diagnostic pages repeatedly during probe (BZ#1861331)\n\n* kernel: Race condition in hashtables (BZ#1868687)", "modified": "2020-09-01T19:51:45", "published": "2020-09-01T19:23:11", "id": "RHSA-2020:3598", "href": "https://access.redhat.com/errata/RHSA-2020:3598", "type": "redhat", "title": "(RHSA-2020:3598) Important: kernel security and bug fix update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-29T22:08:32", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10713", "CVE-2020-10757", "CVE-2020-12653", "CVE-2020-12654"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837427)\n\n* Fix dpdk regression introduced by bz1837297 (BZ#1852775)\n\n* Possible race condition updating the cfg structure in __assign_irq_vector. (BZ#1854552)", "modified": "2020-07-30T00:23:11", "published": "2020-07-29T23:50:14", "id": "RHSA-2020:3226", "href": "https://access.redhat.com/errata/RHSA-2020:3226", "type": "redhat", "title": "(RHSA-2020:3226) Important: kernel security and bug fix update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-29T18:05:59", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19527", "CVE-2020-10713", "CVE-2020-10757", "CVE-2020-12653", "CVE-2020-12654"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL7.7 - scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (BZ#1830889)\n\n* [DELL EMC 7.8 BUG bnxt_en] Error messages related to hwrm observed for BCM 57504 under dmesg in RHEL 7.8 (BZ#1834190)\n\n* kernel: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837429)\n\n* RHEL7.7 - Request: retrofit kernel commit f82b4b6 to RHEL 7.7/7.8 3.10 kernels. (BZ#1838602)\n\n* kipmi thread high CPU consumption when performing BMC firmware upgrade (BZ#1841825)\n\n* RHEL7.7 - virtio-blk: fix hw_queue stopped on arbitrary error (kvm) (BZ#1842994)\n\n* rhel 7 infinite blocked waiting on inode_dio_wait in nfs (BZ#1845520)\n\n* http request is taking more time for endpoint running on different host via nodeport service (BZ#1847333)\n\n* ext4: change LRU to round-robin in extent status tree shrinker (BZ#1847343)\n\n* libaio is returning duplicate events (BZ#1850055)\n\n* After upgrade to 3.9.89 pod containers with CPU limits fail to start due to cgroup error (BZ#1850500)\n\n* Fix dpdk regression introduced by bz1837297 (BZ#1852245)", "modified": "2020-07-29T21:46:18", "published": "2020-07-29T21:19:38", "id": "RHSA-2020:3220", "href": "https://access.redhat.com/errata/RHSA-2020:3220", "type": "redhat", "title": "(RHSA-2020:3220) Important: kernel security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-29T18:03:29", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19527", "CVE-2020-10713", "CVE-2020-10757", "CVE-2020-12653", "CVE-2020-12654"], "description": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837438)\n\n* kernel-rt: update to the latest RHEL7.8.z3 source tree (BZ#1848017)", "modified": "2020-07-29T21:46:18", "published": "2020-07-29T21:19:48", "id": "RHSA-2020:3221", "href": "https://access.redhat.com/errata/RHSA-2020:3221", "type": "redhat", "title": "(RHSA-2020:3221) Important: kernel-rt security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-21T16:03:09", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12888"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* [ESXi][RHEL8.1.0] scsi driver SG list incompatibility (vmw_pvscsi) (BZ#1839359)", "modified": "2020-07-21T18:23:07", "published": "2020-07-21T18:15:28", "id": "RHSA-2020:3041", "href": "https://access.redhat.com/errata/RHSA-2020:3041", "type": "redhat", "title": "(RHSA-2020:3041) Important: kernel security and bug fix update", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-21T12:07:32", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19807", "CVE-2019-3016", "CVE-2020-10757", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-12653", "CVE-2020-12654", "CVE-2020-12888"], "description": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807)\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. (CVE-2020-10766)\n\n* kernel: Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (CVE-2020-10767)\n\n* kernel: Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (CVE-2020-10768)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)\n\n* kernel: kvm: Information leak within a KVM guest (CVE-2019-3016)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* kernel-rt: update RT source tree to the RHEL-8.2.z2 source tree (BZ#1829582)", "modified": "2020-07-21T15:16:24", "published": "2020-07-21T15:15:46", "id": "RHSA-2020:3016", "href": "https://access.redhat.com/errata/RHSA-2020:3016", "type": "redhat", "title": "(RHSA-2020:3016) Important: kernel-rt security and bug fix update", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "oraclelinux": [{"lastseen": "2020-07-31T07:36:19", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10713", "CVE-2020-15780", "CVE-2019-20908"], "description": "[4.18.0-193.14.3_2.OL8]\n- Oracle Linux certificates (Kevin Lyons)\n- Disable signing for aarch64 (Ilya Okomin)\n- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]\n- Update x509.genkey [Orabug: 24817676]\n- Conflict with shim-ia32 and shim-x64 <= 15-2.0.3.el7\n[4.18.0-193.14.3_2]\n- Reverse keys order for dual-signing (Frantisek Hrbata) [1837433 1837434] {CVE-2020-10713}\n[4.18.0-193.14.2_2]\n- [kernel] Move to dual-signing to split signing keys up better (pjones) [1837433 1837434] {CVE-2020-10713}\n- [crypto] pefile: Tolerate other pefile signatures after first (Lenny Szubowicz) [1837433 1837434] {CVE-2020-10713}\n- [acpi] ACPI: configfs: Disallow loading ACPI tables when locked down (Lenny Szubowicz) [1852968 1852969] {CVE-2020-15780}\n- [firmware] efi: Restrict efivar_ssdt_load when the kernel is locked down (Lenny Szubowicz) [1852948 1852949] {CVE-2019-20908}\n[4.18.0-193.14.1_2]\n- [md] dm mpath: add DM device name to Failing/Reinstating path log messages (Mike Snitzer) [1852050 1822975]\n- [md] dm mpath: enhance queue_if_no_path debugging (Mike Snitzer) [1852050 1822975]\n- [md] dm mpath: restrict queue_if_no_path state machine (Mike Snitzer) [1852050 1822975]\n- [md] dm mpath: simplify __must_push_back (Mike Snitzer) [1852050 1822975]\n- [md] dm: use DMDEBUG macros now that they use pr_debug variants (Mike Snitzer) [1852050 1822975]\n- [include] dm: use dynamic debug instead of compile-time config option (Mike Snitzer) [1852050 1822975]\n- [md] dm mpath: switch paths in dm_blk_ioctl() code path (Mike Snitzer) [1852050 1822975]\n- [md] dm multipath: use updated MPATHF_QUEUE_IO on mapping for bio-based mpath (Mike Snitzer) [1852050 1822975]\n- [md] dm: bump version of core and various targets (Mike Snitzer) [1852050 1822975]\n- [md] dm mpath: Add timeout mechanism for queue_if_no_path (Mike Snitzer) [1852050 1822975]\n- [md] dm mpath: use true_false for bool variable (Mike Snitzer) [1852050 1822975]\n- [md] dm mpath: remove harmful bio-based optimization (Mike Snitzer) [1852050 1822975]\n- [scsi] scsi: libiscsi: fall back to sendmsg for slab pages (Maurizio Lombardi) [1852048 1825775]\n- [s390] s390/mm: fix panic in gup_fast on large pud (Philipp Rudo) [1853336 1816980]", "edition": 1, "modified": "2020-07-30T00:00:00", "published": "2020-07-30T00:00:00", "id": "ELSA-2020-3218", "href": "http://linux.oracle.com/errata/ELSA-2020-3218.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-30T01:42:55", "bulletinFamily": "unix", "cvelist": ["CVE-2020-15780"], "description": "[5.4.17-2011.4.6.el8uek]\n- Revert 'uek-rpm: Move grub boot menu update to posttrans stage.' (Somasundaram Krishnasamy) [Orabug: 31358097]\n[5.4.17-2011.4.5.el8uek]\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (Divya Indi) [Orabug: 31631527] \n- certs: Remove Oracle cert compiled into the kernel (Eric Snowberg) [Orabug: 31555595] \n- acpi: disallow loading configfs acpi tables when locked down (Jason A. Donenfeld) [Orabug: 31642981]", "edition": 2, "modified": "2020-07-29T00:00:00", "published": "2020-07-29T00:00:00", "id": "ELSA-2020-5792", "href": "http://linux.oracle.com/errata/ELSA-2020-5792.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-30T01:42:17", "bulletinFamily": "unix", "cvelist": ["CVE-2019-20908"], "description": "[4.14.35-1902.304.6.3]\n- Revert 'uek-rpm: Move grub boot menu update to posttrans stage.' (Somasundaram Krishnasamy) [Orabug: 31358100]\n[4.14.35-1902.304.6.2]\n- certs: Remove Oracle cert compiled into the kernel (Eric Snowberg) [Orabug: 31668611] \n- efi: Restrict efivar_ssdt_load when the kernel is locked down (Matthew Garrett) [Orabug: 31662729] {CVE-2019-20908}\n[4.14.35-1902.304.6.1]\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (Divya Indi) [Orabug: 31652801]", "edition": 2, "modified": "2020-07-29T00:00:00", "published": "2020-07-29T00:00:00", "id": "ELSA-2020-5791", "href": "http://linux.oracle.com/errata/ELSA-2020-5791.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-30T09:34:46", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19527", "CVE-2020-10713", "CVE-2020-12654", "CVE-2020-12653", "CVE-2020-10757"], "description": "[3.10.0-1127.18.2.OL7]\n- Oracle Linux certificates (Ilya Okomin)\n- Oracle Linux RHCK Module Signing Key was compiled into kernel (olkmod_signing_key.x509)(alexey.petrenko@oracle.com)\n- Update x509.genkey [Orabug: 24817676]\n- Conflict with shim-ia32 and shim-x64 <= 15-2.0.3\n[3.10.0-1127.18.2]\n- [crypto] pefile: Tolerate other pefile signatures after first (Lenny Szubowicz) [1837429 1837430] {CVE-2020-10713}\n- [kernel] Move to dual-signing to split signing keys up better (pjones) [1837429 1837430] {CVE-2020-10713}\n[3.10.0-1127.18.1]\n- [fs] locks: allow filesystems to request that ->setlease be called without i_lock (Jeff Layton) [1838602 1830606]\n- [fs] locks: move fasync setup into generic_add_lease (Jeff Layton) [1838602 1830606]\n[3.10.0-1127.17.1]\n- [vfio] vfio/pci: Fix SR-IOV VF handling with MMIO blocking (Alex Williamson) [1852245 1820632]\n- [fs] aio: fix inconsistent ring state (Jeff Moyer) [1850055 1845326]\n- [wireless] mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() (Jarod Wilson) [1844069 1844070] {CVE-2020-12654}\n- [wireless] mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv() (Jarod Wilson) [1844025 1844026] {CVE-2020-12653}\n- [x86] mm: Fix mremap not considering huge pmd devmap (Rafael Aquini) [1843436 1843437] {CVE-2020-10757}\n- [mm] mm, dax: check for pmd_none() after split_huge_pmd() (Rafael Aquini) [1843436 1843437] {CVE-2020-10757}\n- [mm] mm: mremap: streamline move_page_tables()'s move_huge_pmd() corner case (Rafael Aquini) [1843436 1843437] {CVE-2020-10757}\n- [mm] mm: mremap: validate input before taking lock (Rafael Aquini) [1843436 1843437] {CVE-2020-10757}\n[3.10.0-1127.16.1]\n- [kernel] sched/fair: Scale bandwidth quota and period without losing quota/period ratio precision (Artem Savkov) [1850500 1752067]\n- [block] virtio-blk: improve virtqueue error to BLK_STS (Philipp Rudo) [1842994 1818001]\n- [block] virtio-blk: fix hw_queue stopped on arbitrary error (Philipp Rudo) [1842994 1818001]\n[3.10.0-1127.15.1]\n- [fs] ext4: fix setting of referenced bit in ext4_es_lookup_extent() (Lukas Czerner) [1847343 1663720]\n- [fs] ext4: introduce aging to extent status tree (Lukas Czerner) [1847343 1663720]\n- [fs] ext4: cleanup flag definitions for extent status tree (Lukas Czerner) [1847343 1663720]\n- [fs] ext4: limit number of scanned extents in status tree shrinker (Lukas Czerner) [1847343 1663720]\n- [fs] ext4: move handling of list of shrinkable inodes into extent status code (Lukas Czerner) [1847343 1663720]\n- [fs] ext4: change LRU to round-robin in extent status tree shrinker (Lukas Czerner) [1847343 1663720]\n- [net] netfilter: nat: never update the UDP checksum when it's 0 (Guillaume Nault) [1847333 1834278]\n- [char] ipmi_si: Only schedule continuously in the thread in maintenance mode (Alexey Klimov) [1841825 1837127]\n- [scsi] scsi: ibmvfc: Fix NULL return compiler warning (Steve Best) [1830889 1810643]\n- [scsi] scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (Steve Best) [1830889 1810643]\n- [hid] HID: hiddev: do cleanup in failure of opening a device (Torez Smith) [1803448 1814257] {CVE-2019-19527}\n- [hid] HID: hiddev: avoid opening a disconnected device (Torez Smith) [1803448 1814257] {CVE-2019-19527}\n[3.10.0-1127.14.1]\n- [fs] NFS: Fix a race between mmap() and O_DIRECT (Benjamin Coddington) [1845520 1813803]\n- [fs] NFS: Remove a redundant call to unmap_mapping_range() (Benjamin Coddington) [1845520 1813803]\n- [fs] NFS: Remove redundant waits for O_DIRECT in fsync() and write_begin() (Benjamin Coddington) [1845520 1813803]\n- [fs] NFS: Cleanup nfs_direct_complete() (Benjamin Coddington) [1845520 1813803]\n- [fs] NFS: Do not serialise O_DIRECT reads and writes (Benjamin Coddington) [1845520 1813803]\n- [fs] NFS: Move buffered I/O locking into nfs_file_write() (Benjamin Coddington) [1845520 1813803]\n- [fs] bdi: make inode_to_bdi() inline (Benjamin Coddington) [1845520 1813803]\n- [fs] NFS: Remove racy size manipulations in O_DIRECT (Benjamin Coddington) [1845520 1813803]\n- [fs] NFS: Don't hold the inode lock across fsync() (Benjamin Coddington) [1845520 1813803]\n- [fs] nfs: remove nfs_inode_dio_wait (Benjamin Coddington) [1845520 1813803]\n- [fs] nfs: remove nfs4_file_fsync (Benjamin Coddington) [1845520 1813803]\n- [fs] NFS: Kill NFS_INO_NFS_INO_FLUSHING: it is a performance killer (Benjamin Coddington) [1845520 1813803]\n- [infiniband] RDMA/bnxt_re: Fix chip number validation Broadcom's Gen P5 series (Jonathan Toppins) [1834190 1823679]", "edition": 1, "modified": "2020-07-30T00:00:00", "published": "2020-07-30T00:00:00", "id": "ELSA-2020-3220", "href": "http://linux.oracle.com/errata/ELSA-2020-3220.html", "title": "kernel security and bug fix update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-14T21:30:14", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-0543", "CVE-2019-19769", "CVE-2020-10757", "CVE-2020-12655"], "description": "[5.4.17-2011.4.4uek]\n- KVM: VMX: Explicitly clear RFLAGS.CF and RFLAGS.ZF in VM-Exit RSB path (Sean Christopherson) [Orabug: 31536904]\n[5.4.17-2011.4.3uek]\n- NFS: replace cross device check in copy_file_range (Olga Kornievskaia) [Orabug: 31507615] \n- rds: Fix potential use after free in rds_ib_inc_free (Hans Westgaard Ry) [Orabug: 31504052] \n- perf/smmuv3: Allow sharing MMIO registers with the SMMU driver (Jean-Philippe Brucker) [Orabug: 31422283] \n- perf/smmuv3: use devm_platform_ioremap_resource() to simplify code (YueHaibing) [Orabug: 31422283] \n- ACPI/IORT: Fix PMCG node single ID mapping handling (Tuan Phan) [Orabug: 31422283] \n- uek-rpm: Increase CONFIG_NODES_SHIFT from 2 to 3 (Dave Kleikamp) [Orabug: 31422283] \n- perf: avoid breaking KABI by reusing enum (Dave Kleikamp) [Orabug: 31422283] \n- uek-rpm: update aarch64 configs for Ampere eMAG2 (Dave Kleikamp) [Orabug: 31422283] \n- perf: arm_dmc620: Update ACPI ID. (Tuan Phan) [Orabug: 31422283] \n- perf: arm_dsu: Support ACPI mode. (Tuan Phan) [Orabug: 31422283] \n- perf: arm_dsu: Allow IRQ to be shared among devices. (Tuan Phan) [Orabug: 31422283] \n- perf: arm_cmn: improve and make it work on 2P. (Tuan Phan) [Orabug: 31422283] \n- Perf: arm-cmn: Allow irq to be shared. (Tuan Phan) [Orabug: 31422283] \n- BACKPORT: arm64: acpi: Make apei_claim_sea() synchronise with APEI's irq work (James Morse) [Orabug: 31422283] \n- BACKPORT: ACPI / APEI: Kick the memory_failure() queue for synchronous errors (James Morse) [Orabug: 31422283] \n- BACKPORT: mm/memory-failure: Add memory_failure_queue_kick() (James Morse) [Orabug: 31422283] \n- perf: Add ARM DMC-620 PMU driver. (Tuan Phan) [Orabug: 31422283] \n- BACKPORT: WIP: perf/arm-cmn: Add ACPI support (Robin Murphy) [Orabug: 31422283] \n- BACKPORT: WIP: perf: Add Arm CMN-600 PMU driver (Robin Murphy) [Orabug: 31422283] \n- BACKPORT: perf: Add Arm CMN-600 DT binding (Robin Murphy) [Orabug: 31422283] \n- net/rds: NULL pointer de-reference in rds_ib_add_one() (Ka-Cheong Poon) [Orabug: 30984983] \n- mm: Fix mremap not considering huge pmd devmap (Fan Yang) [Orabug: 31452396] {CVE-2020-10757} {CVE-2020-10757}\n[5.4.17-2011.4.2uek]\n- UEK6 compiler warning for /net/rds/ib.c (Sharath Srinivasan) [Orabug: 31489529] \n- UEK6 compiler warning for /net/rds/send.c (Sharath Srinivasan) [Orabug: 31489529] \n- Fix up two build warnings in the UEK6 GA tree (Jack Vogel) [Orabug: 31489333] \n- drivers/scsi/scsi_scan.c Fix the compiler warning. (Sudhakar Panneerselvam) [Orabug: 31489322] \n- x86/retpoline: Fix retpoline unwind (Peter Zijlstra) [Orabug: 31077463] [Orabug: 31489320] \n- x86: Change {JMP,CALL}_NOSPEC argument (Peter Zijlstra) [Orabug: 31077463] [Orabug: 31489320] \n- x86: Simplify retpoline declaration (Peter Zijlstra) [Orabug: 31077463] [Orabug: 31489320] \n- x86/speculation: Change STUFF_RSB to work with objtool (Alexandre Chartre) [Orabug: 31077463] [Orabug: 31489320] \n- x86/speculation: Change FILL_RETURN_BUFFER to work with objtool (Peter Zijlstra) [Orabug: 31077463] [Orabug: 31489320] \n- x86/unwind: Introduce UNWIND_HINT_EMPTY_ASM (Alexandre Chartre) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: Add support for intra-function calls (Alexandre Chartre) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: Remove INSN_STACK (Peter Zijlstra) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: Make handle_insn_ops() unconditional (Peter Zijlstra) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: Rework allocating stack_ops on decode (Peter Zijlstra) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: UNWIND_HINT_RET_OFFSET should not check registers (Alexandre Chartre) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: is_fentry_call() crashes if call has no destination (Alexandre Chartre) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: Uniquely identify alternative instruction groups (Alexandre Chartre) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: Remove check preventing branches within alternative (Julien Thierry) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: Introduce HINT_RET_OFFSET (Peter Zijlstra) [Orabug: 31077463] [Orabug: 31489320] \n- objtool: Support multiple stack_op per instruction (Julien Thierry) [Orabug: 31077463] [Orabug: 31489320]\n}", "edition": 4, "modified": "2020-07-14T00:00:00", "published": "2020-07-14T00:00:00", "id": "ELSA-2020-5756", "href": "http://linux.oracle.com/errata/ELSA-2020-5756.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-07-24T23:33:01", "bulletinFamily": "unix", "cvelist": ["CVE-2020-12888", "CVE-2019-3016", "CVE-2020-0543", "CVE-2020-12654", "CVE-2020-10768", "CVE-2020-10766", "CVE-2020-12653", "CVE-2019-19807", "CVE-2020-10757", "CVE-2020-10767"], "description": "[4.18.0-193.13.2_2.OL8]\n- Oracle Linux certificates (Alexey Petrenko)\n- Oracle Linux RHCK Module Signing Key was added to the kernel trusted keys list (olkmod_signing_key.pem) [Orabug: 29539237]\n- Update x509.genkey [Orabug: 24817676]\n[4.18.0-193.13.2_2]\n- Rebuild to get kernel image properly signed (Bruno Meneguele)\n[4.18.0-193.13.1_2]\n- [x86] x86/efi: Allocate e820 buffer before calling efi_exit_boot_service (Lenny Szubowicz) [1846180 1824005]\n[4.18.0-193.12.1_2]\n- [net] openvswitch: simplify the ovs_dp_cmd_new (Eelco Chaudron) [1851235 1819202]\n- [net] openvswitch: fix possible memleak on destroy flow-table (Eelco Chaudron) [1851235 1819202]\n- [net] openvswitch: add likely in flow_lookup (Eelco Chaudron) [1851235 1819202]\n- [net] openvswitch: simplify the flow_hash (Eelco Chaudron) [1851235 1819202]\n- [net] openvswitch: optimize flow-mask looking up (Eelco Chaudron) [1851235 1819202]\n- [net] openvswitch: optimize flow mask cache hash collision (Eelco Chaudron) [1851235 1819202]\n- [net] openvswitch: shrink the mask array if necessary (Eelco Chaudron) [1851235 1819202]\n- [net] openvswitch: convert mask list in mask array (Eelco Chaudron) [1851235 1819202]\n- [net] openvswitch: add flow-mask cache for performance (Eelco Chaudron) [1851235 1819202]\n- [net] netfilter: nf_tables: use-after-free in dynamic operations (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: add missing ->release_ops() in error path of newrule() (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nft_compat: use .release_ops and remove list of extension (Phil Sutter) [1845164 1757933]\n- [vfio] vfio/pci: Fix SR-IOV VF handling with MMIO blocking (Alex Williamson) [1837309 1837310] {CVE-2020-12888}\n- [pci] PCI: pciehp: Fix MSI interrupt race (Myron Stowe) [1852045 1779610]\n- [kernel] smp: Allow smp_call_function_single_async() to insert locked csd (Peter Xu) [1851406 1830014]\n- [x86] kvm: Clean up host's steal time structure (Jon Maloy) [1795128 1813987] {CVE-2019-3016}\n- [x86] kvm: Make sure KVM_VCPU_FLUSH_TLB flag is not missed (Jon Maloy) [1795128 1813987] {CVE-2019-3016}\n- [virt] x86/kvm: Cache gfn to pfn translation (Jon Maloy) [1795128 1813987] {CVE-2019-3016}\n- [virt] x86/kvm: Introduce kvm_(un)map_gfn() (Jon Maloy) [1795128 1813987] {CVE-2019-3016}\n- [x86] kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit (Jon Maloy) [1795128 1813987] {CVE-2019-3016}\n[4.18.0-193.11.1_2]\n- [net] netfilter: conntrack: fix infinite loop on rmmod (Florian Westphal) [1851005 1832381]\n- [net] netfilter: conntrack: allow insertion of clashing entries (Florian Westphal) [1851003 1821404]\n- [net] netfilter: conntrack: split resolve_clash function (Florian Westphal) [1851003 1821404]\n- [net] netfilter: conntrack: place confirm-bit setting in a helper (Florian Westphal) [1851003 1821404]\n- [net] netfilter: never get/set skb->tstamp (Florian Westphal) [1851003 1821404]\n- [net] netfilter: conntrack: remove two args from resolve_clash (Florian Westphal) [1851003 1821404]\n- [net] netfilter: conntrack: tell compiler to not inline nf_ct_resolve_clash (Florian Westphal) [1851003 1821404]\n- [x86] mm: Fix mremap not considering huge pmd devmap (Rafael Aquini) [1843440 1843441] {CVE-2020-10757}\n- [x86] x86/vector: Remove warning on managed interrupt migration (Peter Xu) [1848545 1812331]\n- [s390] s390/cio: fix virtio-ccw DMA without PV (Philipp Rudo) [1842620 1814787]\n[4.18.0-193.10.1_2]\n- [misc] dma-mapping: zero memory returned from dma_alloc_* (Philipp Rudo) [1847453 1788928]\n- [nvme] nvme-multipath: fix crash in nvme_mpath_clear_ctrl_paths (Gopal Tiwari) [1846405 1781927]\n- [net] netfilter: nf_tables: fix infinite loop when expr is not available (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: autoload modules from the abort path (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: remove WARN and add NLA_STRING upper limits (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: store transaction list locally while requesting module (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: use-after-free in failing rule with bound set (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nft_meta: skip EAGAIN if nft_meta_bridge is not a module (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: force module load in case select_ops() returns -EAGAIN (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: add nft_expr_type_request_module() (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: bogus EBUSY in helper removal from transaction (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: fix set double-free in abort path (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nft_compat: don't use refcount_inc on newly allocated entry (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: unbind set in rule from commit path (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nft_compat: destroy function must not have side effects (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nft_compat: make lists per netns (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nft_compat: use refcnt_t type for nft_xt reference count (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: fix suspicious RCU usage in nft_chain_stats_replace() (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: asynchronous release (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: split set destruction in deactivate and destroy phase (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: flow event notifier must use transaction mutex (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: use dedicated mutex to guard transactions (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: avoid global info storage (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: take module reference when starting a batch (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: make valid_genid callback mandatory (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nf_tables: add and use helper for module autoload (Phil Sutter) [1845164 1757933]\n- [net] netfilter: nat: never update the UDP checksum when it's 0 (Guillaume Nault) [1847128 1794714]\n- [x86] x86/speculation: PR_SPEC_FORCE_DISABLE enforcement for indirect branches (Waiman Long) [1847395 1847396] {CVE-2020-10768}\n- [x86] x86/speculation: Prevent rogue cross-process SSBD shutdown (Waiman Long) [1847357 1847358] {CVE-2020-10766}\n- [x86] x86/speculation: Avoid force-disabling IBPB based on STIBP and enhanced IBRS (Waiman Long) [1847378 1847379] {CVE-2020-10767}\n- [x86] x86/speculation: Add support for STIBP always-on preferred mode (Waiman Long) [1847378 1847379] {CVE-2020-10767}\n- [x86] x86/speculation: Change misspelled STIPB to STIBP (Waiman Long) [1847378 1847379] {CVE-2020-10767}\n- [powerpc] powerpc/pseries/ddw: Extend upper limit for huge DMA window for persistent memory (Steve Best) [1842406 1817596]\n[4.18.0-193.9.1_2]\n- [wireless] mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() (Jarod Wilson) [1844073 1844031] {CVE-2020-12654}\n- [wireless] mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv() (Jarod Wilson) [1844049 1844039] {CVE-2020-12653}\n- [netdrv] net/mlx5: FPGA, support network cards with standalone FPGA (Alaa Hleihel) [1843544 1789380]\n- [mm] hugetlbfs: don't retry when pool page allocations start to fail (Rafael Aquini) [1835789 1727288]\n- [mm] mm, compaction: raise compaction priority after it withdrawns (Rafael Aquini) [1835789 1727288]\n- [mm] mm, reclaim: cleanup should_continue_reclaim() (Rafael Aquini) [1835789 1727288]\n- [mm] mm, reclaim: make should_continue_reclaim perform dryrun detection (Rafael Aquini) [1835789 1727288]\n- [kernel] exit: panic before exit_mm() on global init exit (Oleg Nesterov) [1821378 1808944]\n- [documentation] x86/speculation: Add Ivy Bridge to affected list (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n- [documentation] x86/speculation: Add SRBDS vulnerability and mitigation documentation (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n- [x86] x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n- [x86] x86/cpu: Add 'table' argument to cpu_matches() (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n- [x86] x86/cpu: Add a steppings field to struct x86_cpu_id (Josh Poimboeuf) [1827191 1827192] {CVE-2020-0543}\n[4.18.0-193.8.1_2]\n- [vfio] vfio-pci: Invalidate mmaps and block MMIO access on disabled memory (Alex Williamson) [1837309 1837310] {CVE-2020-12888}\n- [vfio] vfio-pci: Fault mmaps to enable vma tracking (Alex Williamson) [1837309 1837310] {CVE-2020-12888}\n- [vfio] vfio/type1: Support faulting PFNMAP vmas (Alex Williamson) [1837309 1837310] {CVE-2020-12888}\n- [vfio] vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (Alex Williamson) [1837309 1837310] {CVE-2020-12888}\n- [vfio] vfio/pci: call irq_bypass_unregister_producer() before freeing irq (Alex Williamson) [1837309 1837310] {CVE-2020-12888}\n- [vfio] vfio_pci: Enable memory accesses before calling pci_map_rom (Alex Williamson) [1837309 1837310] {CVE-2020-12888}\n[4.18.0-193.7.1_2]\n- [sound] ALSA: timer: Fix incorrectly assigned timer instance (Jaroslav Kysela) [1821714 1798468] {CVE-2019-19807}\n- [netdrv] ibmvnic: Do not process device remove during device reset (Steve Best) [1836229 1813223]\n- [net] ipv4: really enforce backoff for redirects (Paolo Abeni) [1836302 1834184]", "edition": 1, "modified": "2020-07-24T00:00:00", "published": "2020-07-24T00:00:00", "id": "ELSA-2020-3010", "href": "http://linux.oracle.com/errata/ELSA-2020-3010.html", "title": "kernel security, bug fix, and enhancement update", "type": "oraclelinux", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-10T21:44:29", "bulletinFamily": "unix", "cvelist": ["CVE-2020-12888", "CVE-2019-19062", "CVE-2020-10732", "CVE-2020-10768", "CVE-2019-19037", "CVE-2019-19447", "CVE-2019-20908", "CVE-2019-16232", "CVE-2019-20811", "CVE-2019-16234", "CVE-2019-19049"], "description": "[4.14.35-1902.305.4]\n- ptp: free ptp device pin descriptors properly (Vladis Dronov) [Orabug: 31710994]\n[4.14.35-1902.305.3]\n- fs/binfmt_elf.c: allocate initialized memory in fill_thread_core_info() (Alexander Potapenko) [Orabug: 31350638] {CVE-2020-10732}\n- PCI: vmd: Filter resource type bits from shadow register (Jon Derrick) [Orabug: 31674879] \n- PCI: vmd: Add device id for VMD device 8086:9A0B (Jon Derrick) [Orabug: 31674879] \n- PCI: vmd: Fix shadow offsets to reflect spec changes (Jon Derrick) [Orabug: 31674879] \n- PCI: vmd: Fix config addressing when using bus offsets (Jon Derrick) [Orabug: 31674879] \n- PCI/VMD: Configure MPS settings before adding devices (Jon Derrick) [Orabug: 31674879] \n- PCI: vmd: Add an additional VMD device id to driver device id table (Jon Derrick) [Orabug: 31674879] \n- PCI: vmd: Add offset to bus numbers if necessary (Jon Derrick) [Orabug: 31674879] \n- PCI: vmd: Assign membar addresses from shadow registers (Jon Derrick) [Orabug: 31674879] \n- PCI: Add Intel VMD devices to pci ids (Jon Derrick) [Orabug: 31674879] \n- misc: pvpanic: add crash loaded event (zhenwei pi) [Orabug: 31677099] \n- kvm: Increase KVM_USER_MEM_SLOTS for dense memory hotplug (Eric DeVolder) [Orabug: 31694369]\n[4.14.35-1902.305.2]\n- net-sysfs: call dev_hold if kobject_init_and_add success (YueHaibing) [Orabug: 31445419] {CVE-2019-20811}\n- vfio-pci: protect remap_pfn_range() from simultaneous calls (Ankur Arora) [Orabug: 31663632] {CVE-2020-12888} {CVE-2020-12888}\n- crypto: user - fix memory leak in crypto_report (Navid Emamdoost) [Orabug: 31351639] {CVE-2019-19062}\n- iwlwifi: pcie: fix rb_allocator workqueue allocation (Johannes Berg) [Orabug: 31351807] {CVE-2019-16234}\n- RDMA/netlink: Do not always generate an ACK for some netlink operations (Hakon Bugge) [Orabug: 31666974] \n- Revert 'uek-rpm: Move grub boot menu update to posttrans stage.' (Somasundaram Krishnasamy) [Orabug: 31358100] \n- net: dsa: Do not leave DSA master with NULL netdev_ops (Allen Pais) [Orabug: 31038233] \n- rds/ib: Make i_{recv,send}_hdrs non-contigious (Hans Westgaard Ry) [Orabug: 30358057] \n- certs: Remove Oracle cert compiled into the kernel (Eric Snowberg) [Orabug: 31555628] \n- CIFS: dump IPC tcon in debug proc file (Aurelien Aptel) [Orabug: 31500374] \n- CIFS: use tcon_ipc instead of use_ipc parameter of SMB2_ioctl (Aurelien Aptel) [Orabug: 31500374] \n- CIFS: make IPC a regular tcon (Aurelien Aptel) [Orabug: 31500374] \n- CIFS: dont log STATUS_NOT_FOUND errors for DFS (Aurelien Aptel) [Orabug: 31500374] \n- efi: Restrict efivar_ssdt_load when the kernel is locked down (Matthew Garrett) [Orabug: 31643409] {CVE-2019-20908}\n- uek-rpm: drivers: enable VMD PCIe controller (Todd Vierling) [Orabug: 30646928] \n- ext4: fix ext4_empty_dir() for directories with holes (Jan Kara) [Orabug: 31265319] {CVE-2019-19037} {CVE-2019-19037}\n- IB/sa: Resolv use-after-free in ib_nl_make_request() (Divya Indi) [Orabug: 31631531] \n- ocfs2: change slot number type s16 to u16 (Junxiao Bi) [Orabug: 31480605] \n- ocfs2: fix value of OCFS2_INVALID_SLOT (Junxiao Bi) [Orabug: 31480605] \n- ocfs2: fix panic on nfs server over ocfs2 (Junxiao Bi) [Orabug: 31480605] \n- ocfs2: load global_inode_alloc (Junxiao Bi) [Orabug: 31480605] \n- ocfs2: avoid inode removal while nfsd is accessing it (Junxiao Bi) [Orabug: 31480605]\n[4.14.35-1902.305.1]\n- x86/{mce,mm}: Unmap the entire page if the whole page is affected and poisoned (Tony Luck) [Orabug: 31601132] \n- libertas: fix a potential NULL pointer dereference (Allen Pais) [Orabug: 31351822] {CVE-2019-16232}\n- ext4: work around deleting a file with i_nlink == 0 safely (Theodore Tso) [Orabug: 31351013] {CVE-2019-19447}\n[4.14.35-1902.305.0]\n- thermal: support for Marvell Octeon TX SoC temperature sensors (Eric Saint-Etienne) [Orabug: 31564706] \n- thermal: support for Marvell Octeon TX2 SoC temperature sensors (Eric Saint-Etienne) [Orabug: 31564706] \n- x86/speculation: Prevent rogue cross-process SSBD shutdown (Anthony Steinhauser) [Orabug: 31557902] {CVE-2020-10768}\n- psi: Fix double free (Tom Hromatka) [Orabug: 31535640] \n- vfio/pci: Fix SR-IOV VF handling with MMIO blocking (Alex Williamson) [Orabug: 31439670] {CVE-2020-12888}\n- vfio/pci: Mask buggy SR-IOV VF INTx support (Alex Williamson) [Orabug: 31439670] {CVE-2020-12888}\n- vfio-pci: Invalidate mmaps and block MMIO access on disabled memory (Alex Williamson) [Orabug: 31439670] {CVE-2020-12888} {CVE-2020-12888}\n- vfio/pci: call irq_bypass_unregister_producer() before freeing irq (Jiang Yi) [Orabug: 31439670] {CVE-2020-12888}\n- vfio/pci: Pull BAR mapping setup from read-write path (Alex Williamson) [Orabug: 31439670] {CVE-2020-12888}\n- vfio_pci: Enable memory accesses before calling pci_map_rom (Eric Auger) [Orabug: 31439670] {CVE-2020-12888}\n- vfio-pci: Fault mmaps to enable vma tracking (Alex Williamson) [Orabug: 31439670] {CVE-2020-12888}\n- vfio/type1: Support faulting PFNMAP vmas (Alex Williamson) [Orabug: 31439670] {CVE-2020-12888}\n- vfio/type1: Fix VA->PA translation for PFNMAP VMAs in vaddr_get_pfn() (Sean Christopherson) [Orabug: 31439670] {CVE-2020-12888}\n- of: unittest: fix memory leak in unittest_data_add (Navid Emamdoost) [Orabug: 31351701] {CVE-2019-19049}", "edition": 1, "modified": "2020-08-10T00:00:00", "published": "2020-08-10T00:00:00", "id": "ELSA-2020-5804", "href": "http://linux.oracle.com/errata/ELSA-2020-5804.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-11T07:29:07", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19054", "CVE-2020-10711", "CVE-2020-12770", "CVE-2019-19533", "CVE-2019-19534", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2019-15220", "CVE-2020-12654", "CVE-2020-12653", "CVE-2020-12652", "CVE-2020-10757", "CVE-2019-7308", "CVE-2019-15214", "CVE-2019-3846", "CVE-2020-12655", "CVE-2020-12657", "CVE-2019-19536"], "description": "[4.14.35-1902.304.6]\n- bpf: fix sanitation rewrite in case of non-pointers (Daniel Borkmann) [Orabug: 31552243]\n[4.14.35-1902.304.5]\n- acpi: disallow loading configfs acpi tables when locked down (Jason A. Donenfeld) [Orabug: 31493187] \n- selftests/bpf: do not run test_kmod.sh for UEK5 (Alan Maguire) [Orabug: 31540213] \n- bpf: do not allow root to mangle valid pointers (Alexei Starovoitov) [Orabug: 31540213] \n- x86/mitigations: reset default value for srbds_mitigation (Mihai Carabas) [Orabug: 31515075] \n- x86/cpu: clear X86_BUG_SRBDS before late loading (Mihai Carabas) [Orabug: 31515075] \n- x86/mitigations: update MSRs on all CPUs for SRBDS (Mihai Carabas) [Orabug: 31515075] \n- p54usb: Fix race between disconnect and firmware loading (Alan Stern) [Orabug: 31351863] {CVE-2019-15220}\n- media: rc: prevent memory leak in cx23888_ir_probe (Navid Emamdoost) [Orabug: 31351671] {CVE-2019-19054}\n- mm: Fix mremap not considering huge pmd devmap (Fan Yang) [Orabug: 31452398] {CVE-2020-10757} {CVE-2020-10757}\n- tcp: implement coalescing on backlog queue (Eric Dumazet) [Orabug: 31517079] \n- tcp: drop dst in tcp_add_backlog() (Eric Dumazet) [Orabug: 31517079] \n- bpf: Fix up bpf_skb_adjust_room helper's skb csum setting (Daniel Borkmann) [Orabug: 31517079]\n[4.14.35-1902.304.4]\n- rds: Fix potential use after free in rds_ib_inc_free (Hans Westgaard Ry) [Orabug: 31504054] \n- cpu/hotplug: Fix 'SMT disabled by BIOS' detection for KVM (Josh Poimboeuf) [Orabug: 31421904] \n- RDMA/cm: Spurious WARNING triggered in cm_destroy_id() (Ka-Cheong Poon) [Orabug: 31483289] \n- RDMA/cm: Make sure the cm_id is in the IB_CM_IDLE state in destroy (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Allow ib_send_cm_sidr_rep() to be done under lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Allow ib_send_cm_rej() to be done under lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Allow ib_send_cm_drep() to be done under lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Allow ib_send_cm_dreq() to be done under lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Add some lockdep assertions for cm_id_priv->lock (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Make the destroy_id flow more robust (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Remove a race freeing timewait_info (Jason Gunthorpe) [Orabug: 31483289] \n- RDMA/cm: Use refcount_t type for refcount variable (Danit Goldberg) [Orabug: 31483289] \n- net/rds: NULL pointer de-reference in rds_ib_add_one() (Ka-Cheong Poon) [Orabug: 31501438] \n- scsi: mpt3sas: Introduce module parameter to override queue depth (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Fix memset() in non-RDPQ mode (Suganath Prabu S) [Orabug: 31486216] \n- scsi: mpt3sas: Fix reply queue count in non RDPQ mode (Suganath Prabu S) [Orabug: 31486216] \n(Samuel Zou) [Orabug: 31486216] \n- scsi: mpt3sas: Fix double free warnings (Suganath Prabu S) [Orabug: 31486216] \n- scsi: mpt3sas: Disable DIF when prot_mask set to zero (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Capture IOC data for debugging purposes (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Use true, false for ioc->use_32bit_dma (Jason Yan) [Orabug: 31486216] \n- scsi: mpt3sas: Remove NULL check before freeing function (Jason Yan) [Orabug: 31486216] \n- scsi: mpt3sas: Update mpt3sas version to 33.101.00.00 (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Handle RDPQ DMA allocation in same 4G region (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Separate out RDPQ allocation to new function (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Rename function name is_MSB_are_same (Suganath Prabu) [Orabug: 31486216] \n- scsi: mpt3sas: Don't change the DMA coherent mask after allocations (Christoph Hellwig) [Orabug: 31486216] \n- scsi: mpt3sas: use true,false for bool variables (Jason Yan) [Orabug: 31486216] \n- scsi: mpt3sas: Update drive version to 33.100.00.00 (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Remove usage of device_busy counter (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Print function name in which cmd timed out (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Optimize mpt3sas driver logging (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: print in which path firmware fault occurred (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Handle CoreDump state from watchdog thread (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Add support IOCs new state named COREDUMP (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: renamed _base_after_reset_handler function (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Add support for NVMe shutdown (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Update MPI Headers to v02.00.57 (Sreekanth Reddy) [Orabug: 31486216] \n- scsi: mpt3sas: Fix double free in attach error handling (Dan Carpenter) [Orabug: 31486216] \n- scsi: mpt3sas: change allocation option (Tomas Henzl) [Orabug: 31486216] \n- KVM: VMX: check descriptor table exits on instruction emulation (Oliver Upton) [Orabug: 31397358]\n[4.14.35-1902.304.3]\n- rebuild bumping release\n[4.14.35-1902.304.2]\n- bpf: fix sanitation of alu op with pointer / scalar type from different paths (Daniel Borkmann) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: prevent out of bounds speculation on pointer arithmetic (Daniel Borkmann) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: restrict unknown scalars of mixed signed bounds for unprivileged (Daniel Borkmann) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: move {prev_,}insn_idx into verifier env (Daniel Borkmann) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: reduce verifier memory consumption (Alexei Starovoitov) [Orabug: 31350800] {CVE-2019-7308}\n- bpf: Prevent memory disambiguation attack (Alexei Starovoitov) [Orabug: 31350800] {CVE-2019-7308}\n- Revert 'rds: Do not cancel RDMAs that have been posted to the HCA' (Gerd Rausch) [Orabug: 31476562] \n- Revert 'rds: Introduce rds_conn_to_path helper' (Gerd Rausch) [Orabug: 31476562] \n- Revert 'rds: Three cancel fixes' (Gerd Rausch) [Orabug: 31476551] \n- scsi: megaraid_sas: Update driver version to 07.714.04.00-rc1 (Chandrakanth Patil) [Orabug: 31481643] \n- scsi: megaraid_sas: TM command refire leads to controller firmware crash (Sumit Saxena) [Orabug: 31481643] \n- scsi: megaraid_sas: Replace undefined MFI_BIG_ENDIAN macro with __BIG_ENDIAN_BITFIELD macro (Shivasharan S) [Orabug: 31481643] \n- scsi: megaraid_sas: Remove IO buffer hole detection logic (Sumit Saxena) [Orabug: 31481643] \n- scsi: megaraid_sas: Limit device queue depth to controller queue depth (Kashyap Desai) [Orabug: 31481643] \n- scsi: megaraid: make two symbols static in megaraid_sas_base.c (Jason Yan) [Orabug: 31481643] \n- scsi: megaraid: make some symbols static in megaraid_sas_fusion.c (Jason Yan) [Orabug: 31481643] \n- scsi: megaraid_sas: Use scnprintf() for avoiding potential buffer overflow (Takashi Iwai) [Orabug: 31481643] \n- scsi: megaraid_sas: silence a warning (Tomas Henzl) [Orabug: 31481643] \n- scsi: megaraid_sas: fix indentation issue (Colin Ian King) [Orabug: 31481643] \n- scsi: megaraid_sas: fixup MSIx interrupt setup during resume (Hannes Reinecke) [Orabug: 31481643] \n- scsi: megaraid_sas: Update driver version to 07.713.01.00-rc1 (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Limit the number of retries for the IOCTLs causing firmware fault (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Re-Define enum DCMD_RETURN_STATUS (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Do not set HBA Operational if FW is not in operational state (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Do not kill HBA if JBOD Seqence map or RAID map is disabled (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Do not kill host bus adapter, if adapter is already dead (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Update optimal queue depth for SAS and NVMe devices (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Set no_write_same only for Virtual Disk (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Reset adapter if FW is not in READY state after device resume (Anand Lodnoor) [Orabug: 31481643] \n- scsi: megaraid_sas: Make poll_aen_lock static (YueHaibing) [Orabug: 31481643] \n- scsi: megaraid_sas: remove unused variables 'debugBlk','fusion' (zhengbin) [Orabug: 31481643] \n- scsi: megaraid_sas: Unique names for MSI-X vectors (Chandrakanth Patil) [Orabug: 31481643] \n- scsi: megaraid_sas: Make some functions static (YueHaibing) [Orabug: 31481643] \n- scsi: megaraid_sas: fix spelling mistake 'megarid_sas' -> 'megaraid_sas' (Colin Ian King) [Orabug: 31481643] \n- media: ttusb-dec: Fix info-leak in ttusb_dec_send_command() (Tomas Bortoli) [Orabug: 31351117] {CVE-2019-19533}\n- ALSA: core: Fix card races between register and disconnect (Takashi Iwai) [Orabug: 31351890] {CVE-2019-15214}\n- ALSA: info: Fix racy addition/deletion of nodes (Takashi Iwai) [Orabug: 31351890] {CVE-2019-15214}\n- rds: Deregister all FRWR mr with free_mr (Hans Westgaard Ry) [Orabug: 31441472] \n- uek-rpm: disable CONFIG_IP_PNP (Anjali Kulkarni) [Orabug: 31454846] \n- x86/speculation: Add SRBDS vulnerability and mitigation documentation (Mark Gross) [Orabug: 31352781] {CVE-2020-0543}\n- x86/speculation: Add Special Register Buffer Data Sampling (SRBDS) mitigation (Mark Gross) [Orabug: 31352781] {CVE-2020-0543}\n- x86/cpu: Add 'table' argument to cpu_matches() (Mark Gross) [Orabug: 31352781] {CVE-2020-0543}\n- x86/cpu: Add a steppings field to struct x86_cpu_id (Mark Gross) [Orabug: 31352781] {CVE-2020-0543}\n- netdev, octeon3-ethernet: move timecounter init to network driver probe() (Dave Aldridge) [Orabug: 31439190] \n- rds: Three cancel fixes (Hakon Bugge) [Orabug: 31463014] \n- can: peak_usb: fix slab info leak (Johan Hovold) [Orabug: 31351139] {CVE-2019-19534}\n- uek-rpm: use expand macro with kernel_reqprovconf (Dave Kleikamp) [Orabug: 31454052] \n- can: peak_usb: pcan_usb_pro: Fix info-leaks to USB devices (Tomas Bortoli) [Orabug: 31351248] {CVE-2019-19536}\n- net/mlx5: Decrease default mr cache size (Artemy Kovalyov) [Orabug: 31410596] \n- xfs: fix freeze hung (Junxiao Bi) [Orabug: 31245660] \n- netlabel: cope with NULL catmap (Paolo Abeni) [Orabug: 31350492] {CVE-2020-10711}\n- mwifiex: Fix possible buffer overflows in mwifiex_ret_wmm_get_status() (Qing Xu) [Orabug: 31350516] {CVE-2020-12654}\n- scsi: sg: add sg_remove_request in sg_write (Wu Bo) [Orabug: 31350698] {CVE-2020-12770}\n- block, bfq: fix use-after-free in bfq_idle_slice_timer_body (Zhiqiang Liu) [Orabug: 31350912] {CVE-2020-12657}\n- mwifiex: Fix possible buffer overflows in mwifiex_cmd_append_vsie_tlv() (Qing Xu) [Orabug: 31350931] {CVE-2020-12653}\n- USB: core: Fix free-while-in-use bug in the USB S-Glibrary (Alan Stern) [Orabug: 31350965] {CVE-2020-12464}\n[4.14.35-1902.304.1]\n- xfs: add agf freeblocks verify in xfs_agf_verify (Zheng Bin) [Orabug: 31350922] {CVE-2020-12655}\n- rds: Do not cancel RDMAs that have been posted to the HCA (Hakon Bugge) [Orabug: 31396425] \n- rds: Introduce rds_conn_to_path helper (Hakon Bugge) [Orabug: 31396425] \n- mwifiex: Abort at too short BSS descriptor element (Takashi Iwai) [Orabug: 31351915] {CVE-2019-3846}\n- mwifiex: Fix possible buffer overflows at parsing bss descriptor (Takashi Iwai) [Orabug: 31351915] {CVE-2019-3846} {CVE-2019-3846}\n- bnxt_en: Fix accumulation of bp->net_stats_prev. (Vijayendra Suman) [Orabug: 31390689] \n- nfs: initiate returning delegation when reclaiming one that's been recalled (Jeff Layton) [Orabug: 31378792] \n- NFS: More excessive attribute revalidation in nfs_execute_ok() (Trond Myklebust) [Orabug: 31378792] \n- uek-rpm: Add support for building a kdump kernel on MIPS64 (Dave Kleikamp) [Orabug: 31373682] \n- uek-rpm: Add config-mips64-embedded-kdump (Henry Willard) [Orabug: 31373682] \n- uek-rpm: Don't build kernel-uek-tools or perf packages for mips64 (Dave Kleikamp) [Orabug: 31373682] \n- scsi: mptfusion: Fix double fetch bug in ioctl (Dan Carpenter) [Orabug: 31350940] {CVE-2020-12652}\n- ptp: fix the race between the release of ptp_clock and cdev (Vladis Dronov) [Orabug: 31350706] {CVE-2020-10690}\n- net/rds: suppress memory allocation failure reports (Manjunath Patil) [Orabug: 31359419]\n[4.14.35-1902.304.0]\n- mips64/octeon: Initialize netdevice in octeon_pow struct (Vijay Kumar) [Orabug: 31388199] \n- uek-rpm/ol7/config-mips64: Disable IRQSOFF_TRACER (Henry Willard) [Orabug: 31386710] \n- xen/manage: enable C_A_D to force reboot (Dongli Zhang) [Orabug: 31249146]", "edition": 1, "modified": "2020-07-10T00:00:00", "published": "2020-07-10T00:00:00", "id": "ELSA-2020-5755", "href": "http://linux.oracle.com/errata/ELSA-2020-5755.html", "title": "Unbreakable Enterprise kernel security update", "type": "oraclelinux", "cvss": {"score": 8.3, "vector": "AV:A/AC:L/Au:N/C:C/I:C/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:56", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10757"], "description": "The kernel meta package ", "modified": "2020-06-07T19:51:16", "published": "2020-06-07T19:51:16", "id": "FEDORA:2A755608EC25", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 32 Update: kernel-5.6.16-300.fc32", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:56", "bulletinFamily": "unix", "cvelist": ["CVE-2020-0543", "CVE-2020-10711", "CVE-2020-10757", "CVE-2020-11884", "CVE-2020-12655", "CVE-2020-12888"], "description": "The kernel meta package ", "modified": "2020-06-15T01:58:35", "published": "2020-06-15T01:58:35", "id": "FEDORA:055473124314", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 32 Update: kernel-5.6.18-300.fc32", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}], "openvas": [{"lastseen": "2020-06-23T17:40:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-10757"], "description": "The remote host is missing an update for the ", "modified": "2020-06-22T00:00:00", "published": "2020-06-08T00:00:00", "id": "OPENVAS:1361412562310877951", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877951", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-07f0be216f)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877951\");\n script_version(\"2020-06-22T07:29:24+0000\");\n script_cve_id(\"CVE-2020-10757\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-22 07:29:24 +0000 (Mon, 22 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-08 03:33:44 +0000 (Mon, 08 Jun 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-07f0be216f)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC32\");\n\n script_xref(name:\"FEDORA\", value:\"2020-07f0be216f\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DWF7KY5NW2MUDU7FCVYOPKGPX6XAIQ35\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-07f0be216f advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 32.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC32\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.16~300.fc32\", rls:\"FC32\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-25T13:47:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-10711", "CVE-2020-12888", "CVE-2020-11884", "CVE-2020-0543", "CVE-2020-10757", "CVE-2020-12655"], "description": "The remote host is missing an update for the ", "modified": "2020-06-24T00:00:00", "published": "2020-06-23T00:00:00", "id": "OPENVAS:1361412562310877977", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310877977", "type": "openvas", "title": "Fedora: Security Advisory for kernel (FEDORA-2020-e47d28bc2b)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.877977\");\n script_version(\"2020-06-24T03:42:18+0000\");\n script_cve_id(\"CVE-2020-10757\", \"CVE-2020-12888\", \"CVE-2020-12655\", \"CVE-2020-10711\", \"CVE-2020-11884\", \"CVE-2020-0543\");\n script_tag(name:\"cvss_base\", value:\"6.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-24 03:42:18 +0000 (Wed, 24 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-23 03:19:45 +0000 (Tue, 23 Jun 2020)\");\n script_name(\"Fedora: Security Advisory for kernel (FEDORA-2020-e47d28bc2b)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC32\");\n\n script_xref(name:\"FEDORA\", value:\"2020-e47d28bc2b\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDZRGYFUVQ7QOIFXQU4UWW626LIOFJOA\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'kernel'\n package(s) announced via the FEDORA-2020-e47d28bc2b advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The kernel meta package\");\n\n script_tag(name:\"affected\", value:\"'kernel' package(s) on Fedora 32.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC32\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~5.6.18~300.fc32\", rls:\"FC32\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:57:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2019-19462", "CVE-2020-12114", "CVE-2019-3016", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-10757"], "description": "The remote host is missing an update for the ", "modified": "2020-06-11T00:00:00", "published": "2020-06-11T00:00:00", "id": "OPENVAS:1361412562310704699", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704699", "type": "openvas", "title": "Debian: Security Advisory for linux (DSA-4699-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704699\");\n script_version(\"2020-06-11T03:00:17+0000\");\n script_cve_id(\"CVE-2019-19462\", \"CVE-2019-3016\", \"CVE-2020-0543\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12768\", \"CVE-2020-12770\", \"CVE-2020-13143\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-11 03:00:17 +0000 (Thu, 11 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-11 03:00:17 +0000 (Thu, 11 Jun 2020)\");\n script_name(\"Debian: Security Advisory for linux (DSA-4699-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB10\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2020/dsa-4699.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4699-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the DSA-4699-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2019-3016\nIt was discovered that the KVM implementation for x86 did not\nalways perform TLB flushes when needed, if the paravirtualised\nTLB flush feature was enabled. This could lead to disclosure of\nsensitive information within a guest VM.\n\nCVE-2019-19462The syzkaller tool found a missing error check in the relay\n\nlibrary used to implement various files under debugfs. A local\nuser permitted to access debugfs could use this to cause a denial\nof service (crash) or possibly for privilege escalation.\n\nCVE-2020-0543\nResearchers at VU Amsterdam discovered that on some Intel CPUs\nsupporting the RDRAND and RDSEED instructions, part of a random\nvalue generated by these instructions may be used in a later\nspeculative execution on any core of the same physical CPU.\nDepending on how these instructions are used by applications, a\nlocal user or VM guest could use this to obtain sensitive\ninformation such as cryptographic keys from other users or VMs.\n\nThis vulnerability can be mitigated by a microcode update, either\nas part of system firmware (BIOS) or through the intel-microcode\npackage in Debian's non-free archive section. This kernel update\nonly provides reporting of the vulnerability and the option to\ndisable the mitigation if it is not needed.\n\nCVE-2020-10711\nMatthew Sheets reported NULL pointer dereference issues in the\nSELinux subsystem while receiving CIPSO packet with null category. A\nremote attacker can take advantage of this flaw to cause a denial of\nservice (crash). Note that this issue does not affect the binary\npackages distributed in Debian as CONFIG_NETLABEL is not enabled.\n\nCVE-2020-10732\nAn information leak of kernel private memory to userspace was found\nin the kernel's implementation of core dumping userspace processes.\n\nCVE-2020-10751\nDmitry Vyukov reported that the SELinux subsystem did not properly\nhandle validating multiple messages, which could allow a privileged\nattacker to bypass SELinux netlink restrictions.\n\nCVE-2020-10757\nFan Yang reported a flaw in the way mremap handled DAX hugepages,\nallowing a local user to escalate their privileges.\n\nCVE-2020-12114\nPiotr Krysiuk discovered a race condition between the umount and\npivot_root operations in the filesystem core (vfs). A local user\nwith the CAP_SYS_ADMIN capability in any user namespace could use\nthis to cause a denial of service (crash).\n\nCVE-2020-12464\nKyungtae Kim reported a race condition in the USB core that can\nresult in a use-after-free. It is not clear how this can be\nexploited, but i ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the stable distribution (buster), these problems have been fixed\nin version 4.19.118-2+deb10u1. This version also fixes some related\nbugs that do not have their own CVE IDs, and a regression in the\nUAPI header introduced in the previous point release\n(bug #960271).\n\nWe recommend that you upgrade your linux packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"hyperv-daemons\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libbpf-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libbpf4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower1\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"liblockdep-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"liblockdep4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-8-arm\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-8-s390\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-8-x86\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-config-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-cpupower\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-686\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-armel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-armhf\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-i386\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-mips\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-mips64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-mipsel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-ppc64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-all-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-cloud-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-common\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-common-rt\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-6-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-686\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-armel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-armhf\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-i386\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-mips\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-mips64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-mipsel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-ppc64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-all-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-cloud-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-common\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-common-rt\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-8-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-686\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-armel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-armhf\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-i386\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-mips\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-mips64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-mipsel\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-ppc64el\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-all-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-cloud-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-common\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-common-rt\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-686-pae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-amd64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-arm64\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.19.0-9-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-4kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-5kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-686-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-armmp-lpae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-cloud-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-cloud-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-loongson-3-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-marvell-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-octeon-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-powerpc64le-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rpi-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-rt-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-6-s390x-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-4kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-5kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-686-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-armmp-lpae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-cloud-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-cloud-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-loongson-3-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-marvell-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-octeon-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-powerpc64le-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rpi-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-rt-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-8-s390x-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-4kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-4kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-5kc-malta\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-5kc-malta-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-686-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp-lpae\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-armmp-lpae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-cloud-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-cloud-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-loongson-3\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-loongson-3-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-marvell\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-marvell-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-octeon\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-octeon-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-powerpc64le\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-powerpc64le-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rpi\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rpi-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-686-pae-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-686-pae-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-amd64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-amd64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-arm64-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-arm64-unsigned\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-armmp\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-rt-armmp-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-s390x\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.19.0-9-s390x-dbg\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-amd64-signed-template\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-arm64-signed-template\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-i386-signed-template\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-kbuild-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-perf-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-4.19\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.19.0-6\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.19.0-8\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.19.0-9\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"lockdep\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"usbip\", ver:\"4.19.118-2+deb10u1\", rls:\"DEB10\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-25T13:28:00", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-10711", "CVE-2020-12659", "CVE-2019-19462", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12656", "CVE-2018-1000199", "CVE-2020-11609", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-12653", "CVE-2020-11608", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-12652", "CVE-2020-10757", "CVE-2020-12655", "CVE-2020-12657"], "description": "The remote host is missing an update for the ", "modified": "2020-06-24T00:00:00", "published": "2020-06-14T00:00:00", "id": "OPENVAS:1361412562310853206", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310853206", "type": "openvas", "title": "openSUSE: Security Advisory for the (openSUSE-SU-2020:0801-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.853206\");\n script_version(\"2020-06-24T03:42:18+0000\");\n script_cve_id(\"CVE-2018-1000199\", \"CVE-2019-19462\", \"CVE-2019-20806\", \"CVE-2019-20812\", \"CVE-2019-9455\", \"CVE-2020-0543\", \"CVE-2020-10690\", \"CVE-2020-10711\", \"CVE-2020-10720\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12655\", \"CVE-2020-12656\", \"CVE-2020-12657\", \"CVE-2020-12659\", \"CVE-2020-12769\", \"CVE-2020-13143\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-24 03:42:18 +0000 (Wed, 24 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-14 03:00:56 +0000 (Sun, 14 Jun 2020)\");\n script_name(\"openSUSE: Security Advisory for the (openSUSE-SU-2020:0801-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.1\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2020:0801-1\");\n script_xref(name:\"URL\", value:\"http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'the'\n package(s) announced via the openSUSE-SU-2020:0801-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other than\n the one which called it. This attack is known as Special Register Buffer\n Data Sampling (SRBDS) or 'CrossTalk' (bsc#1154824).\n\n - CVE-2018-1000199: Fixed a potential local code execution via ptrace\n (bsc#1089895).\n\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n\n - CVE-2019-20806: Fixed a null pointer dereference in\n tw5864_handle_frame() which may had lead to denial of service\n (bsc#1172199).\n\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\n video driver. This could lead to local information disclosure with\n System execution privileges needed (bsc#1170345).\n\n - CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev\n (bsc#1170056).\n\n - CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem\n which could have allowed a remote network user to crash the kernel\n resulting in a denial of service (bsc#1171191).\n\n - CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n (bsc#1170778).\n\n - CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\n uninitialized data (bsc#1171220).\n\n - CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\n where it was assumed that an skb would only contain a single netlink\n message (bsc#1171189).\n\n - CVE-2020-10757: Fixed an issue where remapping hugepage DAX to anon mmap\n could have caused user PTE access (bsc#1172317).\n\n - CVE-2020-11608: An issue was discovered in\n drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences\n in ov511_mode_init_regs and ov518_mode_init_regs when there are zero\n endpoints, aka CID-998912346c0d (bnc#1168829).\n\n - CVE-2020-11609: An issue was discovered in the stv06xx subsystem in\n drivers/media/usb/gspca/stv06xx/stv06xx.c and\n drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid\n descriptors, as demonstrated by a NULL pointer dereference, aka\n CID-485b06aadb93 (bnc#1168854).\n\n - CVE-2020-12114: Fixed a pivot_root race condition which could have\n allowed ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'the' package(s) on openSUSE Leap 15.1.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.1\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs\", rpm:\"kernel-docs~4.12.14~lp151.28.52.2\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-docs-html\", rpm:\"kernel-docs-html~4.12.14~lp151.28.52.2\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-macros\", rpm:\"kernel-macros~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source\", rpm:\"kernel-source~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-source-vanilla\", rpm:\"kernel-source-vanilla~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base\", rpm:\"kernel-debug-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-base-debuginfo\", rpm:\"kernel-debug-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debuginfo\", rpm:\"kernel-debug-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-debugsource\", rpm:\"kernel-debug-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-debug-devel-debuginfo\", rpm:\"kernel-debug-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default\", rpm:\"kernel-default~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base\", rpm:\"kernel-default-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-base-debuginfo\", rpm:\"kernel-default-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debuginfo\", rpm:\"kernel-default-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-debugsource\", rpm:\"kernel-default-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel\", rpm:\"kernel-default-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-default-devel-debuginfo\", rpm:\"kernel-default-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall\", rpm:\"kernel-kvmsmall~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base\", rpm:\"kernel-kvmsmall-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-base-debuginfo\", rpm:\"kernel-kvmsmall-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debuginfo\", rpm:\"kernel-kvmsmall-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-debugsource\", rpm:\"kernel-kvmsmall-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel\", rpm:\"kernel-kvmsmall-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-kvmsmall-devel-debuginfo\", rpm:\"kernel-kvmsmall-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build\", rpm:\"kernel-obs-build~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-build-debugsource\", rpm:\"kernel-obs-build-debugsource~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-obs-qa\", rpm:\"kernel-obs-qa~4.12.14~lp151.28.52.3\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-syms\", rpm:\"kernel-syms~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla\", rpm:\"kernel-vanilla~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base\", rpm:\"kernel-vanilla-base~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-base-debuginfo\", rpm:\"kernel-vanilla-base-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debuginfo\", rpm:\"kernel-vanilla-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-debugsource\", rpm:\"kernel-vanilla-debugsource~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel\", rpm:\"kernel-vanilla-devel~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"kernel-vanilla-devel-debuginfo\", rpm:\"kernel-vanilla-devel-debuginfo~4.12.14~lp151.28.52.1\", rls:\"openSUSELeap15.1\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-06-15T15:57:31", "bulletinFamily": "scanner", "cvelist": ["CVE-2020-11494", "CVE-2019-5108", "CVE-2020-10711", "CVE-2020-8648", "CVE-2020-12770", "CVE-2020-9383", "CVE-2019-19462", "CVE-2019-2182", "CVE-2020-12114", "CVE-2020-10942", "CVE-2020-11609", "CVE-2020-10732", "CVE-2019-19768", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-19319", "CVE-2020-12653", "CVE-2020-8428", "CVE-2020-11608", "CVE-2020-11668", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-11565", "CVE-2020-8649", "CVE-2020-12652", "CVE-2020-10757", "CVE-2020-8647", "CVE-2019-20811", "CVE-2020-2732"], "description": "The remote host is missing an update for the ", "modified": "2020-06-11T00:00:00", "published": "2020-06-11T00:00:00", "id": "OPENVAS:1361412562310704698", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704698", "type": "openvas", "title": "Debian: Security Advisory for linux (DSA-4698-1)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Some text descriptions might be excerpted from (a) referenced\n# source(s), and are Copyright (C) by the respective right holder(s).\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704698\");\n script_version(\"2020-06-11T03:00:22+0000\");\n script_cve_id(\"CVE-2019-19319\", \"CVE-2019-19462\", \"CVE-2019-19768\", \"CVE-2019-20806\", \"CVE-2019-20811\", \"CVE-2019-2182\", \"CVE-2019-5108\", \"CVE-2020-0543\", \"CVE-2020-10711\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10757\", \"CVE-2020-10942\", \"CVE-2020-11494\", \"CVE-2020-11565\", \"CVE-2020-11608\", \"CVE-2020-11609\", \"CVE-2020-11668\", \"CVE-2020-12114\", \"CVE-2020-12464\", \"CVE-2020-12652\", \"CVE-2020-12653\", \"CVE-2020-12654\", \"CVE-2020-12770\", \"CVE-2020-13143\", \"CVE-2020-2732\", \"CVE-2020-8428\", \"CVE-2020-8647\", \"CVE-2020-8648\", \"CVE-2020-8649\", \"CVE-2020-9383\");\n script_tag(name:\"cvss_base\", value:\"7.2\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-06-11 03:00:22 +0000 (Thu, 11 Jun 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-06-11 03:00:22 +0000 (Thu, 11 Jun 2020)\");\n script_name(\"Debian: Security Advisory for linux (DSA-4698-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2020/dsa-4698.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4698-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'linux'\n package(s) announced via the DSA-4698-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2019-2182\nHanjun Guo and Lei Li reported a race condition in the arm64\nvirtual memory management code, which could lead to an information\ndisclosure, denial of service (crash), or possibly privilege\nescalation.\n\nCVE-2019-5108\nMitchell Frank of Cisco discovered that when the IEEE 802.11\n(WiFi) stack was used in AP mode with roaming, it would trigger\nroaming for a newly associated station before the station was\nauthenticated. An attacker within range of the AP could use this\nto cause a denial of service, either by filling up a switching\ntable or by redirecting traffic away from other stations.\n\nCVE-2019-19319\nJungyeon discovered that a crafted filesystem can cause the ext4\nimplementation to deallocate or reallocate journal blocks. A user\npermitted to mount filesystems could use this to cause a denial of\nservice (crash), or possibly for privilege escalation.\n\nCVE-2019-19462The syzbot tool found a missing error check in the relay\n\nlibrary used to implement various files under debugfs. A local\nuser permitted to access debugfs could use this to cause a denial\nof service (crash) or possibly for privilege escalation.\n\nCVE-2019-19768\nTristan Madani reported a race condition in the blktrace debug\nfacility that could result in a use-after-free. A local user able\nto trigger removal of block devices could possibly use this to\ncause a denial of service (crash) or for privilege escalation.\n\nCVE-2019-20806\nA potential null pointer dereference was discovered in the tw5864\nmedia driver. The security impact of this is unclear.\n\nCVE-2019-20811\nThe Hulk Robot tool found a reference-counting bug in an error\npath in the network subsystem. The security impact of this is\nunclear.\n\nCVE-2020-0543\nResearchers at VU Amsterdam discovered that on some Intel CPUs\nsupporting the RDRAND and RDSEED instructions, part of a random\nvalue generated by these instructions may be used in a later\nspeculative execution on any core of the same physical CPU.\nDepending on how these instructions are used by applications, a\nlocal user or VM guest could use this to obtain sensitive\ninformation such as cryptographic keys from other users or VMs.\n\nThis vulnerability can be mitigated by a microcode update, either\nas part of system firmware (BIOS) or through the intel-microcode\npackage in Debian's non-free archive section. This kernel update\nonly provides reporting of the vulnerability and the option to\ndisable the mitigation if it is not needed.\n\nCVE-2020-2732\nPaulo Bonzini discovered that the KVM implementa ...\n\n Description truncated. Please see the references for more information.\");\n\n script_tag(name:\"affected\", value:\"'linux' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the oldstable distribution (stretch), these problems have been\nfixed in version 4.9.210-1+deb9u1. This version also fixes some\nrelated bugs that do not have their own CVE IDs, and a regression in\nthe macvlan driver introduced in the previous point release (bug\n\nWe recommend that you upgrade your linux packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"hyperv-daemons\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower-dev\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libcpupower1\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"libusbip-dev\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-6-arm\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-6-s390\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-compiler-gcc-6-x86\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-cpupower\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-doc-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-4kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-5kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-686\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-armel\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-armhf\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-i386\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-mips\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-mips64el\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-mipsel\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-ppc64el\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-all-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-armmp\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-armmp-lpae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-common\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-common-rt\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-loongson-3\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-marvell\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-octeon\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-powerpc64le\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-rt-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-rt-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-11-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-4kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-5kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-686\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-armel\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-armhf\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-i386\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-mips\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-mips64el\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-mipsel\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-ppc64el\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-all-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-armmp\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-armmp-lpae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-common\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-common-rt\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-loongson-3\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-marvell\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-octeon\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-powerpc64le\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-rt-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-rt-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-headers-4.9.0-12-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-4kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-4kc-malta-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-5kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-5kc-malta-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-686\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-686-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-686-pae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-amd64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-arm64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-armmp\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-armmp-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-armmp-lpae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-armmp-lpae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-loongson-3\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-loongson-3-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-marvell\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-marvell-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-octeon\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-octeon-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-powerpc64le\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-powerpc64le-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-rt-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-rt-686-pae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-rt-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-rt-amd64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-11-s390x-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-4kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-4kc-malta-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-5kc-malta\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-5kc-malta-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-686\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-686-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-686-pae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-amd64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-arm64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-arm64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-armmp\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-armmp-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-armmp-lpae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-armmp-lpae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-loongson-3\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-loongson-3-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-marvell\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-marvell-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-octeon\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-octeon-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-powerpc64le\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-powerpc64le-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-rt-686-pae\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-rt-686-pae-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-rt-amd64\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-rt-amd64-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-s390x\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-image-4.9.0-12-s390x-dbg\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-kbuild-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-libc-dev\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-manual-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-perf-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-source-4.9\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-11\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"linux-support-4.9.0-12\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"usbip\", ver:\"4.9.210-1+deb9u1\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "centos": [{"lastseen": "2020-07-30T03:34:26", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19527", "CVE-2020-10713", "CVE-2020-12654", "CVE-2020-12653", "CVE-2020-10757"], "description": "**CentOS Errata and Security Advisory** CESA-2020:3220\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757)\n\n* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653)\n\n* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654)\n\n* kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* RHEL7.7 - scsi: ibmvfc: Avoid loss of all paths during SVC node reboot (BZ#1830889)\n\n* [DELL EMC 7.8 BUG bnxt_en] Error messages related to hwrm observed for BCM 57504 under dmesg in RHEL 7.8 (BZ#1834190)\n\n* kernel: provide infrastructure to support dual-signing of the kernel (foundation to help address CVE-2020-10713) (BZ#1837429)\n\n* RHEL7.7 - Request: retrofit kernel commit f82b4b6 to RHEL 7.7/7.8 3.10 kernels. (BZ#1838602)\n\n* kipmi thread high CPU consumption when performing BMC firmware upgrade (BZ#1841825)\n\n* RHEL7.7 - virtio-blk: fix hw_queue stopped on arbitrary error (kvm) (BZ#1842994)\n\n* rhel 7 infinite blocked waiting on inode_dio_wait in nfs (BZ#1845520)\n\n* http request is taking more time for endpoint running on different host via nodeport service (BZ#1847333)\n\n* ext4: change LRU to round-robin in extent status tree shrinker (BZ#1847343)\n\n* libaio is returning duplicate events (BZ#1850055)\n\n* After upgrade to 3.9.89 pod containers with CPU limits fail to start due to cgroup error (BZ#1850500)\n\n* Fix dpdk regression introduced by bz1837297 (BZ#1852245)\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2020-July/035780.html\n\n**Affected packages:**\nbpftool\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-headers\nkernel-tools\nkernel-tools-libs\nkernel-tools-libs-devel\nperf\npython-perf\n\n**Upstream details at:**\n", "edition": 1, "modified": "2020-07-30T00:08:16", "published": "2020-07-30T00:08:16", "id": "CESA-2020:3220", "href": "http://lists.centos.org/pipermail/centos-announce/2020-July/035780.html", "title": "bpftool, kernel, perf, python security update", "type": "centos", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "suse": [{"lastseen": "2020-08-21T07:35:58", "bulletinFamily": "unix", "cvelist": ["CVE-2020-16166", "CVE-2020-10135", "CVE-2020-14331", "CVE-2020-0305", "CVE-2020-14356", "CVE-2020-15780", "CVE-2020-10781"], "description": "The openSUSE Leap 15.2 kernel was updated to receive various security and\n bugfixes.\n\n This update is signed with the new UEFI signing key for openSUSE. It\n contains rebuilds of all available KMP packages also rebuilt with the new\n UEFi signing key. (boo#1174543)\n\n The following security bugs were fixed:\n\n - CVE-2020-14356: A use after free vulnerability in cgroup BPF component\n was fixed (bsc#1175213).\n - CVE-2020-14331: A buffer over write in vgacon_scroll was fixed\n (bnc#1174205).\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make\n observations that help to obtain sensitive information about the\n internal state of the network RNG, aka CID-f227e3ec3b5c. This is related\n to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n - CVE-2020-10135: Legacy pairing and secure-connections pairing\n authentication in Bluetooth\u00c2\u00ae BR/EDR Core Specification v5.2 and earlier\n may have allowed an unauthenticated user to complete authentication\n without pairing credentials via adjacent access. An unauthenticated,\n adjacent attacker could impersonate a Bluetooth BR/EDR master or slave\n to pair with a previously paired remote device to successfully complete\n the authentication procedure without knowing the link key (bnc#1171988).\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible\n use-after-free due to a race condition. This could lead to local\n escalation of privilege with System execution privileges needed. User\n interaction is not needed for exploitation (bnc#1174462).\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c\n in the Linux kernel Injection of malicious ACPI tables via configfs\n could be used by attackers to bypass lockdown and secure boot\n restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n - CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\n The following non-security bugs were fixed:\n\n - 9p/trans_fd: Fix concurrency del of req_list in\n p9_fd_cancelled/p9_read_work (git-fixes).\n - ACPICA: Dispatcher: add status checks (git-fixes).\n - ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).\n - ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).\n - af_key: pfkey_dump needs parameter validation (git-fixes).\n - agp/intel: Fix a memory leak on module initialisation failure\n (git-fixes).\n - ALSA: asihpi: delete duplicated word (git-fixes).\n - ALSA: atmel: Remove invalid "fall through" comments (git-fixes).\n - ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n - ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).\n - ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).\n - ALSA: echoaudio: Prevent races in calls to set_audio_format()\n (git-fixes).\n - ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).\n - ALSA: echoaudio: Race conditions around "opencount" (git-fixes).\n - ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).\n - ALSA: echoaudio: Remove redundant check (git-fixes).\n - ALSA: firewire: fix kernel-doc (git-fixes).\n - ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).\n - ALSA: hda: Enable sync-write operation as default for all controllers\n (git-fixes).\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).\n - ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO\n (git-fixes).\n - ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).\n - ALSA: hda/hdmi: Fix keep_power assignment for non-component devices\n (git-fixes).\n - ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop\n (git-fixes).\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL\n (jsc#SLE-13261).\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL\n (jsc#SLE-13261).\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops\n (git-fixes).\n - ALSA: hda/realtek - change to suitable link model for ASUS platform\n (git-fixes).\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with\n ALC256 (git-fixes).\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401)\n series with ALC289 (git-fixes).\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502)\n series with ALC289 (git-fixes).\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).\n - ALSA: hda/realtek: Fix add a "ultra_low_power" function for intel\n reference board (alc256) (git-fixes).\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung\n Notebook Pen S (git-fixes).\n - ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).\n - ALSA: hda/realtek - Fix unused variable warning (git-fixes).\n - ALSA: hda/realtek - fixup for yet another Intel reference board\n (git-fixes).\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus\n G14(GA401) series with ALC289 (git-fixes).\n - ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).\n - ALSA: hda/tegra: Disable sync-write operation (git-fixes).\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms\n (git-fixes).\n - ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n - ALSA: isa: delete repeated words in comments (git-fixes).\n - ALSA: isa/gus: remove 'set but not used' warning (git-fixes).\n - ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).\n - ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).\n - ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n - ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).\n - ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).\n - ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n - ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).\n - ALSA: pci/au88x0: remove "defined but not used" warnings (git-fixes).\n - ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n - ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n - ALSA: pci: delete repeated words in comments (git-fixes).\n - ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).\n - ALSA: pci/fm801: fix kernel-doc (git-fixes).\n - ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).\n - ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).\n - ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).\n - ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).\n - ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n - ALSA: seq: oss: Serialize ioctls (git-fixes).\n - ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).\n - ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight\n S (git-fixes).\n - ALSA: usb-audio: add startech usb audio dock name (git-fixes).\n - ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support\n (git-fixes).\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control\n (git-fixes).\n - ALSA: usb-audio: endpoint : remove needless check before\n usb_free_coherent() (git-fixes).\n - ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109\n (bsc#1174625).\n - ALSA: usb-audio: Fix race against the error recovery URB submission\n (git-fixes).\n - ALSA: usb-audio: Fix some typos (git-fixes).\n - ALSA: usb-audio: fix spelling mistake "buss" -> "bus" (git-fixes).\n - ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109\n (git-fixes).\n - ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).\n - ALSA: vx_core: remove warning for empty loop body (git-fixes).\n - ALSA: xen: remove 'set but not used' warning (git-fixes).\n - ALSA: xen: Remove superfluous fall through comments (git-fixes).\n - apparmor: ensure that dfa state tables have entries (git-fixes).\n - apparmor: fix introspection of of task mode for unconfined tasks\n (git-fixes).\n - apparmor: Fix memory leak of profile proxy (git-fixes).\n - apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).\n - apparmor: remove useless aafs_create_symlink (git-fixes).\n - appletalk: Fix atalk_proc_init() return path (git-fixes).\n - arm64: armv8_deprecated: Fix undef_hook mask for thumb setend\n (bsc#1175180).\n - arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).\n - arm64: csum: Fix handling of bad packets (bsc#1175192).\n - arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none\n bsc#1175016).\n - arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay\n (bsc#1175347).\n - arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).\n - arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none\n bsc#1175019).\n - arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).\n - arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).\n - arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE\n (none bsc#1175012).\n - arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id\n (bsc#1174398).\n - arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode\n (bsc#1174398).\n - arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator\n (git-fixes).\n - arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).\n - arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none\n bsc#1175020).\n - arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc\n happy (none bsc#1175015).\n - arm64: dts: rockchip: Replace RK805 PMIC node name with "pmic" on rk3328\n boards (none bsc#1175014).\n - arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n - arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel\n (none bsc#1175011).\n - arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n - arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n - arm64: fix the flush_icache_range arguments in machine_kexec\n (bsc#1175184).\n - arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).\n - arm64: hw_breakpoint: Do not invoke overflow handler on uaccess\n watchpoints (bsc#1175189).\n - arm64: insn: Fix two bugs in encoding 32-bit logical immediates\n (bsc#1175186).\n - arm64: kexec_file: print appropriate variable (bsc#1175187).\n - arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197\n jsc#SLE-13593).\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197\n jsc#SLE-13593).\n - arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).\n - arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).\n - arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none\n bsc#1175018).\n - arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).\n - arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).\n - arm64: vdso: do not free unallocated pages (bsc#1175181).\n - arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).\n - arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).\n - arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).\n - ARM: percpu.h: fix build error (git-fixes).\n - arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n - ASoC: codecs: max98373: Removed superfluous volume control from chip\n default (git-fixes).\n - ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend\n (git-fixes).\n - ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).\n - ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).\n - ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).\n - ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).\n - ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n - ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).\n - ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback\n (git-fixes).\n - ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).\n - ASoC: rt286: fix unexpected interrupt happens (git-fixes).\n - ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the\n Lenovo Miix 2 10 (git-fixes).\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n - ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of\n 10 (git-fixes).\n - ASoC: rt5682: Report the button event in the headset type only\n (git-fixes).\n - ASoC: SOF: nocodec: add missing .owner field (git-fixes).\n - ASoC: topology: fix kernel oops on route addition error (git-fixes).\n - ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).\n - ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n - ASoC: wm8974: remove unsupported clock mode (git-fixes).\n - ath10k: Acquire tx_lock in tx error paths (git-fixes).\n - ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n - ath9k: Fix regression with Atheros 9271 (git-fixes).\n - atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).\n - AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n - AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n - b43: Remove uninitialized_var() usage (git-fixes).\n - blk-mq: consider non-idle request as "inflight" in blk_mq_rq_inflight()\n (bsc#1165933).\n - Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).\n - Bluetooth: btusb: fix up firmware download sequence (git-fixes).\n - Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).\n - Bluetooth: Fix slab-out-of-bounds read in\n hci_extended_inquiry_result_evt() (git-fixes).\n - Bluetooth: Fix update of connection state in `hci_encrypt_cfm`\n (git-fixes).\n - Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags\n (git-fixes).\n - Bluetooth: hci_serdev: Only unregister device if it was registered\n (git-fixes).\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt()\n (git-fixes).\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_with_rssi_evt() (git-fixes).\n - bnxt_en: Init ethtool link settings after reading updated PHY\n configuration (jsc#SLE-8371 bsc#1153274).\n - bnxt_en: Init ethtool link settings after reading updated PHY\n configuration (jsc#SLE-8371 bsc#1153274).\n - bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).\n - bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n - bpfilter: fix up a sparse annotation (bsc#1155518).\n - bpfilter: Initialize pos variable (bsc#1155518).\n - bpfilter: reject kernel addresses (bsc#1155518).\n - bpfilter: switch to kernel_write (bsc#1155518).\n - bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone\n (bsc#1155518).\n - bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).\n - brcmfmac: Set timeout value when configuring power save (bsc#1173468).\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n - bridge: Avoid infinite loop when suppressing NS messages with invalid\n options (networking-stable-20_06_10).\n - bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).\n - btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).\n - btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers\n (bsc#1174438).\n - btrfs: avoid unnecessary splits when setting bits on an extent io tree\n (bsc#1175377).\n - btrfs: change timing for qgroup reserved space for ordered extents to\n fix reserved space leak (bsc#1172247).\n - btrfs: delete the ordered isize update code (bsc#1175377).\n - btrfs: do not set path->leave_spinning for truncate (bsc#1175377).\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n - btrfs: file: reserve qgroup space after the hole punch range is locked\n (bsc#1172247).\n - btrfs: fix a block group ref counter leak after failure to remove block\n group (bsc#1175149).\n - btrfs: fix block group leak when removing fails (bsc#1175149).\n - btrfs: fix bytes_may_use underflow when running balance and scrub in\n parallel (bsc#1175149).\n - btrfs: fix corrupt log due to concurrent fsync of inodes with shared\n extents (bsc#1175149).\n - btrfs: fix data block group relocation failure due to concurrent scrub\n (bsc#1175149).\n - btrfs: fix deadlock during fast fsync when logging prealloc extents\n beyond eof (bsc#1175377).\n - btrfs: fix double free on ulist after backref resolution failure\n (bsc#1175149).\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof\n (bsc#1174438).\n - btrfs: fix fatal extent_buffer readahead vs releasepage race\n (bsc#1175149).\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write\n (bsc#1174438).\n - btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).\n - btrfs: fix page leaks after failure to lock page for delalloc\n (bsc#1175149).\n - btrfs: fix race between block group removal and block group creation\n (bsc#1175149).\n - btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow\n (bsc#1174438).\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO\n (bsc#1174438).\n - btrfs: fix space_info bytes_may_use underflow after nocow buffered write\n (bsc#1175149).\n - btrfs: fix space_info bytes_may_use underflow during space cache\n writeout (bsc#1175149).\n - btrfs: fix wrong file range cleanup after an error filling dealloc range\n (bsc#1175149).\n - btrfs: inode: fix NULL pointer dereference if inode does not need\n compression (bsc#1174484).\n - btrfs: inode: move qgroup reserved space release to the callers of\n insert_reserved_file_extent() (bsc#1172247).\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent()\n (bsc#1172247).\n - btrfs: introduce per-inode file extent tree (bsc#1175377).\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n - btrfs: move extent_io_tree defs to their own header (bsc#1175377).\n - btrfs: Move free_pages_out label in inline extent handling branch in\n compress_file_range (bsc#1175263).\n - btrfs: qgroup: allow to unreserve range without releasing other ranges\n (bsc#1120163).\n - btrfs: qgroup: fix data leak caused by race between writeback and\n truncate (bsc#1172247).\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve\n retry-after-EDQUOT (bsc#1120163).\n - btrfs: qgroup: try to flush qgroup space when we get -EDQUOT\n (bsc#1120163).\n - btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc\n (bsc#1175149).\n - btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n - btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).\n - btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).\n - btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).\n - btrfs: separate out the extent io init function (bsc#1175377).\n - btrfs: separate out the extent leak code (bsc#1175377).\n - btrfs: trim: fix underflow in trim length to prevent access beyond\n device boundary (bsc#1175263).\n - btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update\n (bsc#1175377).\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n - btrfs: use the file extent tree infrastructure (bsc#1175377).\n - bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).\n - cfg80211: check vendor command doit pointer before use (git-fixes).\n - clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).\n - clk: at91: clk-generated: check best_rate against ranges (git-fixes).\n - clk: at91: clk-generated: continue if __clk_determine_rate() returns\n error (git-fixes).\n - clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).\n - clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).\n - clk: at91: sam9x60-pll: use logical or for range check (git-fixes).\n - clk: at91: sckc: register slow_rc with accuracy option (git-fixes).\n - clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).\n - clk: bcm63xx-gate: fix last clock availability (git-fixes).\n - clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).\n - clk: iproc: round clock rate to the closest (git-fixes).\n - clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).\n - clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).\n - clk: rockchip: Revert "fix wrong mmc sample phase shift for rk3328"\n (git-fixes).\n - clk: scmi: Fix min and max rate when registering clocks with discrete\n rates (git-fixes).\n - clk: spear: Remove uninitialized_var() usage (git-fixes).\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n - console: newport_con: fix an issue about leak related system resources\n (git-fixes).\n - crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).\n - crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).\n - crypto: ccp - Fix use of merged scatterlists (git-fixes).\n - crypto: ccree - fix resource leak on error path (git-fixes).\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified\n (git-fixes).\n - crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not\n specified (git-fixes).\n - crypto: qat - fix double free in qat_uclo_create_batch_init_list\n (git-fixes).\n - dccp: Fix possible memleak in dccp_init and dccp_fini\n (networking-stable-20_06_16).\n - Delete patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.patch\n (bsc#1174627)\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n - devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n - devres: keep both device name and resource name in pretty name\n (git-fixes).\n - dlm: remove BUG() before panic() (git-fixes).\n - dmaengine: dmatest: stop completed threads when running without set\n channel (git-fixes).\n - dmaengine: dw: Initialize channel before each transfer (git-fixes).\n - dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).\n - dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler\n (git-fixes).\n - dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu\n (git-fixes).\n - dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).\n - dmaengine: ioat setting ioat timeout as module parameter (git-fixes).\n - dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler\n (git-fixes).\n - dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).\n - dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).\n - dm: do not use waitqueue for request-based DM (bsc#1165933).\n - docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE\n documentation might refer to cgroup-v2.rst.)\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n - dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n - drbd: Remove uninitialized_var() usage (git-fixes).\n - driver core: Avoid binding drivers to dead devices (git-fixes).\n - drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups()\n (git-fixes).\n - drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).\n - drm/amd/display: Clear dm_state for fast updates (git-fixes).\n - drm/amd/display: Use kfree() to free rgb_user in\n calculate_user_regamma_ramp() (git-fixes).\n - drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).\n - drm/amdgpu/display: use blanked rather than plane state for sync\n (bsc#1152489) * refreshed for context changes * protect code \nwith\n CONFIG_DRM_AMD_DC_DCN2_0\n - drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).\n - drm/amdgpu: fix preemption unit test (git-fixes).\n - drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).\n - drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n - drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr() (git-fixes).\n - drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).\n - drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)\n - drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).\n - drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in\n (bsc#1152472) * refreshed for context changes\n - drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n - drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers\n (git-fixes).\n - drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array\n (git-fixes).\n - drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice\n (bsc#1152489) * refreshed for context changes\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) * move\n drm_mipi_dbi.c -> tinydrm/mipi-dbi.c\n - drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n - drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).\n - drm/exynos: Properly propagate return value in drm_iommu_attach_device()\n (git-fixes).\n - drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi\n (git-fixes).\n - drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).\n - drm: hold gem reference until object is no longer accessed (git-fixes).\n - drm/i915: Actually emit the await_start (bsc#1174737).\n - drm/i915: Copy across scheduler behaviour flags across submit fences\n (bsc#1174737).\n - drm/i915: Do not poison i915_request.link on removal (bsc#1174737).\n - drm/i915: Drop no-semaphore boosting (bsc#1174737).\n - drm/i915: Eliminate the trylock for awaiting an earlier request\n (bsc#1174737).\n - drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) * context\n changes\n - drm/i915: Flush execution tasklets before checking request status\n (bsc#1174737).\n - drm/i915: Flush tasklet submission before sleeping on i915_request_wait\n (bsc#1174737).\n - drm/i915/gt: Close race between engine_park and intel_gt_retire_requests\n (git-fixes).\n - drm/i915/gt: Flush submission tasklet before waiting/retiring\n (bsc#1174737).\n - drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).\n - drm/i915/gt: Move new timelines to the end of active_list (git-fixes).\n - drm/i915/gt: Only swap to a random sibling once upon creation\n (bsc#1152489) * context changes\n - drm/i915/gt: Unlock engine-pm after queuing the kernel context switch\n (git-fixes).\n - drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).\n - drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).\n - drm/i915: Keep track of request among the scheduling lists (bsc#1174737).\n - drm/i915: Lock signaler timeline while navigating (bsc#1174737).\n - drm/i915: Mark i915_request.timeline as a volatile, rcu pointer\n (bsc#1174737).\n - drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).\n - drm/i915: Mark up unlocked update of i915_request.hwsp_seqno\n (bsc#1174737).\n - drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2.\n (bsc#1152489) * context changes\n - drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n - drm/i915: Prevent using semaphores to chain up to external fences\n (bsc#1174737).\n - drm/i915: Protect i915_request_await_start from early waits\n (bsc#1174737).\n - drm/i915: Pull waiting on an external dma-fence into its routine\n (bsc#1174737).\n - drm/i915: Rely on direct submission to the queue (bsc#1174737).\n - drm/i915: Remove wait priority boosting (bsc#1174737).\n - drm/i915: Reorder await_execution before await_request (bsc#1174737).\n - drm/i915: Return early for await_start on same timeline (bsc#1174737).\n - drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n - drm/imx: fix use after free (git-fixes).\n - drm/imx: imx-ldb: Disable both channels for split mode in enc->disable()\n (git-fixes).\n - drm/imx: tve: fix regulator_disable error path (git-fixes).\n - drm/ingenic: Fix incorrect assumption about plane->index (bsc#1152489)\n * refreshed for context changes\n - drm: mcde: Fix display initialization problem (git-fixes).\n - drm/mediatek: Check plane visibility in atomic_update (git-fixes).\n - drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n - drm/msm/dpu: allow initialization of encoder locks during encoder init\n (git-fixes).\n - drm/msm: fix potential memleak in error branch (git-fixes).\n - drm/nouveau/fbcon: fix module unload when fbcon init has failed for some\n reason (git-fixes).\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n - drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout\n (git-fixes).\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel\n (git-fixes).\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer\n S1003 (git-fixes).\n - drm/panel: otm8009a: Drop unnessary backlight_device_unregister()\n (git-fixes).\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n - drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n - drm/radeon: fix double free (git-fixes).\n - drm/stm: repair runtime power management (git-fixes).\n - drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n - drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).\n - drm/tegra: hub: Do not enable orphaned window group (git-fixes).\n - drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset()\n (bsc#1152489) * refreshed for context changes\n - drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).\n - exfat: add missing brelse() calls on error paths (git-fixes).\n - exfat: fix incorrect update of stream entry in __exfat_truncate()\n (git-fixes).\n - exfat: fix memory leak in exfat_parse_param() (git-fixes).\n - exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).\n - fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins\n (git-fixes).\n - firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).\n - firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).\n - firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).\n - firmware: Fix a reference count leak (git-fixes).\n - firmware_loader: fix memory leak for paged buffer (bsc#1175367).\n - firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n - firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n - firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).\n - firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and\n above (bsc#1174906).\n - firmware: smccc: Add the definition for SMCCCv1.2 version/error codes\n (bsc#1174906).\n - firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x\n instead (bsc#1174906).\n - firmware: smccc: Refactor SMCCC specific bits into separate file\n (bsc#1174906).\n - firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n - fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config\n file\n - fuse: copy_file_range should truncate cache (git-fixes).\n - fuse: fix copy_file_range cache issues (git-fixes).\n - fuse: Fix parameter for FS_IOC_{GET,SET}FLAGS (bsc#1175176).\n - fuse: fix weird page warning (bsc#1175175).\n - geneve: fix an uninitialized value in geneve_changelink() (git-fixes).\n - genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897\n ltc#187090).\n - genirq/affinity: Remove const qualifier from node_to_cpumask argument\n (bsc#1174897 ltc#187090).\n - genirq/affinity: Spread vectors on node according to nr_cpu ratio\n (bsc#1174897 ltc#187090).\n - gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n - gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0\n (bsc#1174825).\n - go7007: add sanity checking for endpoints (git-fixes).\n - gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n - gpio: arizona: put pm_runtime in case of failure (git-fixes).\n - gpio: max77620: Fix missing release of interrupt (git-fixes).\n - gpio: pca953x: disable regmap locking for automatic address incrementing\n (git-fixes).\n - gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).\n - gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2\n (git-fixes).\n - gpu: host1x: Detach driver on unregister (git-fixes).\n - habanalabs: increase timeout during reset (git-fixes).\n - HID: alps: support devices with report id 2 (git-fixes).\n - HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n - HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override\n (git-fixes).\n - HID: logitech-hidpp: avoid repeated "multiplier = " log messages\n (git-fixes).\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n - HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).\n - HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).\n - HID: quirks: Remove ITE 8595 entry from hid_have_special_driver\n (git-fixes).\n - HID: steam: fixes race in handling device list (git-fixes).\n - hippi: Fix a size used in a 'pci_free_consistent()' in an error handling\n path (git-fixes).\n - hwmon: (adm1275) Make sure we are reading enough data for different\n chips (git-fixes).\n - hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute\n (git-fixes).\n - hwmon: (nct6775) Accept PECI Calibration as temperature source for\n NCT6798D (git-fixes).\n - hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe()\n (git-fixes).\n - hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).\n - i2c: also convert placeholder function to return errno (git-fixes).\n - i2c: eg20t: Load module automatically if ID matches (git-fixes).\n - i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n - i2c: iproc: fix race between client unreg and isr (git-fixes).\n - i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).\n - i2c: rcar: avoid race when unregistering slave (git-fixes).\n - i2c: rcar: slave: only send STOP event when we have been addressed\n (git-fixes).\n - i2c: slave: add sanity check when unregistering (git-fixes).\n - i2c: slave: improve sanity check when registering (git-fixes).\n - i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).\n - i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).\n - i40iw: fix null pointer dereference on a null wqe pointer (git-fixes).\n - i40iw: Report correct firmware version (git-fixes).\n - IB/cma: Fix ports memory leak in cma_configfs (git-fixes).\n - IB/core: Fix potential NULL pointer dereference in pkey cache\n (git-fixes).\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down\n (bsc#1174409).\n - IB/hfi1: Do not destroy link_wq when the device is shut down\n (bsc#1174409).\n - IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n - IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).\n - IB/hfi1: Fix memory leaks in sysfs registration and unregistration\n (git-fixes).\n - IB/hfi1: Fix module use count flaw due to leftover module put calls\n (bsc#1174407).\n - IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).\n - IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode\n (git-fixes).\n - IB/mad: Fix use after free when destroying MAD agent (git-fixes).\n - IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).\n - IB/mlx5: Fix 50G per lane indication (git-fixes).\n - IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command\n (git-fixes).\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device\n (git-fixes).\n - IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads\n (git-fixes).\n - ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n - IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).\n - IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).\n - IB/rdmavt: Delete unused routine (git-fixes).\n - IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE\n (bsc#1174770).\n - IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).\n - ide: Remove uninitialized_var() usage (git-fixes).\n - ieee802154: fix one possible memleak in adf7242_probe (git-fixes).\n - iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()'\n (git-fixes).\n - iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak\n (git-fixes).\n - iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).\n - iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).\n - iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n - iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).\n - iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe()\n (git-fixes).\n - iio:pressure:ms5611 Fix buffer element alignment (git-fixes).\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).\n - Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).\n - Input: elan_i2c - only increment wakeup count on touch (git-fixes).\n - Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).\n - Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).\n - Input: mms114 - add extra compatible for mms345l (git-fixes).\n - Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).\n - Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen\n (git-fixes).\n - integrity: remove redundant initialization of variable ret (git-fixes).\n - intel_th: Fix a NULL dereference when hub driver is not loaded\n (git-fixes).\n - intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n - intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n - intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n - io-mapping: indicate mapping failure (git-fixes).\n - iommu/arm-smmu-v3: Do not reserve implementation defined register space\n (bsc#1174126).\n - iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).\n - iommu/vt-d: Update scalable mode paging structure coherency\n (bsc#1174128).\n - ionic: centralize queue reset code (bsc#1167773).\n - ionic: fix up filter locks and debug msgs (bsc#1167773).\n - ionic: keep rss hash after fw update (bsc#1167773).\n - ionic: unlock queue mutex in error path (bsc#1167773).\n - ionic: update filter id after replay (bsc#1167773).\n - ionic: update the queue count on open (bsc#1167773).\n - ionic: use mutex to protect queue operations (bsc#1167773).\n - ionic: use offset for ethtool regs data (bsc#1167773).\n - irqchip/gic: Atomically update affinity (bsc#1175195).\n - kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.patch\n (bsc1174263).\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n - kABI: restore signature of xfrm_policy_bysel_ctx() and\n xfrm_policy_byid() (bsc#1174645).\n - kABI workaround for enum cpuhp_state (git-fixes).\n - kABI workaround for struct kvm_device (git-fixes). Just change an\n variable to "const" type in kvm_device.\n - kABI workaround for struct kvm_vcpu_arch (git-fixes).\n - kernel.h: remove duplicate include of asm/div64.h (git-fixes).\n - keys: asymmetric: fix error return code in software_key_query()\n (git-fixes).\n - kobject: Avoid premature parent object freeing in kobject_cleanup()\n (git-fixes).\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Annotate hyp NMI-related functions as __always_inline\n (bsc#1175190).\n - KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197\n jsc#SLE-13593).\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197\n jsc#SLE-13593).\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).\n - KVM: arm64: Support stolen time reporting via shared structure\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Support stolen time reporting via shared structure\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm64: Use the correct timer structure to access the physical\n counter (bsc#1133021).\n - KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).\n - KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code\n (bsc#1172197 jsc#SLE-13593).\n - KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER\n (bsc#1133021).\n - KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).\n - KVM: nVMX: always update CR3 in VMCS (git-fixes).\n - KVM: Play nice with read-only memslots when querying host page size\n (bsc#1133021).\n - KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction\n (bsc#1133021).\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n - leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n - leds: core: Flush scheduled work for system suspend (git-fixes).\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n - leds: gpio: Fix semantic error (git-fixes).\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n - leds: lm36274: fix use-after-free on unbind (git-fixes).\n - leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n - libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses\n (bsc#1155518).\n - lib: Reduce user_access_begin() boundaries in strncpy_from_user() and\n strnlen_user() (bsc#1174331).\n - liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n - locktorture: Print ratio of acquisitions, not failures (bsc#1149032).\n - mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n - mac80211: fix misplaced while instead of if (git-fixes).\n - mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n - mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n - media: cec: silence shift wrapping warning in __cec_s_log_addrs()\n (git-fixes).\n - media: cxusb-analog: fix V4L2 dependency (git-fixes).\n - media: exynos4-is: Add missed check for pinctrl_lookup_state()\n (git-fixes).\n - media: firewire: Using uninitialized values in node_probe() (git-fixes).\n - media: marvell-ccic: Add missed v4l2_async_notifier_cleanup()\n (git-fixes).\n - media: media-request: Fix crash if memory allocation fails (git-fixes).\n - media: nuvoton-cir: remove setting tx carrier functions (git-fixes).\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for\n preview_init_entities() (git-fixes).\n - media: sur40: Remove uninitialized_var() usage (git-fixes).\n - media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).\n - mei: bus: do not clean driver pointer (git-fixes).\n - mfd: arizona: Ensure 32k clock is put on driver unbind and error\n (git-fixes).\n - mfd: dln2: Run event handler loop under spinlock (git-fixes).\n - mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).\n - mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3\n (bsc#1154488).\n - mlxsw: core: Use different get_trend() callbacks for different thermal\n zones (networking-stable-20_06_10).\n - mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed\n (git-fixes).\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type\n (git-fixes).\n - mm: Fix protection usage propagation (bsc#1174002).\n - mm/mmap.c: close race between munmap() and expand_upwards()/downwards()\n (bsc#1174527).\n - mtd: properly check all write ioctls for permissions (git-fixes).\n - mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).\n - mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).\n - mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).\n - mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).\n - mwifiex: Prevent memory corruption handling keys (git-fixes).\n - nbd: Fix memory leak in nbd_add_socket (git-fixes).\n - ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - net: be more gentle about silly gso requests coming from user\n (networking-stable-20_06_07).\n - net/bpfilter: Initialize pos in __bpfilter_process_sockopt (bsc#1155518).\n - net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n - netdevsim: fix unbalaced locking in nsim_create() (git-fixes).\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n - net: ena: add reserved PCI device ID (bsc#1174852).\n - net: ena: add support for reporting of packet drops (bsc#1174852).\n - net: ena: add support for the rx offset feature (bsc#1174852).\n - net: ena: add support for traffic mirroring (bsc#1174852).\n - net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n - net: ena: allow setting the hash function without changing the key\n (bsc#1174852).\n - net: ena: avoid memory access violation by validating req_id properly\n (bsc#1174852).\n - net: ena: avoid unnecessary admin command when RSS function set fails\n (bsc#1174852).\n - net: ena: avoid unnecessary rearming of interrupt vector when\n busy-polling (bsc#1174852).\n - net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n - net: ena: changes to RSS hash key allocation (bsc#1174852).\n - net: ena: cosmetic: change ena_com_stats_admin stats to u64\n (bsc#1174852).\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n - net: ena: cosmetic: extract code to ena_indirection_table_set()\n (bsc#1174852).\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n - net: ena: cosmetic: fix spelling and grammar mistakes in comments\n (bsc#1174852).\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n - net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n - net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h\n macros (bsc#1174852).\n - net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation()\n (bsc#1174852).\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n - net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n - net: ena: drop superfluous prototype (bsc#1174852).\n - net: ena: enable support of rss hash key and function changes\n (bsc#1174852).\n - net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n - net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n - net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n - net: ena: fix continuous keep-alive resets (bsc#1174852).\n - net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n - net: ena: fix error returning in ena_com_get_hash_function()\n (bsc#1174852).\n - net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n - net: ena: Fix using plain integer as NULL pointer in\n ena_init_napi_in_range (bsc#1174852).\n - net: ena: Make some functions static (bsc#1174852).\n - net: ena: move llq configuration from ena_probe to ena_device_init()\n (bsc#1174852).\n - net: ena: reduce driver load time (bsc#1174852).\n - net: ena: remove code that does nothing (bsc#1174852).\n - net: ena: remove set but not used variable 'hash_key' (bsc#1174852).\n - net: ena: rename ena_com_free_desc to make API more uniform\n (bsc#1174852).\n - net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n - net: ena: support new LLQ acceleration mode (bsc#1174852).\n - net: ena: use explicit variable size for clarity (bsc#1174852).\n - net: ena: use SHUTDOWN as reset reason when closing interface\n (bsc#1174852).\n - net_failover: fixed rollback in net_failover_open()\n (networking-stable-20_06_10).\n - netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c\n (bsc#1171857).\n - netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and\n exit helpers (bsc#1171857).\n - netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c\n (bsc#1171857).\n - netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit\n helpers (bsc#1171857).\n - net: Fix a documentation bug wrt. ip_unprivileged_port_start\n (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n - net: fsl/fman: treat all RGMII modes in memac_adjust_link()\n (bsc#1174398).\n - net: hns3: check reset pending after FLR prepare (bsc#1154353).\n - net: hns3: fix error handling for desc filling (git-fixes).\n - net: hns3: fix for not calculating TX BD send size correctly (git-fixes).\n - net: hns3: fix return value error when query MAC link status fail\n (git-fixes).\n - net: ipv4: Fix wrong type conversion from hint to rt in\n ip_route_use_hint() (bsc#1154353).\n - net: lan78xx: add missing endpoint sanity check (git-fixes).\n - net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n - net: lan78xx: replace bogus endpoint lookup (git-fixes).\n - net: macb: call pm_runtime_put_sync on failure path (git-fixes).\n - net/mlx5: drain health workqueue in case of driver load error\n (networking-stable-20_06_16).\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash\n (jsc#SLE-8464).\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash\n (jsc#SLE-8464).\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev\n (jsc#SLE-8464).\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev\n (jsc#SLE-8464).\n - net/mlx5e: Fix repeated XSK usage on one channel\n (networking-stable-20_06_16).\n - net/mlx5e: Fix VXLAN configuration restore after function reload\n (jsc#SLE-8464).\n - net/mlx5e: Fix VXLAN configuration restore after function reload\n (jsc#SLE-8464).\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode\n (jsc#SLE-8464).\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode\n (jsc#SLE-8464).\n - net/mlx5: Fix fatal error handling during device load\n (networking-stable-20_06_16).\n - net: phy: Check harder for errors in get_phy_id() (git-fixes).\n - net: phy: fix memory leak in device-create error path (git-fixes).\n - net: phy: realtek: add support for configuring the RX delay on RTL8211F\n (bsc#1174398).\n - net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).\n - net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).\n - net/smc: fix restoring of fallback changes (git-fixes).\n - net: stmmac: do not attach interface until resume finishes (bsc#1174072).\n - net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).\n - net: stmmac: dwc-qos: use generic device api (bsc#1174072).\n - net: stmmac: enable timestamp snapshot for required PTP packets in dwmac\n v5.10a (networking-stable-20_06_07).\n - net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).\n - net/tls: fix encryption error checking (git-fixes).\n - net/tls: free record only on encryption error (git-fixes).\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n - nfc: nci: add missed destroy_workqueue in nci_register_device\n (git-fixes).\n - nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame\n (git-fixes).\n - nfp: flower: fix used time of merge flow statistics\n (networking-stable-20_06_07).\n - NFS: Fix interrupted slots by sending a solo SEQUENCE operation\n (bsc#1174264).\n - NTB: Fix static check warning in perf_clear_test (git-fixes).\n - NTB: Fix the default port and peer numbers for legacy drivers\n (git-fixes).\n - ntb: hw: remove the code that sets the DMA mask (git-fixes).\n - NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).\n - NTB: ntb_test: Fix bug when counting remote files (git-fixes).\n - NTB: ntb_tool: reading the link file should not end in a NULL byte\n (git-fixes).\n - NTB: perf: Do not require one more memory window than number of peers\n (git-fixes).\n - NTB: perf: Fix race condition when run with ntb_test (git-fixes).\n - NTB: perf: Fix support for hardware that does not have port numbers\n (git-fixes).\n - ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).\n - NTB: Revert the change to use the NTB device dev for DMA allocations\n (git-fixes).\n - ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n - ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n - ocfs2: load global_inode_alloc (bsc#1172963).\n - omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).\n - ovl: inode reference leak in ovl_is_inuse true case (git-fixes).\n - padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).\n - padata: kABI fixup for struct padata_instance splitting nodes\n (git-fixes).\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership\n (bsc#1174356).\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n - PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).\n - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge\n (git-fixes).\n - PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register\n (git-fixes).\n - PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n - PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context()\n (git-fixes).\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2\n (bsc#1172201).\n - PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n - PCI: qcom: Add missing reset for ipq806x (git-fixes).\n - PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n - PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n - PCI: rcar: Fix runtime PM imbalance on error (git-fixes).\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n - PCI: switchtec: Add missing __iomem and __user tags to fix sparse\n warnings (git-fixes).\n - PCI: switchtec: Add missing __iomem tag to fix sparse warnings\n (git-fixes).\n - PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).\n - percpu: Separate decrypted varaibles anytime encryption can be enabled\n (bsc#1174332).\n - phy: armada-38x: fix NETA lockup when repeatedly switching speeds\n (git-fixes).\n - phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY\n (git-fixes).\n - phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).\n - phy: sun4i-usb: fix dereference of pointer phy0 before it is null\n checked (git-fixes).\n - pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n - pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n - pinctrl: single: fix function name in documentation (git-fixes).\n - pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n - platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).\n - platform/x86: intel-hid: Fix return value check in check_acpi_dev()\n (git-fixes).\n - platform/x86: intel-vbtn: Fix return value check in check_acpi_dev()\n (git-fixes).\n - platform/x86: ISST: Increase timeout (bsc#1174185).\n - PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).\n - powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n - powerpc: Allow 4224 bytes of stack expansion for the signal frame\n (bsc#1065729).\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable\n pkey (bsc#1065729).\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu feature\n (bsc#1065729).\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n - powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n - powerpc/fadump: fix race between pstore write and fadump crash trigger\n (bsc#1168959 ltc#185010).\n - powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).\n - powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n - powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl()\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n - powerpc/pseries/hotplug-cpu: Remove double free in error path\n (bsc#1065729).\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n - powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n - powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n - power: supply: check if calc_soc succeeded in pm860x_init_battery\n (git-fixes).\n - pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n - qed: suppress "do not support RoCE & iWARP" flooding on HW init\n (git-fixes).\n - qed: suppress false-positives interrupt error messages on HW init\n (git-fixes).\n - r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).\n - r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).\n - r8169: fix resume on cable plug-in (bsc#1175296).\n - r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).\n - r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init\n (bsc#1175296).\n - r8169: read common register for PCI commit (bsc#1175296).\n - random32: move the pseudo-random 32-bit definitions to prandom.h\n (git-fixes).\n - random32: remove net_rand_state from the latent entropy gcc plugin\n (git-fixes).\n - random: fix circular include dependency on arm64 after addition of\n percpu.h (git-fixes).\n - RDMA/cm: Add missing locking around id.state in cm_dup_req_handler\n (git-fixes).\n - RDMA/cma: Protect bind_list and listen_list while finding matching cm id\n (git-fixes).\n - RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).\n - RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).\n - RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id()\n (git-fixes).\n - RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).\n - RDMA/cm: Remove a race freeing timewait_info (git-fixes).\n - RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow\n (git-fixes).\n - RDMA/core: Fix double destruction of uobject (git-fixes).\n - RDMA/core: Fix double put of resource (git-fixes).\n - RDMA/core: Fix missing error check on dev_set_name() (git-fixes).\n - RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).\n - RDMA/core: Fix race between destroy and release FD object (git-fixes).\n - RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).\n - RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).\n - RDMA/counter: Query a counter before release (git-fixes).\n - RDMA/efa: Set maximum pkeys device attribute (git-fixes).\n - RDMA/hns: Bugfix for querying qkey (git-fixes).\n - RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).\n - RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n - RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).\n - RDMA/mad: Do not crash if the rdma device does not have a umad interface\n (git-fixes).\n - RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads()\n (git-fixes).\n - RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n - RDMA/mlx5: Add init2init as a modify command (git-fixes).\n - RDMA/mlx5: Fix access to wrong pointer while performing flush due to\n error (git-fixes).\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails\n (jsc#SLE-8446).\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails\n (jsc#SLE-8446).\n - RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).\n - RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction\n (jsc#SLE-8446).\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction\n (jsc#SLE-8446).\n - RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).\n - RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).\n - RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).\n - RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing\n (git-fixes).\n - RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).\n - RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532\n (git-fixes).\n - RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).\n - RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).\n - RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).\n - RDMA/rxe: Set default vendor ID (git-fixes).\n - RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices\n (git-fixes).\n - RDMA/siw: Fix failure handling during device creation (git-fixes).\n - RDMA/siw: Fix passive connection establishment (git-fixes).\n - RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).\n - RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr()\n (git-fixes).\n - RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n - RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n - RDMA/siw: Fix setting active_{speed, width} attributes (git-fixes).\n - RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).\n - RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).\n - regmap: debugfs: check count when read regmap file (git-fixes).\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps\n (git-fixes).\n - regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n - regmap: fix alignment issue (git-fixes).\n - regmap: Fix memory leak from regmap_register_patch (git-fixes).\n - regulator: gpio: Honor regulator-boot-on property (git-fixes).\n - remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load\n (git-fixes).\n - remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load\n (git-fixes).\n - remoteproc: qcom: q6v5: Update running state before requesting stop\n (git-fixes).\n - Revert "ALSA: hda: call runtime_allow() for all hda controllers"\n (git-fixes).\n - Revert "drm/amd/display: Expose connector VRR range via debugfs"\n (bsc#1152489) * refreshed for context changes\n - Revert "drm/amdgpu: Fix NULL dereference in dpm sysfs handlers"\n (git-fixes).\n - Revert "i2c: cadence: Fix the hold bit setting" (git-fixes).\n - Revert "RDMA/cma: Simplify rdma_resolve_addr() error flow" (git-fixes).\n - Revert "thermal: mediatek: fix register index error" (git-fixes).\n - rhashtable: Document the right function parameters (bsc#1174880).\n - rhashtable: drop duplicated word in &lt;linux/rhashtable.h>\n (bsc#1174880).\n - rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).\n - rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).\n - rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).\n - RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen()\n (git-fixes).\n - rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for\n podman or docker builds when no more specific driver can be used (like\n lvm or btrfs). As the default build fs is ext4 currently, we need\n overlayfs kernel modules to be available.\n - rpm/modules.fips: add ecdh_generic (boo#1173813)\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails\n (bsc#1154353).\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n - rtw88: fix LDPC field for RA info (git-fixes).\n - rtw88: fix short GI capability based on current bandwidth (git-fixes).\n - s390: fix syscall_get_error for compat processes (git-fixes).\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n - s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).\n - s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n - s390/qdio: put thinint indicator after early error (git-fixes).\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n - sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU\n scheduler functional and performance backports)).\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot\n (jsc#SLE-13654).\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot\n (jsc#SLE-13654).\n - scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow\n (jsc#SLE-13654).\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow\n (jsc#SLE-13654).\n - scsi: libfc: free response frame from GPN_ID (bsc#1173849).\n - scsi: libfc: Handling of extra kref (bsc#1173849).\n - scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).\n - scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted\n (bsc#1173849).\n - scsi: libfc: Skip additional kref updating work event (bsc#1173849).\n - scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).\n - scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action\n (git-fixes).\n - selftests/net: in rxtimestamp getopt_long needs terminating null entry\n (networking-stable-20_06_16).\n - selinux: fall back to ref-walk if audit is required (bsc#1174333).\n - selinux: revert "stop passing MAY_NOT_BLOCK to the AVC upon follow_link"\n (bsc#1174333).\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n - serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).\n - serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).\n - serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).\n - serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).\n - serial: amba-pl011: Make sure we initialize the port.lock spinlock\n (git-fixes).\n - serial: exar: Fix GPIO configuration for Sealevel cards based on\n XR17V35X (git-fixes).\n - serial: mxs-auart: add missed iounmap() in probe failure and remove\n (git-fixes).\n - serial: tegra: fix CREAD handling for PIO (git-fixes).\n - SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n - soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).\n - soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).\n - spi: davinci: Remove uninitialized_var() usage (git-fixes).\n - spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n - spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).\n - spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).\n - spi: rockchip: Fix error in SPI slave pio read (git-fixes).\n - spi: spidev: fix a potential use-after-free in spidev_release()\n (git-fixes).\n - spi: spidev: fix a race between spidev_release and spidev_remove\n (git-fixes).\n - spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate\n (git-fixes).\n - spi: sun4i: update max transfer size reported (git-fixes).\n - staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift\n (git-fixes).\n - staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift\n (git-fixes).\n - staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift\n (git-fixes).\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support\n (git-fixes).\n - staging: comedi: verify array index is correct before using it\n (git-fixes).\n - Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode\n (git-fixes).\n - staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n - staging: rtl8712: handle firmware load failure (git-fixes).\n - staging: vchiq_arm: Add a matching unregister call (git-fixes).\n - staging: wlan-ng: properly check endpoint types (git-fixes).\n - SUNRPC dont update timeout value on connection reset (bsc#1174263).\n - sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n - tcp: md5: allow changing MD5 keys in all socket states (git-fixes).\n - thermal/drivers: imx: Fix missing of_node_put() at probe time\n (git-fixes).\n - thermal: int3403_thermal: Downgrade error message (git-fixes).\n - thermal: ti-soc-thermal: Fix reversed condition in\n ti_thermal_expose_sensor() (git-fixes).\n - tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n - tpm: Require that all digests are present in TCG_PCR_EVENT2 structures\n (git-fixes).\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init\n (git-fixes).\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n - ubsan: check panic_on_warn (bsc#1174805).\n - udp: Copy has_conns in reuseport_grow() (git-fixes).\n - udp: Improve load balancing for SO_REUSEPORT (git-fixes).\n - uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).\n - USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).\n - usb: chipidea: core: add wakeup support for extcon (git-fixes).\n - usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).\n - usb: dwc2: Fix shutdown callback in platform (git-fixes).\n - usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n - usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).\n - usb: dwc3: pci: add support for the Intel Tiger Lake PCH -H variant\n (git-fixes).\n - usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work\n (git-fixes).\n - usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).\n - usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength\n (git-fixes).\n - usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk\n (git-fixes).\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable()\n (git-fixes).\n - usb: gadget: udc: gr_udc: fix memleak on error handling path in\n gr_ep_init() (git-fixes).\n - usb: hso: check for return value in hso_serial_common_create()\n (git-fixes).\n - usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n - USB: iowarrior: fix up report size handling for some devices (git-fixes).\n - usbip: tools: fix module name in man page (git-fixes).\n - usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).\n - USB: serial: ch341: add new Product ID for CH340 (git-fixes).\n - USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n - USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n - USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).\n - USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n - USB: serial: iuu_phoenix: fix memory corruption (git-fixes).\n - USB: serial: option: add GosunCn GM500 series (git-fixes).\n - USB: serial: option: add Quectel EG95 LTE modem (git-fixes).\n - USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n - usb: tegra: Fix allocation for the FPCI context (git-fixes).\n - usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n - usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).\n - video: fbdev: sm712fb: fix an issue about iounmap for a wrong address\n (git-fixes).\n - video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()'\n call (git-fixes).\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc\n serial (git-fixes).\n - virt: vbox: Fix guest capabilities mask check (git-fixes).\n - virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to\n match upstream (git-fixes).\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n - vt: Reject zero-sized screen buffer size (git-fixes).\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid\n options (networking-stable-20_06_10).\n - watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in\n watchdog_info.options (git-fixes).\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info option\n (git-fixes).\n - watchdog: initialize device before misc_register (git-fixes).\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n - wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n - wireless: Use offsetof instead of custom macro (git-fixes).\n - wl1251: fix always return 0 error (git-fixes).\n - workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).\n - xen/pvcalls-back: test for errors when calling backend_connect()\n (bsc#1065600).\n - xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).\n - xfrm: policy: match with both mark and mask on user interfaces\n (bsc#1174645).\n - xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork\n (git-fixes).\n - xfs: fix inode allocation block res calculation precedence (git-fixes).\n - xfs: fix reflink quota reservation accounting error (git-fixes).\n - xfs: preserve rmapbt swapext block reservation from freed blocks\n (git-fixes).\n\n", "edition": 1, "modified": "2020-08-21T06:13:06", "published": "2020-08-21T06:13:06", "id": "OPENSUSE-SU-2020:1236-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00047.html", "title": "Security update for the Linux Kernel (important)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-08-06T19:33:46", "bulletinFamily": "unix", "cvelist": ["CVE-2020-16166", "CVE-2020-10135", "CVE-2020-12888", "CVE-2019-20810", "CVE-2020-10769", "CVE-2020-10768", "CVE-2020-14331", "CVE-2020-15393", "CVE-2019-16746", "CVE-2020-14416", "CVE-2020-0305", "CVE-2020-10766", "CVE-2020-15780", "CVE-2019-20908", "CVE-2020-10781", "CVE-2020-13974", "CVE-2020-10773", "CVE-2020-12771", "CVE-2020-10767"], "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where\n it did not check the length of variable elements in a beacon head,\n leading to a buffer overflow (bnc#1152107 1173659).\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c\n did not call snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n - CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c\n where Incorrect access permissions for the efivar_ssdt ACPI variable\n could be used by attackers to bypass lockdown or secure boot\n restrictions, aka CID-1957a85b0032 (bnc#1173567).\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible\n use-after-free due to a race condition. This could lead to local\n escalation of privilege with System execution privileges needed. User\n interaction is not needed for exploitation (bnc#1174462).\n - CVE-2020-10135: Legacy pairing and secure-connections pairing\n authentication in Bluetooth\u00c2\u00ae BR/EDR Core Specification v5.2 and earlier\n may have allowed an unauthenticated user to complete authentication\n without pairing credentials via adjacent access. An unauthenticated,\n adjacent attacker could impersonate a Bluetooth BR/EDR master or slave\n to pair with a previously paired remote device to successfully complete\n the authentication procedure without knowing the link key (bnc#1171988).\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown. Linux scheduler\n logical bug allowed an attacker to turn off the SSBD protection.\n (bnc#1172781).\n - CVE-2020-10767: Fixed indirect Branch Prediction Barrier is\n force-disabled when STIBP is unavailable or enhanced IBRS is available.\n (bnc#1172782).\n - CVE-2020-10768: Fixed indirect branch speculation can be enabled after\n it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command.\n (bnc#1172783).\n - CVE-2020-10769: A buffer over-read flaw was found in\n crypto_authenc_extractkeys in crypto/authenc.c in the IPsec\n Cryptographic algorithm's module, authenc. When a payload longer than 4\n bytes, and is not following 4-byte alignment boundary guidelines, it\n causes a buffer over-read threat, leading to a system crash. This flaw\n allowed a local attacker with user privileges to cause a denial of\n service (bnc#1173265).\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x.\n (bnc#1172999).\n - CVE-2020-10781: A zram sysfs resource consumption was fixed.\n (bnc#1173074).\n - CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a\n deadlock if a coalescing operation fails (bnc#1171732).\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts to access\n disabled memory space (bnc#1171868).\n - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if\n k_ascii was called several times in a row, aka CID-b86dab054059.\n (bnc#1172775).\n - CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n - CVE-2020-14331: Fixed an out of bounds write to the vgacon scrollback\n buffer (bsc#1174205).\n - CVE-2020-14416: A race condition in tty->disc_data handling in the slip\n and slcan line discipline could lead to a use-after-free, aka\n CID-0ace17d56824. This affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c (bnc#1162002).\n - CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a\n memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c\n where injection of malicious ACPI tables via configfs could be used by\n attackers to bypass lockdown and secure boot restrictions, aka\n CID-75b0cea7bf30 (bnc#1173573).\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make\n observations that help to obtain sensitive information about the\n internal state of the network RNG, aka CID-f227e3ec3b5c. This is related\n to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\n The following non-security bugs were fixed:\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx handling\n (bsc#1111666).\n - ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n - ACPI: PM: Avoid using power resources if there are none for D0\n (bsc#1051510).\n - ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n - ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n - ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n - ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n - ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up\n (bsc#1111666).\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n - ALSA: hda/hdmi - enable runtime pm for newer AMD display audio\n (bsc#1111666).\n - ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n - ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines\n (bsc#1111666).\n - ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n - ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems\n (bsc#1111666).\n - ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n - ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n - ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n - ALSA: hda/realtek - change to suitable link model for ASUS platform\n (bsc#1111666).\n - ALSA: hda/realtek - Check headset type by unplug and resume\n (bsc#1111666).\n - ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC\n (bsc#1111666).\n - ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC\n (bsc#1111666).\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with\n ALC256 (bsc#1111666).\n - ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with\n ALC269VC (bsc#1111666).\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401)\n series with ALC289 (bsc#1111666).\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502)\n series with ALC289 (bsc#1111666).\n - ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534\n (bsc#1111666).\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n - ALSA: hda/realtek: Fix add a "ultra_low_power" function for intel\n reference board (alc256) (bsc#1111666).\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung\n Notebook Pen S (bsc#1111666).\n - ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n - ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id\n (bsc#1111666).\n - ALSA: hda/realtek - Fix unused variable warning w/o\n CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n - ALSA: hda/realtek - Introduce polarity for micmute LED GPIO\n (bsc#1111666).\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus\n G14(GA401) series with ALC289 (bsc#1111666).\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms\n (git-fixes).\n - ALSA: lx6464es - add support for LX6464ESe pci express variant\n (bsc#1111666).\n - ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n - ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n - ALSA: usb-audio: Add duplex sound support for USB devices using implicit\n feedback (bsc#1111666).\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n - ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n - ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt\n Dock (bsc#1111666).\n - ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n - ALSA: usb-audio: Fix inconsistent card PM state after resume\n (bsc#1111666).\n - ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n - ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n - ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n - ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n - ALSA: usb-audio: Use the new macro for HP Dock rename quirks\n (bsc#1111666).\n - amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).\n - arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n - ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb\n (bsc#1111666).\n - ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n - b43: Fix connection problem with WPA3 (bsc#1111666).\n - b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n - bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n - be2net: fix link failure after ethtool offline test (git-fixes).\n - block: Fix use-after-free in blkdev_get() (bsc#1174843).\n - block: nr_sects_write(): Disable preemption on seqcount write\n (bsc#1173818).\n - block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n - block: sed-opal: fix sparse warning: convert __be64 data (git fixes\n (block drivers)).\n - Bluetooth: Add SCO fallback for invalid LMP parameters error\n (bsc#1111666).\n - bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n - bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n - bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails\n (git-fixes).\n - bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n - bnxt_en: fix NULL dereference in case SR-IOV configuration fails\n (git-fixes).\n - bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n - bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features()\n (networking-stable-20_05_12).\n - bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n - brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers\n (bsc#1174438).\n - btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n - btrfs: Always use a cached extent_state in\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n - btrfs: change timing for qgroup reserved space for ordered extents to\n fix reserved space leak (bsc#1172247).\n - btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n - btrfs: file: reserve qgroup space after the hole punch range is locked\n (bsc#1172247).\n - btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof\n (bsc#1174438).\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write\n (bsc#1174438).\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow\n (bsc#1174438).\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO\n (bsc#1174438).\n - btrfs: inode: move qgroup reserved space release to the callers of\n insert_reserved_file_extent() (bsc#1172247).\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent()\n (bsc#1172247).\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n - btrfs: qgroup: allow to unreserve range without releasing other ranges\n (bsc#1120163).\n - btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after\n disable (bsc#1172247).\n - btrfs: qgroup: fix data leak caused by race between writeback and\n truncate (bsc#1172247).\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve\n retry-after-EDQUOT (bsc#1120163).\n - btrfs: qgroup: try to flush qgroup space when we get -EDQUOT\n (bsc#1120163).\n - btrfs: Return EAGAIN if we can't start no snpashot write in\n check_can_nocow (bsc#1174438).\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n - btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n - btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n - bus: hisi_lpc: Add .remove method to avoid driver unbind crash\n (bsc#1174658).\n - bus: hisi_lpc: Do not fail probe for unrecognised child devices\n (bsc#1174658).\n - bus: hisi_lpc: Unregister logical PIO range to avoid potential\n use-after-free (bsc#1174658).\n - bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads\n (bsc#1111666).\n - carl9170: remove P2P_GO support (bsc#1111666).\n - cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n - ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).\n - ceph: request expedited service on session's last cap flush\n (bsc#1167104).\n - cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages\n (bsc#1173857).\n - char/random: Add a newline at the end of the file (jsc#SLE-12423).\n - cifs: get rid of unused parameter in reconn_setup_dfs_targets()\n (bsc#1144333).\n - cifs: handle hostnames that resolve to same ip in failover (bsc#1144333\n bsc#1161016).\n - cifs: set up next DFS target before generic_ip_connect() (bsc#1144333\n bsc#1161016).\n - clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n - clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n - clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n - clocksource: dw_apb_timer: Make CPU-affiliation being optional\n (bsc#1111666).\n - compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block\n drivers)).\n - compat_ioctl: block: handle Persistent Reservations (git fixes (block\n drivers)).\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References:\n bsc#1174549\n - copy_{to,from}_user(): consolidate object size checks (git fixes).\n - crypto: algboss - do not wait during notifier callback (bsc#1111666).\n - crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).\n - crypto: caam - update xts sector size for large input length\n (bsc#1111666).\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is\n fully iterated (bsc#1111666).\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is\n fully iterated (git-fixes).\n - crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n - crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).\n - crypto: rockchip - fix scatterlist nents error (git-fixes).\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n - crypto: talitos - check AES key size (git-fixes).\n - crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n - crypto: talitos - fix IPsec cipher in length (git-fixes).\n - crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n - crypto: virtio: Fix src/dst scatterlist calculation in\n __virtio_crypto_skcipher_do_req() (git-fixes).\n - debugfs: Check module state before warning in {full/open}_proxy_open()\n (bsc#1173746).\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n - dlm: remove BUG() before panic() (bsc#1174844).\n - dmaengine: tegra210-adma: Fix an error handling path in\n 'tegra_adma_probe()' (bsc#1111666).\n - dm btree: increase rebalance threshold in __rebalance2() (git fixes\n (block drivers)).\n - dm cache: fix a crash due to incorrect work item cancelling (git fixes\n (block drivers)).\n - dm crypt: fix benbi IV constructor crash if used in authenticated mode\n (git fixes (block drivers)).\n - dm: fix potential for q->make_request_fn NULL pointer (git fixes (block\n drivers)).\n - dm space map common: fix to ensure new block isn't already in use (git\n fixes (block drivers)).\n - dm: various cleanups to md->queue initialization code (git fixes).\n - dm verity fec: fix hash block number in verity_fec_decode (git fixes\n (block drivers)).\n - dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block\n drivers)).\n - dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n - driver-core, libnvdimm: Let device subsystems add local lockdep coverage\n (bsc#1171753)\n - Drivers: hv: Change flag to write log level in panic msg to false\n (bsc#1170617, bsc#1170618).\n - drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static\n (bsc#1051510).\n - drm: amd/display: fix Kconfig help text (bsc#1113956) * only fix\n DEBUG_KERNEL_DC\n - drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n - drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context\n changes\n - drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n - drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n - drm/i915/icl+: Fix hotplug interrupt disabling after storm detection\n (bsc#1112178)\n - drm/i915: Whitelist context-local timestamp in the gen9 cmdparser\n (bsc#1111666).\n - drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) *\n context changes\n - drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel\n (bsc#1111666).\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer\n S1003 (bsc#1111666).\n - drm/qxl: Use correct notify port address when creating cursor ring\n (bsc#1113956)\n - drm/radeon: fix double free (bsc#1113956)\n - drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n - drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n - drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n - drm/vkms: Hold gem object while still in-use (bsc#1113956) * context\n changes\n - e1000: Distribute switch variables for initialization (bsc#1111666).\n - e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n - e1000e: Do not wake up the system via WOL if device wakeup is disabled\n (bsc#1051510).\n - e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n - EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n - efi/memreserve: deal with memreserve entries in unmapped memory\n (bsc#1174685).\n - efi/random: Increase size of firmware supplied randomness\n (jsc#SLE-12423).\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness\n (jsc#SLE-12423).\n - efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n - efi: Reorder pr_notice() with add_device_randomness() call\n (jsc#SLE-12423).\n - evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n - evm: Fix a small race in init_desc() (bsc#1051510).\n - ext4: fix a data race at inode->i_blocks (bsc#1171835).\n - ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n - ext4: fix partial cluster initialization when splitting extent\n (bsc#1173839).\n - ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n - ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error\n handlers (bsc#1173833).\n - extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()'\n (bsc#1051510).\n - fanotify: fix ignore mask logic for events on child and on dir\n (bsc#1172719).\n - fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n - fdt: add support for rng-seed (jsc#SLE-12423).\n - fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n - firmware: imx: scu: Fix corruption of header (git-fixes).\n - firmware: imx: scu: Fix possible memory leak in imx_scu_probe()\n (bsc#1111666).\n - fix multiplication overflow in copy_fdtable() (bsc#1173825).\n - Fix Patch-mainline tag in the previous zram fix patch\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks\n (networking-stable-20_05_12).\n - gpiolib: Document that GPIO line names are not globally unique\n (bsc#1051510).\n - gpu: host1x: Detach driver on unregister (bsc#1111666).\n - gpu: ipu-v3: pre: do not trigger update if buffer address does not\n change (bsc#1111666).\n - HID: hiddev: fix mess in hiddev_open() (git-fixes).\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n - HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n - HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n - HISI LPC: Stop using MFD APIs (bsc#1174658).\n - hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).\n - hwmon: (acpi_power_meter) Fix potential memory leak in\n acpi_power_meter_add() (bsc#1111666).\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute\n (bsc#1111666).\n - hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n - i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665\n (bsc#1111666).\n - i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n - i2c: mlxcpld: check correct size of maximum RECV_LEN packet\n (bsc#1111666).\n - i40e: reduce stack usage in i40e_set_fc (git-fixes).\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down\n (bsc#1174409).\n - IB/hfi1: Do not destroy link_wq when the device is shut down\n (bsc#1174409).\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280\n ltc#185369).\n - ibmvnic: Flush existing work items before device removal (bsc#1065729).\n - ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n - iio: buffer: Do not allow buffers without any channels enabled to be\n activated (bsc#1051510).\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak\n (bsc#1111666).\n - iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n - iio:magnetometer:ak8974: Fix alignment and data leak issues\n (bsc#1111666).\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe()\n (bsc#1111666).\n - iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n - iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n - ima: Directly assign the ima_default_policy pointer to ima_rules\n (bsc#1051510).\n - ima: Fix ima digest hash table key calculation (bsc#1051510).\n - include/asm-generic/topology.h: guard cpumask_of_node() macro argument\n (bsc#1148868).\n - input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list\n (bsc#1111666).\n - input: i8042 - Remove special PowerPC handling (git-fixes).\n - input: synaptics - add a second working PNP_ID for Lenovo T470s\n (bsc#1111666).\n - intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n - intel_th: Fix a NULL dereference when hub driver is not loaded\n (bsc#1111666).\n - io-mapping: indicate mapping failure (git-fixes).\n - ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n - ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n - jbd2: avoid leaking transaction credits when unreserving handle\n (bsc#1173845).\n - jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n - kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n - kabi: ppc64le: prevent struct dma_map_ops to become defined\n (jsc#SLE-12423).\n - kABI: protect struct mlx5_cmd_work_ent (kabi).\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n - kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n - kvm: nVMX: Do not reread VMCS-agnostic state when switching VMCS\n (bsc#1114279).\n - kvm: nVMX: Skip IBPB when switching between vmcs01 and vmcs02\n (bsc#1114279).\n - kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n - kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n - kvm: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated\n (bsc#1171904).\n - kvm: x86: only do L1TF workaround on affected processors (bsc#1171904).\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n - libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n - libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n - lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n - lib: logic_pio: Avoid possible overlap for unregistering regions\n (bsc#1174658).\n - lib: logic_pio: Fix RCU usage (bsc#1174658).\n - libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock\n (bsc#1171753).\n - libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant\n (bsc#1171753).\n - libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over __nd_ioctl()\n (bsc#1171753).\n - libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n - libnvdimm/dax: Pick the right alignment default when creating dax\n devices (bsc#1171759).\n - libnvdimm/label: Remove the dpa align check (bsc#1171759).\n - libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n - libnvdimm/pfn_dev: Add a build check to make sure we notice when struct\n page size change (bsc#1171743).\n - libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock\n (bsc#1171759).\n - libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid\n (bsc#1171743).\n - libnvdimm/pmem: Advance namespace seed for specific probe errors\n (bsc#1171743).\n - libnvdimm/region: Initialize bad block for volatile namespaces\n (bnc#1151927 5.3.6).\n - libnvdimm/region: Rewrite _probe_success() to _advance_seeds()\n (bsc#1171743).\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n - livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n - livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n - livepatch: Prevent module-specific KLP rela sections from referencing\n vmlinux symbols (bsc#1071995).\n - livepatch: Remove .klp.arch (bsc#1071995).\n - loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n - lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n - lpfc: Synchronize NVME transport and lpfc driver devloss_tmo\n (bcs#1173060).\n - mac80211: add option for setting control flags (bsc#1111666).\n - mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX\n (bsc#1111666).\n - mailbox: imx: Disable the clock on devm_mbox_controller_register()\n failure (git-fixes).\n - md: Avoid namespace collision with bitmap API (git fixes (block\n drivers)).\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n - md: use memalloc scope APIs in mddev_suspend()/mddev_resume()\n (bsc#1166985)).\n - media: cec: silence shift wrapping warning in __cec_s_log_addrs()\n (git-fixes).\n - media: si2157: Better check for running tuner in init (bsc#1111666).\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue\n (git-fixes).\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n - mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly\n (networking-stable-20_05_12).\n - mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed\n (git-fixes).\n - mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n - mlxsw: spectrum: Prevent force of 56G (git-fixes).\n - mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead\n (git-fixes).\n - mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON()\n (git-fixes).\n - mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n - mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky\n (git-fixes).\n - mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n - mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n - mmc: fix compilation of user API (bsc#1051510).\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type\n (bsc#1111666).\n - mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk\n (bsc#1111666).\n - Move kabi patch into the right place\n - Move upstreamed lpfc patches into sorted section\n - mvpp2: remove misleading comment (git-fixes).\n - net: be more gentle about silly gso requests coming from user\n (networking-stable-20_06_07).\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n - net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n - net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n - net: dsa: mt7530: fix roaming from DSA user ports\n (networking-stable-20_05_27).\n - net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it\n (git-fixes).\n - net: ena: add missing ethtool TX timestamping indication (git-fixes).\n - net: ena: avoid memory access violation by validating req_id properly\n (git-fixes).\n - net: ena: do not wake up tx queue when down (git-fixes).\n - net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n - net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n - net: ena: fix continuous keep-alive resets (git-fixes).\n - net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n - net: ena: fix default tx interrupt moderation interval (git-fixes).\n - net: ena: fix incorrect default RSS key (git-fixes).\n - net: ena: fix incorrectly saving queue numbers when setting RSS\n indirection table (git-fixes).\n - net: ena: fix issues in setting interrupt moderation params in ethtool\n (git-fixes).\n - net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n - net: ena: fix retrieval of nonadaptive interrupt moderation intervals\n (git-fixes).\n - net: ena: fix uses of round_jiffies() (git-fixes).\n - net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n - net: ena: reimplement set/get_coalesce() (git-fixes).\n - net: ena: rss: do not allocate key when not supported (git-fixes).\n - net: ena: rss: fix failure to get indirection table (git-fixes).\n - net: ena: rss: store hash function as values and not bits (git-fixes).\n - netfilter: connlabels: prefer static lock initialiser (git-fixes).\n - netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n - netfilter: not mark a spinlock as __read_mostly (git-fixes).\n - net: fix a potential recursive NETDEV_FEAT_CHANGE\n (networking-stable-20_05_16).\n - net: hns3: add autoneg and change speed support for fibre port\n (bsc#1174070).\n - net: hns3: add support for FEC encoding control (bsc#1174070).\n - net: hns3: add support for multiple media type (bsc#1174070).\n - net: hns3: fix a not link up issue when fibre port supports autoneg\n (bsc#1174070).\n - net: hns3: fix for FEC configuration (bsc#1174070).\n - net: hns3: fix port capbility updating issue (bsc#1174070).\n - net: hns3: fix port setting handle for fibre port (bsc#1174070).\n - net: hns3: fix selftest fail issue for fibre port with autoneg on\n (bsc#1174070).\n - net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n - net: inet_csk: Fix so_reuseport bind-address cache in tb->fast*\n (networking-stable-20_05_27).\n - net: ipip: fix wrong address family in init error path\n (networking-stable-20_05_27).\n - net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set\n (git-fixes).\n - net: macsec: preserve ingress frame ordering\n (networking-stable-20_05_12).\n - net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n - net/mlx4_core: fix a memory leak bug (git-fixes).\n - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc()\n (networking-stable-20_05_12).\n - net/mlx5: Add command entry handling completion\n (networking-stable-20_05_27).\n - net/mlx5: Avoid panic when setting vport rate (git-fixes).\n - net/mlx5: Continue driver initialization despite debugfs failure\n (git-fixes).\n - net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n - net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n - net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n - net/mlx5e: Update netdev txq on completions during closure\n (networking-stable-20_05_27).\n - net/mlx5: Fix command entry leak in Internal Error State\n (networking-stable-20_05_12).\n - net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n - net/mlx5: Fix forced completion access non initialized command entry\n (networking-stable-20_05_12).\n - net: mvmdio: allow up to four clocks to be specified for orion-mdio\n (git-fixes).\n - net: mvpp2: prs: Do not override the sign bit in SRAM parser shift\n (git-fixes).\n - net: phy: fix aneg restart in phy_ethtool_set_eee\n (networking-stable-20_05_16).\n - netprio_cgroup: Fix unlimited memory leak of v2 cgroups\n (networking-stable-20_05_16).\n - net: qede: stop adding events on an already destroyed workqueue\n (git-fixes).\n - net: qed: fix excessive QM ILT lines consumption (git-fixes).\n - net: qed: fix NVMe login fails over VFs (git-fixes).\n - net: qrtr: Fix passing invalid reference to qrtr_local_enqueue()\n (networking-stable-20_05_27).\n - net: revert "net: get rid of an signed integer overflow in\n ip_idents_reserve()" (networking-stable-20_05_27).\n - net sched: fix reporting the first-time use timestamp\n (networking-stable-20_05_27).\n - net: stricter validation of untrusted gso packets\n (networking-stable-20_05_12).\n - net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict()\n (networking-stable-20_05_12).\n - net/tls: Fix sk_psock refcnt leak when in tls_data_ready()\n (networking-stable-20_05_12).\n - net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n - net: usb: qmi_wwan: add Telit 0x1050 composition\n (networking-stable-20_06_07).\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n - net: vmxnet3: fix possible buffer overflow caused by bad DMA value in\n vmxnet3_get_rss() (bsc#1172484).\n - nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n - NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid()\n (bsc#1170592).\n - NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n - nilfs2: fix null pointer dereference at nilfs_segctor_do_construct()\n (bsc#1173857).\n - nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n - nvdimm: Avoid race between probe and reading device attributes\n (bsc#1170442).\n - nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558\n bsc#1159058).\n - nvme: do not update multipath disk information if the controller is down\n (bcs#1171558 bsc#1159058).\n - nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983\n bsc#1172538).\n - nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983\n bsc#1172538).\n - nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed\n (bsc#1158983 bsc#1172538).\n - objtool: Clean instruction state before each function validation\n (bsc#1169514).\n - objtool: Ignore empty alternatives (bsc#1169514).\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n - ocfs2: load global_inode_alloc (bsc#1172963).\n - ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n - overflow: Fix -Wtype-limits compilation warnings (git fixes).\n - overflow.h: Add arithmetic shift helper (git fixes).\n - p54usb: add AirVasT USB stick device-id (bsc#1051510).\n - padata: ensure the reorder timer callback runs on the correct CPU\n (git-fixes).\n - padata: reorder work kABI fixup (git-fixes).\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership\n (bsc#1174356).\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n - PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n - PCI: Fix pci_register_host_bridge() device_register() error handling\n (bsc#1051510).\n - PCI: Fix "try" semantics of bus and slot reset (git-fixes).\n - PCI: Generalize multi-function power dependency device links\n (bsc#1111666).\n - PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871,\n bsc#1172872).\n - PCI: hv: Fix the PCI HyperV probe failure path to release resource\n properly (bsc#1172871, bsc#1172872).\n - PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n - PCI: hv: Move hypercall related definitions into tlfs header\n (bsc#1172871, bsc#1172872).\n - PCI: hv: Move retarget related structures into tlfs header (bsc#1172871,\n bsc#1172872).\n - PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871,\n bsc#1172872).\n - PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871,\n bsc#1172872).\n - PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n - PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n - PCI: Program MPS for RCiEP devices (bsc#1051510).\n - PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port\n (bsc#1051510).\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n - pcm_native: result of put_user() needs to be checked (bsc#1111666).\n - perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n - perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus\n precise RIP validity (git-fixes).\n - perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n - perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family\n (10h) (git-fixes).\n - perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static\n (git-fixes).\n - perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3\n PMCs (git-fixes stable).\n - perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n - perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf\n events (git-fixes stable).\n - perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n - perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n - perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts()\n (git-fixes).\n - perf/x86/intel: Add proper condition to run sched_task callbacks\n (git-fixes).\n - perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n - perf/x86/intel: Fix PT PMI handling (git-fixes).\n - perf/x86/intel: Move branch tracing setup to the Intel-specific source\n file (git-fixes).\n - perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n - perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n - perf/x86/intel/uncore: Handle invalid event coding for free-running\n counter (git-fixes).\n - perf/x86/uncore: Fix event group support (git-fixes).\n - pid: Improve the comment about waiting in zap_pid_ns_processes (git\n fixes)).\n - pinctrl: freescale: imx: Fix an error handling path in\n 'imx_pinctrl_probe()' (bsc#1051510).\n - pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()'\n (bsc#1051510).\n - pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE\n GPIOs (bsc#1051510).\n - platform/x86: dell-laptop: do not register micmute LED if there is no\n token (bsc#1111666).\n - platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32()\n (bsc#1111666).\n - PM / Domains: Allow genpd users to specify default active wakeup\n behavior (git-fixes).\n - pnp: Use list_for_each_entry() instead of open coding (git fixes).\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n - powerpc/64s: Save FSCR to init_task.thread.fscr after feature init\n (bsc#1065729).\n - powerpc/book3s64: Export has_transparent_hugepage() related functions\n (bsc#1171759).\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable\n pkey (bsc#1065729).\n - powerpc/fadump: fix race between pstore write and fadump crash trigger\n (bsc#1168959 ltc#185010).\n - powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.patch\n - powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n - powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n - power: supply: bq24257_charger: Replace depends on REGMAP_I2C with\n select (bsc#1051510).\n - power: supply: lp8788: Fix an error handling path in\n 'lp8788_charger_probe()' (bsc#1051510).\n - power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n - power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n - pppoe: only process PADT targeted at local interfaces\n (networking-stable-20_05_16).\n - propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n - qed: reduce maximum stack frame size (git-fixes).\n - qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n - r8152: support additional Microsoft Surface Ethernet Adapter variant\n (networking-stable-20_05_27).\n - raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n - RDMA/efa: Fix setting of wrong bit in get/set_feature commands\n (bsc#1111666)\n - RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n - RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n - RDMA/efa: Unified getters/setters for device structs bitmask access\n (bsc#1111666)\n - README.BRANCH: Add Takashi Iwai as primary maintainer.\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps\n (bsc#1111666).\n - Revert "bcache: ignore pending signals when creating gc and allocator\n thread" (git fixes (block drivers)).\n - Revert commit e918e570415c ("tpm_tis: Remove the HID IFX0102")\n (bsc#1111666).\n - Revert "dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues" (git\n fixes (block drivers)).\n - Revert "ipv6: add mtu lock check in __ip6_rt_update_pmtu"\n (networking-stable-20_05_16).\n - Revert pciehp patches that broke booting (bsc#1174887)\n - Revert "thermal: mediatek: fix register index error" (bsc#1111666).\n - Revert "tools lib traceevent: Remove unneeded qsort and uses memmove"\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n - s390: fix syscall_get_error for compat processes (git-fixes).\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n - s390/qdio: lock device while installing IRQ handler (git-fixes).\n - s390/qdio: put thinint indicator after early error (git-fixes).\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n - sch_choke: avoid potential panic in choke_reset()\n (networking-stable-20_05_12).\n - sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n - scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n - scsi: aacraid: fix a signedness bug (bsc#1174296).\n - scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n - scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM\n (bsc#1172759 ltc#184814).\n - scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Add support to display if adapter dumps are available\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Allow applications to issue Common Set Features mailbox\n command (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset()\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n - scsi: lpfc: Fix interrupt assignments when multiple vectors are\n supported on same CPU (bsc#1158983).\n - scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix language in 0373 message to reflect non-error message\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix less-than-zero comparison of unsigned value\n (bsc#1158983).\n - scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix NVMe rport deregister and registration during ADISC\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687\n bsc#1171530).\n - scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test\n (bsc#1172687 bsc#1171530).\n - scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n - scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n - scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n - scsi: qedf: Add port_id getter (bsc#1150660).\n - scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs()\n (bsc#1174296).\n - scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request\n (bsc#1158983).\n - sctp: Do not add the shutdown timer if its already been added\n (networking-stable-20_05_27).\n - sctp: Start shutdown on association restart if in SHUTDOWN-SENT state\n and socket is closed (networking-stable-20_05_27).\n - spi: dw: use "smp_mb()" to avoid sending spi data error (bsc#1051510).\n - spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n - spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n - spi: spidev: fix a race between spidev_release and spidev_remove\n (bsc#1111666).\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate\n (bsc#1111666).\n - staging: comedi: verify array index is correct before using it\n (bsc#1111666).\n - staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n - staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n - SUNRPC: The TCP back channel mustn't disappear while requests are\n outstanding (bsc#1152624).\n - tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes\n (bsc#1173284).\n - timers: Add a function to start/reduce a timer\n (networking-stable-20_05_27).\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init\n (bsc#1111666).\n - tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n - tracing: Fix event trigger to accept redundant spaces (git-fixes).\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n - tty: n_gsm: Fix SOF skipping (bsc#1051510).\n - tty: n_gsm: Fix waking up upper tty layer when room available\n (bsc#1051510).\n - tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040\n (networking-stable-20_05_12).\n - ubifs: remove broken lazytime support (bsc#1173826).\n - usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n - usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n - usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n - usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n - usb: dwc2: gadget: move gadget resume after the core is in L0 state\n (bsc#1051510).\n - usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n - usb: dwc3: gadget: never call ->complete() from ->ep_queue() (git-fixes).\n - usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n - usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n - usb: ehci: reopen solution for Synopsys HC bug (git-fixes).\n - usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer before null\n check (bsc#1051510).\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk\n (bsc#1111666).\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable()\n (bsc#1111666).\n - usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in\n s3c2410_udc_nuke (bsc#1051510).\n - usb: host: ehci-exynos: Fix error check in exynos_ehci_probe()\n (bsc#1111666).\n - usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe()\n (bsc#1051510).\n - usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n - usb: musb: start session in resume for host port (bsc#1051510).\n - usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n - usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n - usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n - usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n - usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n - usb: serial: option: add GosunCn GM500 series (bsc#1111666).\n - usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n - usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n - usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors\n (bsc#1051510).\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors\n (git-fixes).\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n - vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n - virtio-blk: handle block_device_operations callbacks after hot unplug\n (git fixes (block drivers)).\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc\n serial (git-fixes).\n - vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n - vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n - vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n - vmxnet3: avoid format strint overflow warning (bsc#1172484).\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n - vmxnet3: Remove always false conditional statement (bsc#1172484).\n - vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).\n - vmxnet3: remove unused flag "rxcsum" from struct vmxnet3_adapter\n (bsc#1172484).\n - vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n - vmxnet3: update to version 4 (bsc#1172484).\n - vmxnet3: use correct hdr reference when packet is encapsulated\n (bsc#1172484).\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n - vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid\n options (git-fixes).\n - w1: omap-hdq: cleanup to add missing newline for some dev_dbg\n (bsc#1051510).\n - watchdog: sp805: fix restart handler (bsc#1111666).\n - wil6210: add general initialization/size checks (bsc#1111666).\n - wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n - wil6210: ignore HALP ICR if already handled (bsc#1111666).\n - wil6210: make sure Rx ring sizes are correlated (git-fixes).\n - work around mvfs bug (bsc#1162063).\n - x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n - x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n - x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS\n (git-fixes).\n - x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n - x86/{mce,mm}: Unmap the entire page if the whole page is affected and\n poisoned (bsc#1172257).\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n - xfrm: fix error in comment (git fixes).\n - xhci: Fix enumeration issue when setting max packet size for FS devices\n (git-fixes).\n - xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n - vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).\n\n", "edition": 1, "modified": "2020-08-06T18:13:16", "published": "2020-08-06T18:13:16", "id": "OPENSUSE-SU-2020:1153-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00009.html", "title": "Security update for the Linux Kernel (important)", "type": "suse", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-13T11:22:32", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10711", "CVE-2020-12659", "CVE-2019-19462", "CVE-2020-12114", "CVE-2020-12769", "CVE-2020-12656", "CVE-2018-1000199", "CVE-2020-11609", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10690", "CVE-2020-12654", "CVE-2019-20806", "CVE-2019-20812", "CVE-2019-9455", "CVE-2020-12653", "CVE-2020-11608", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-12652", "CVE-2020-10757", "CVE-2020-12655", "CVE-2020-12657"], "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2020-0543: Fixed a side channel attack against special registers\n which could have resulted in leaking of read values to cores other than\n the one which called it. This attack is known as Special Register Buffer\n Data Sampling (SRBDS) or "CrossTalk" (bsc#1154824).\n - CVE-2018-1000199: Fixed a potential local code execution via ptrace\n (bsc#1089895).\n - CVE-2019-19462: relay_open in kernel/relay.c allowed local users to\n cause a denial of service (such as relay blockage) by triggering a NULL\n alloc_percpu result (bnc#1158265).\n - CVE-2019-20806: Fixed a null pointer dereference in\n tw5864_handle_frame() which may had lead to denial of service\n (bsc#1172199).\n - CVE-2019-20812: The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU\n consumption and soft lockup) in a certain failure case involving\n TPACKET_V3, aka CID-b43d1f9f7067 (bnc#1172453).\n - CVE-2019-9455: Fixed a pointer leak due to a WARN_ON statement in a\n video driver. This could lead to local information disclosure with\n System execution privileges needed (bsc#1170345).\n - CVE-2020-10690: Fixed the race between the release of ptp_clock and cdev\n (bsc#1170056).\n - CVE-2020-10711: Fixed a null pointer dereference in SELinux subsystem\n which could have allowed a remote network user to crash the kernel\n resulting in a denial of service (bsc#1171191).\n - CVE-2020-10720: Fixed a use-after-free read in napi_gro_frags()\n (bsc#1170778).\n - CVE-2020-10732: Fixed kernel data leak in userspace coredumps due to\n uninitialized data (bsc#1171220).\n - CVE-2020-10751: Fixed an improper implementation in SELinux LSM hook\n where it was assumed that an skb would only contain a single netlink\n message (bsc#1171189).\n - CVE-2020-10757: Fixed an issue where remaping hugepage DAX to anon mmap\n could have caused user PTE access (bsc#1172317).\n - CVE-2020-11608: An issue was discovered in\n drivers/media/usb/gspca/ov519.c that allowed NULL pointer dereferences\n in ov511_mode_init_regs and ov518_mode_init_regs when there are zero\n endpoints, aka CID-998912346c0d (bnc#1168829).\n - CVE-2020-11609: An issue was discovered in the stv06xx subsystem in\n drivers/media/usb/gspca/stv06xx/stv06xx.c and\n drivers/media/usb/gspca/stv06xx/stv06xx_pb0100.c mishandle invalid\n descriptors, as demonstrated by a NULL pointer dereference, aka\n CID-485b06aadb93 (bnc#1168854).\n - CVE-2020-12114: Fixed a pivot_root race condition which could have\n allowed local users to cause a denial of service (panic) by corrupting a\n mountpoint reference counter (bsc#1171098).\n - CVE-2020-12464: Fixed a use-after-free due to a transfer without a\n reference (bsc#1170901).\n - CVE-2020-12652: Fixed an issue which could have allowed local users to\n hold an incorrect lock during the ioctl operation and trigger a race\n condition (bsc#1171218).\n - CVE-2020-12653: Fixed an issue in the wifi driver which could have\n allowed local users to gain privileges or cause a denial of service\n (bsc#1171195).\n - CVE-2020-12654: Fixed an issue in he wifi driver which could have\n allowed a remote AP to trigger a heap-based buffer overflow\n (bsc#1171202).\n - CVE-2020-12655: Fixed an issue which could have allowed attackers to\n trigger a sync of excessive duration via an XFS v5 image with crafted\n metadata (bsc#1171217).\n - CVE-2020-12656: Fixed an improper handling of certain domain_release\n calls leadingch could have led to a memory leak (bsc#1171219).\n - CVE-2020-12657: An a use-after-free in block/bfq-iosched.c (bsc#1171205).\n - CVE-2020-12659: Fixed an out-of-bounds write (by a user with the\n CAP_NET_ADMIN capability) due to improper headroom validation\n (bsc#1171214).\n - CVE-2020-12769: Fixed an issue which could have allowed attackers to\n cause a panic via concurrent calls to dw_spi_irq and dw_spi_transfer_one\n (bsc#1171983).\n - CVE-2020-13143: Fixed an out-of-bounds read in gadget_dev_desc_UDC_store\n in drivers/usb/gadget/configfs.c (bsc#1171982).\n\n The following non-security bugs were fixed:\n\n - ACPI: CPPC: Fix reference count leak in acpi_cppc_processor_probe()\n (bsc#1051510).\n - ACPI: sysfs: Fix reference count leak in\n acpi_sysfs_add_hotplug_profile() (bsc#1051510).\n - acpi/x86: ignore unspecified bit positions in the ACPI global lock field\n (bsc#1051510).\n - Add br_netfilter to kernel-default-base (bsc#1169020)\n - agp/intel: Reinforce the barrier after GTT updates (bsc#1051510).\n - ALSA: ctxfi: Remove unnecessary cast in kfree (bsc#1051510).\n - ALSA: doc: Document PC Beep Hidden Register on Realtek ALC256\n (bsc#1051510).\n - ALSA: dummy: Fix PCM format loop in proc output (bsc#1111666).\n - ALSA: hda: Add driver blacklist (bsc#1051510).\n - ALSA: hda: Always use jackpoll helper for jack update after resume\n (bsc#1051510).\n - ALSA: hda: call runtime_allow() for all hda controllers (bsc#1051510).\n - ALSA: hda: Do not release card at firmware loading error (bsc#1051510).\n - ALSA: hda: Explicitly permit using autosuspend if runtime PM is\n supported (bsc#1051510).\n - ALSA: hda/hdmi: fix race in monitor detection during probe (bsc#1051510).\n - ALSA: hda/hdmi: fix without unlocked before return (bsc#1051510).\n - ALSA: hda: Honor PM disablement in PM freeze and thaw_noirq ops\n (bsc#1051510).\n - ALSA: hda: Keep the controller initialization even if no codecs found\n (bsc#1051510).\n - ALSA: hda: Match both PCI ID and SSID for driver blacklist (bsc#1111666).\n - ALSA: hda/realtek - Add a model for Thinkpad T570 without DAC workaround\n (bsc#1172017).\n - ALSA: hda/realtek - Add COEF workaround for ASUS ZenBook UX431DA\n (git-fixes).\n - ALSA: hda/realtek - Add HP new mute led supported for ALC236 (git-fixes).\n - ALSA: hda/realtek - Add more fixup entries for Clevo machines\n (git-fixes).\n - ALSA: hda/realtek - Add new codec supported for ALC245 (bsc#1051510).\n - ALSA: hda/realtek - Add new codec supported for ALC287 (git-fixes).\n - ALSA: hda/realtek: Add quirk for Samsung Notebook (git-fixes).\n - ALSA: hda/realtek - Add supported new mute Led for HP (git-fixes).\n - ALSA: hda/realtek - Enable headset mic of ASUS GL503VM with ALC295\n (git-fixes).\n - ALSA: hda/realtek - Enable headset mic of ASUS UX550GE with ALC295\n (git-fixes).\n - ALSA: hda/realtek: Enable headset mic of ASUS UX581LV with ALC295\n (git-fixes).\n - ALSA: hda/realtek - Enable the headset mic on Asus FX505DT (bsc#1051510).\n - ALSA: hda/realtek - Fix S3 pop noise on Dell Wyse (git-fixes).\n - ALSA: hda/realtek - Fix silent output on Gigabyte X570 Aorus Xtreme\n (bsc#1111666).\n - ALSA: hda/realtek - Fix unexpected init_amp override (bsc#1051510).\n - ALSA: hda/realtek - Limit int mic boost for Thinkpad T530 (git-fixes\n bsc#1171293).\n - ALSA: hda/realtek - Two front mics on a Lenovo ThinkCenter (bsc#1051510).\n - ALSA: hda: Release resources at error in delayed probe (bsc#1051510).\n - ALSA: hda: Remove ASUS ROG Zenith from the blacklist (bsc#1051510).\n - ALSA: hda: Skip controller resume if not needed (bsc#1051510).\n - ALSA: hwdep: fix a left shifting 1 by 31 UB bug (git-fixes).\n - ALSA: iec1712: Initialize STDSP24 properly when using the model=staudio\n option (git-fixes).\n - ALSA: opti9xx: shut up gcc-10 range warning (bsc#1051510).\n - ALSA: pcm: fix incorrect hw_base increase (git-fixes).\n - ALSA: pcm: oss: Place the plugin buffer overflow checks correctly\n (bsc#1170522).\n - ALSA: rawmidi: Fix racy buffer resize under concurrent accesses\n (git-fixes).\n - ALSA: usb-audio: Add connector notifier delegation (bsc#1051510).\n - ALSA: usb-audio: Add control message quirk delay for Kingston HyperX\n headset (git-fixes).\n - ALSA: usb-audio: add mapping for ASRock TRX40 Creator (git-fixes).\n - ALSA: usb-audio: Add mixer workaround for TRX40 and co (bsc#1051510).\n - ALSA: usb-audio: Add quirk for Focusrite Scarlett 2i2 (bsc#1051510).\n - ALSA: usb-audio: Add static mapping table for ALC1220-VB-based mobos\n (bsc#1051510).\n - ALSA: usb-audio: Apply async workaround for Scarlett 2i4 2nd gen\n (bsc#1051510).\n - ALSA: usb-audio: Check mapping at creating connector controls, too\n (bsc#1051510).\n - ALSA: usb-audio: Correct a typo of NuPrime DAC-10 USB ID (bsc#1051510).\n - ALSA: usb-audio: Do not create jack controls for PCM terminals\n (bsc#1051510).\n - ALSA: usb-audio: Do not override ignore_ctl_error value from the map\n (bsc#1051510).\n - ALSA: usb-audio: Filter error from connector kctl ops, too (bsc#1051510).\n - ALSA: usb-audio: Fix usb audio refcnt leak when getting spdif\n (bsc#1051510).\n - ALSA: usb-audio: mixer: volume quirk for ESS Technology Asus USB DAC\n (git-fixes).\n - ALSA: usb-audio: Quirks for Gigabyte TRX40 Aorus Master onboard audio\n (git-fixes).\n - ALSA: usx2y: Fix potential NULL dereference (bsc#1051510).\n - ASoC: codecs: hdac_hdmi: Fix incorrect use of list_for_each_entry\n (bsc#1051510).\n - ASoC: dapm: connect virtual mux with default value (bsc#1051510).\n - ASoC: dapm: fixup dapm kcontrol widget (bsc#1051510).\n - ASoC: dpcm: allow start or stop during pause for backend (bsc#1051510).\n - ASoC: fix regwmask (bsc#1051510).\n - ASoC: msm8916-wcd-digital: Reset RX interpolation path after use\n (bsc#1051510).\n - ASoC: samsung: Prevent clk_get_rate() calls in atomic context\n (bsc#1111666).\n - ASoC: topology: Check return value of pcm_new_ver (bsc#1051510).\n - ASoC: topology: use name_prefix for new kcontrol (bsc#1051510).\n - b43legacy: Fix case where channel status is corrupted (bsc#1051510).\n - batman-adv: fix batadv_nc_random_weight_tq (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_show_throughput_override\n (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_store_throughput_override\n (git-fixes).\n - batman-adv: Fix refcnt leak in batadv_v_ogm_process (git-fixes).\n - bcache: avoid unnecessary btree nodes flushing in btree_flush_write()\n (git fixes (block drivers)).\n - bcache: fix incorrect data type usage in btree_flush_write() (git fixes\n (block drivers)).\n - bcache: Revert "bcache: shrink btree node cache after bch_btree_check()"\n (git fixes (block drivers)).\n - blk-mq: honor IO scheduler for multiqueue devices (bsc#1165478).\n - blk-mq: simplify blk_mq_make_request() (bsc#1165478).\n - block/drbd: delete invalid function drbd_md_mark_dirty_ (bsc#1171527).\n - block: drbd: remove a stray unlock in __drbd_send_protocol()\n (bsc#1171599).\n - block: fix busy device checking in blk_drop_partitions again\n (bsc#1171948).\n - block: fix busy device checking in blk_drop_partitions (bsc#1171948).\n - block: fix memleak of bio integrity data (git fixes (block drivers)).\n - block: remove the bd_openers checks in blk_drop_partitions (bsc#1171948).\n - bnxt_en: fix memory leaks in bnxt_dcbnl_ieee_getets()\n (networking-stable-20_03_28).\n - bnxt_en: Reduce BNXT_MSIX_VEC_MAX value to supported CQs per PF\n (bsc#1104745).\n - bnxt_en: reinitialize IRQs when MTU is modified\n (networking-stable-20_03_14).\n - bnxt_en: Return error if bnxt_alloc_ctx_mem() fails (bsc#1104745 ).\n - bnxt_en: Return error when allocating zero size context memory\n (bsc#1104745).\n - bonding/alb: make sure arp header is pulled before accessing it\n (networking-stable-20_03_14).\n - bpf: Fix sk_psock refcnt leak when receiving message (bsc#1083647).\n - bpf: Forbid XADD on spilled pointers for unprivileged users\n (bsc#1083647).\n - brcmfmac: abort and release host after error (bsc#1051510).\n - btrfs: fix deadlock with memory reclaim during scrub (bsc#1172127).\n - btrfs: fix log context list corruption after rename whiteout error\n (bsc#1172342).\n - btrfs: fix partial loss of prealloc extent past i_size after fsync\n (bsc#1172343).\n - btrfs: relocation: add error injection points for cancelling balance\n (bsc#1171417).\n - btrfs: relocation: Check cancel request after each data page read\n (bsc#1171417).\n - btrfs: relocation: Check cancel request after each extent found\n (bsc#1171417).\n - btrfs: relocation: Clear the DEAD_RELOC_TREE bit for orphan roots to\n prevent runaway balance (bsc#1171417).\n - btrfs: relocation: Fix reloc root leakage and the NULL pointer reference\n caused by the leakage (bsc#1171417).\n - btrfs: relocation: Work around dead relocation stage loop (bsc#1171417).\n - btrfs: reloc: clear DEAD_RELOC_TREE bit for orphan roots to prevent\n runaway balance (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: reloc: fix reloc root leak and NULL pointer dereference\n (bsc#1171417 bsc#1160947 bsc#1172366).\n - btrfs: setup a nofs context for memory allocation at btrfs_create_tree()\n (bsc#1172127).\n - btrfs: setup a nofs context for memory allocation at __btrfs_set_acl\n (bsc#1172127).\n - btrfs: use nofs context when initializing security xattrs to avoid\n deadlock (bsc#1172127).\n - can: add missing attribute validation for termination\n (networking-stable-20_03_14).\n - cdc-acm: close race betrween suspend() and acm_softint (git-fixes).\n - cdc-acm: introduce a cool down (git-fixes).\n - ceph: check if file lock exists before sending unlock request\n (bsc#1168789).\n - ceph: demote quotarealm lookup warning to a debug message (bsc#1171692).\n - ceph: fix double unlock in handle_cap_export() (bsc#1171694).\n - ceph: fix endianness bug when handling MDS session feature bits\n (bsc#1171695).\n - cgroup, netclassid: periodically release file_lock on classid updating\n (networking-stable-20_03_14).\n - cifs: Allocate crypto structures on the fly for calculating signatures\n of incoming packets (bsc#1144333).\n - cifs: Allocate encryption header through kmalloc (bsc#1144333).\n - cifs: allow unlock flock and OFD lock across fork (bsc#1144333).\n - cifs: check new file size when extending file by fallocate (bsc#1144333).\n - cifs: cifspdu.h: Replace zero-length array with flexible-array member\n (bsc#1144333).\n - cifs: clear PF_MEMALLOC before exiting demultiplex thread (bsc#1144333).\n - cifs: do not share tcons with DFS (bsc#1144333).\n - cifs: dump the session id and keys also for SMB2 sessions (bsc#1144333).\n - cifs: ensure correct super block for DFS reconnect (bsc#1144333).\n - cifs: Fix bug which the return value by asynchronous read is error\n (bsc#1144333).\n - cifs: fix uninitialised lease_key in open_shroot() (bsc#1144333).\n - cifs: improve read performance for page size 64KB & cache=strict &\n vers=2.1+ (bsc#1144333).\n - cifs: Increment num_remote_opens stats counter even in case of\n smb2_query_dir_first (bsc#1144333).\n - cifs: minor update to comments around the cifs_tcp_ses_lock mutex\n (bsc#1144333).\n - cifs: protect updating server->dstaddr with a spinlock (bsc#1144333).\n - cifs: smb2pdu.h: Replace zero-length array with flexible-array member\n (bsc#1144333).\n - cifs: smbd: Calculate the correct maximum packet size for segmented\n SMBDirect send/receive (bsc#1144333).\n - cifs: smbd: Check and extend sender credits in interrupt context\n (bsc#1144333).\n - cifs: smbd: Check send queue size before posting a send (bsc#1144333).\n - cifs: smbd: Do not schedule work to send immediate packet on every\n receive (bsc#1144333).\n - cifs: smbd: Merge code to track pending packets (bsc#1144333).\n - cifs: smbd: Properly process errors on ib_post_send (bsc#1144333).\n - cifs: smbd: Update receive credits before sending and deal with credits\n roll back on failure before sending (bsc#1144333).\n - cifs: Warn less noisily on default mount (bsc#1144333).\n - clk: Add clk_hw_unregister_composite helper function definition\n (bsc#1051510).\n - clk: imx6ull: use OSC clock during AXI rate change (bsc#1051510).\n - clk: imx: make mux parent strings const (bsc#1051510).\n - clk: mediatek: correct the clocks for MT2701 HDMI PHY module\n (bsc#1051510).\n - clk: sunxi-ng: a64: Fix gate bit of DSI DPHY (bsc#1051510).\n - clocksource/drivers/hyper-v: Set TSC clocksource as default w/\n InvariantTSC (bsc#1170620, bsc#1170621).\n - clocksource: dw_apb_timer_of: Fix missing clockevent timers\n (bsc#1051510).\n - component: Silence bind error on -EPROBE_DEFER (bsc#1051510).\n - coresight: do not use the BIT() macro in the UAPI header (git fixes\n (block drivers)).\n - cpufreq: s3c64xx: Remove pointless NULL check in\n s3c64xx_cpufreq_driver_init (bsc#1051510).\n - crypto: ccp - AES CFB mode is a stream cipher (git-fixes).\n - crypto: ccp - Clean up and exit correctly on allocation failure\n (git-fixes).\n - crypto: ccp - Cleanup misc_dev on sev_exit() (bsc#1114279).\n - crypto: ccp - Cleanup sp_dev_master in psp_dev_destroy() (bsc#1114279).\n - cxgb4: fix MPS index overwrite when setting MAC address (bsc#1127355).\n - cxgb4: fix Txq restart check during backpressure (bsc#1127354\n bsc#1127371).\n - debugfs: Add debugfs_create_xul() for hexadecimal unsigned long\n (git-fixes).\n - debugfs_lookup(): switch to lookup_one_len_unlocked() (bsc#1171979).\n - devlink: fix return value after hitting end in region read (bsc#1109837).\n - devlink: validate length of param values (bsc#1109837).\n - devlink: validate length of region addr/len (bsc#1109837).\n - dmaengine: dmatest: Fix iteration non-stop logic (bsc#1051510).\n - dm mpath: switch paths in dm_blk_ioctl() code path (bsc#1167574).\n - dm-raid1: fix invalid return value from dm_mirror (bsc#1172378).\n - dm writecache: fix data corruption when reloading the target (git fixes\n (block drivers)).\n - dm writecache: fix incorrect flush sequence when doing SSD mode commit\n (git fixes (block drivers)).\n - dm writecache: verify watermark during resume (git fixes (block\n drivers)).\n - dm zoned: fix invalid memory access (git fixes (block drivers)).\n - dm zoned: reduce overhead of backing device checks (git fixes (block\n drivers)).\n - dm zoned: remove duplicate nr_rnd_zones increase in dmz_init_zone() (git\n fixes (block drivers)).\n - dm zoned: support zone sizes smaller than 128MiB (git fixes (block\n drivers)).\n - dp83640: reverse arguments to list_add_tail (git-fixes).\n - drivers: hv: Add a module description line to the hv_vmbus driver\n (bsc#1172249, bsc#1172251).\n - drivers/net/ibmvnic: Update VNIC protocol version reporting\n (bsc#1065729).\n - drivers: w1: add hwmon support structures (jsc#SLE-11048).\n - drivers: w1: add hwmon temp support for w1_therm (jsc#SLE-11048).\n - drivers: w1: refactor w1_slave_show to make the temp reading\n functionality separate (jsc#SLE-11048).\n - drm: amd/acp: fix broken menu structure (bsc#1114279)\n - drm/amdgpu: Correctly initialize thermal controller for GPUs with\n Powerplay table v0 (e.g Hawaii) (bsc#1111666).\n - drm/amdgpu: Fix oops when pp_funcs is unset in ACPI event (bsc#1111666).\n - drm/amd/powerplay: force the trim of the mclk dpm_levels if OD is\n (bsc#1113956)\n - drm/atomic: Take the atomic toys away from X (bsc#1112178) * \ncontext\n changes\n - drm/crc: Actually allow to change the crc source (bsc#1114279) * offset\n changes\n - drm/dp_mst: Fix clearing payload state on topology disable (bsc#1051510).\n - drm/dp_mst: Reformat drm_dp_check_act_status() a bit (bsc#1051510).\n - drm/edid: Fix off-by-one in DispID DTD pixel clock (bsc#1114279)\n - drm/etnaviv: fix perfmon domain interation (bsc#1113956)\n - drm/etnaviv: rework perfmon query infrastructure (bsc#1112178)\n - drm/i915: Apply Wa_1406680159:icl,ehl as an engine workaround\n (bsc#1112178)\n - drm/i915/gvt: Init DPLL/DDI vreg for virtual display instead of\n (bsc#1114279)\n - drm/i915: HDCP: fix Ri prime check done during link check (bsc#1112178)\n - drm/i915: properly sanity check batch_start_offset (bsc#1114279)\n - drm/meson: Delete an error message in meson_dw_hdmi_bind() (bsc#1051510).\n - drm: NULL pointer dereference [null-pointer-deref] (CWE 476) problem\n (bsc#1114279)\n - drm/qxl: qxl_release leak in qxl_draw_dirty_fb() (bsc#1051510).\n - drm/qxl: qxl_release leak in qxl_hw_surface_alloc() (bsc#1051510).\n - drm/qxl: qxl_release use after free (bsc#1051510).\n - drm: Remove PageReserved manipulation from drm_pci_alloc (bsc#1114279)\n - drm/sun4i: dsi: Allow binding the host without a panel (bsc#1113956)\n - drm/sun4i: dsi: Avoid hotplug race with DRM driver bind (bsc#1113956)\n - drm/sun4i: dsi: Remove incorrect use of runtime PM (bsc#1113956)\n - drm/sun4i: dsi: Remove unused drv from driver context (bsc#1113956)\n - dump_stack: avoid the livelock of the dump_lock (git fixes (block\n drivers)).\n - EDAC, sb_edac: Add support for systems with segmented PCI buses\n (bsc#1169525).\n - ext4: do not zeroout extents beyond i_disksize (bsc#1167851).\n - ext4: fix extent_status fragmentation for plain files (bsc#1171949).\n - ext4: use non-movable memory for superblock readahead (bsc#1171952).\n - fanotify: fix merging marks masks with FAN_ONDIR (bsc#1171679).\n - fbcon: fix null-ptr-deref in fbcon_switch (bsc#1114279)\n - fib: add missing attribute validation for tun_id\n (networking-stable-20_03_14).\n - firmware: qcom: scm: fix compilation error when disabled (bsc#1051510).\n - Fix a backport bug, where btrfs_put_root() -> btrfs_put_fs_root()\n modification is not needed due to missing dependency\n - Following two patches needs to be combined as one commit (one adds\n context, later removes which affects existing patch) else commit series\n cannot be sequenced.\n - fpga: dfl: afu: Corrected error handling levels (git-fixes).\n - fs/cifs: fix gcc warning in sid_to_id (bsc#1144333).\n - fs/seq_file.c: simplify seq_file iteration code and interface\n (bsc#1170125).\n - gpio: tegra: mask GPIO IRQs during IRQ shutdown (bsc#1051510).\n - gre: fix uninit-value in __iptunnel_pull_header\n (networking-stable-20_03_14).\n - HID: hid-input: clear unmapped usages (git-fixes).\n - HID: hyperv: Add a module description line (bsc#1172249, bsc#1172251).\n - HID: i2c-hid: add Trekstor Primebook C11B to descriptor override\n (git-fixes).\n - HID: i2c-hid: override HID descriptors for certain devices (git-fixes).\n - HID: multitouch: add eGalaxTouch P80H84 support (bsc#1051510).\n - HID: wacom: Read HID_DG_CONTACTMAX directly for non-generic devices\n (git-fixes).\n - hrtimer: Annotate lockless access to timer->state (git fixes (block\n drivers)).\n - hsr: add restart routine into hsr_get_node_list()\n (networking-stable-20_03_28).\n - hsr: check protocol version in hsr_newlink()\n (networking-stable-20_04_17).\n - hsr: fix general protection fault in hsr_addr_is_self()\n (networking-stable-20_03_28).\n - hsr: set .netnsok flag (networking-stable-20_03_28).\n - hsr: use rcu_read_lock() in hsr_get_node_{list/status}()\n (networking-stable-20_03_28).\n - i2c: acpi: Force bus speed to 400KHz if a Silead touchscreen is present\n (git-fixes).\n - i2c: acpi: put device when verifying client fails (git-fixes).\n - i2c: brcmstb: remove unused struct member (git-fixes).\n - i2c: core: Allow empty id_table in ACPI case as well (git-fixes).\n - i2c: core: decrease reference count of device node in\n i2c_unregister_device (git-fixes).\n - i2c: dev: Fix the race between the release of i2c_dev and cdev\n (bsc#1051510).\n - i2c: fix missing pm_runtime_put_sync in i2c_device_probe (git-fixes).\n - i2c-hid: properly terminate i2c_hid_dmi_desc_override_table array\n (git-fixes).\n - i2c: i801: Do not add ICH_RES_IO_SMI for the iTCO_wdt device (git-fixes).\n - i2c: iproc: Stop advertising support of SMBUS quick cmd (git-fixes).\n - i2c: isch: Remove unnecessary acpi.h include (git-fixes).\n - i2c: mux: demux-pinctrl: Fix an error handling path in\n 'i2c_demux_pinctrl_probe()' (bsc#1051510).\n - i2c: st: fix missing struct parameter description (bsc#1051510).\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device\n (bsc#1103991).\n - ibmvnic: Skip fatal error reset after passive init (bsc#1171078\n ltc#184239).\n - iio:ad7797: Use correct attribute_group (bsc#1051510).\n - iio: adc: stm32-adc: fix device used to request dma (bsc#1051510).\n - iio: adc: stm32-adc: fix sleep in atomic context (git-fixes).\n - iio: adc: stm32-adc: Use dma_request_chan() instead\n dma_request_slave_channel() (bsc#1051510).\n - iio: dac: vf610: Fix an error handling path in 'vf610_dac_probe()'\n (bsc#1051510).\n - iio: sca3000: Remove an erroneous 'get_device()' (bsc#1051510).\n - iio: xilinx-xadc: Fix ADC-B powerdown (bsc#1051510).\n - iio: xilinx-xadc: Fix clearing interrupt when enabling trigger\n (bsc#1051510).\n - iio: xilinx-xadc: Fix sequencer configuration for aux channels in\n simultaneous mode (bsc#1051510).\n - ima: Fix return value of ima_write_policy() (git-fixes).\n - input: evdev - call input_flush_device() on release(), not flush()\n (bsc#1051510).\n - input: hyperv-keyboard - add module description (bsc#1172249,\n bsc#1172251).\n - input: i8042 - add Acer Aspire 5738z to nomux list (bsc#1051510).\n - input: i8042 - add ThinkPad S230u to i8042 reset list (bsc#1051510).\n - input: raydium_i2c_ts - use true and false for boolean values\n (bsc#1051510).\n - input: synaptics-rmi4 - fix error return code in rmi_driver_probe()\n (bsc#1051510).\n - input: synaptics-rmi4 - really fix attn_data use-after-free (git-fixes).\n - input: usbtouchscreen - add support for BonXeon TP (bsc#1051510).\n - input: xpad - add custom init packet for Xbox One S controllers\n (bsc#1051510).\n - iommu/amd: Call domain_flush_complete() in update_domain() (bsc#1172096).\n - iommu/amd: Do not flush Device Table in iommu_map_page() (bsc#1172097).\n - iommu/amd: Do not loop forever when trying to increase address space\n (bsc#1172098).\n - iommu/amd: Fix legacy interrupt remapping for x2APIC-enabled system\n (bsc#1172099).\n - iommu/amd: Fix over-read of ACPI UID from IVRS table (bsc#1172101).\n - iommu/amd: Fix race in increase_address_space()/fetch_pte()\n (bsc#1172102).\n - iommu/amd: Update Device Table in increase_address_space() (bsc#1172103).\n - iommu: Fix reference count leak in iommu_group_alloc (bsc#1172397).\n - ip6_tunnel: Allow rcv/xmit even if remote address is a local address\n (bsc#1166978).\n - ipmi: fix hung processes in __get_guid() (git-fixes).\n - ipv4: fix a RCU-list lock in fib_triestat_seq_show\n (networking-stable-20_04_02).\n - ipv6/addrconf: call ipv6_mc_up() for non-Ethernet interface\n (networking-stable-20_03_14).\n - ipv6: do not auto-add link-local address to lag ports\n (networking-stable-20_04_09).\n - ipv6: fix IPV6_ADDRFORM operation logic (bsc#1171662).\n - ipv6: Fix nlmsg_flags when splitting a multipath route\n (networking-stable-20_03_01).\n - ipv6: fix restrict IPV6_ADDRFORM operation (bsc#1171662).\n - ipv6: Fix route replacement with dev-only route\n (networking-stable-20_03_01).\n - ipvlan: add cond_resched_rcu() while processing muticast backlog\n (networking-stable-20_03_14).\n - ipvlan: do not deref eth hdr before checking it's set\n (networking-stable-20_03_14).\n - ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast()\n (networking-stable-20_03_14).\n - iwlwifi: pcie: actually release queue memory in TVQM (bsc#1051510).\n - ixgbe: do not check firmware errors (bsc#1170284).\n - kABI fix for early XHCI debug (git-fixes).\n - kabi for for md: improve handling of bio with REQ_PREFLUSH in\n md_flush_request() (git-fixes).\n - kabi/severities: Do not track KVM internal symbols.\n - kabi/severities: Ingnore get_dev_data() The function is internal to the\n AMD IOMMU driver and must not be called by any third party.\n - kABI workaround for snd_rawmidi buffer_ref field addition (git-fixes).\n - keys: reaching the keys quotas correctly (bsc#1051510).\n - KVM: arm64: Change hyp_panic()s dependency on tpidr_el2 (bsc#1133021).\n - KVM: arm64: Stop save/restoring host tpidr_el1 on VHE (bsc#1133021).\n - KVM: Check validity of resolved slot when searching memslots\n (bsc#1172104).\n - KVM: s390: vsie: Fix delivery of addressing exceptions (git-fixes).\n - KVM: s390: vsie: Fix possible race when shadowing region 3 tables\n (git-fixes).\n - KVM: s390: vsie: Fix region 1 ASCE sanity shadow address checks\n (git-fixes).\n - KVM: SVM: Fix potential memory leak in svm_cpu_init() (bsc#1171736).\n - KVM x86: Extend AMD specific guest behavior to Hygon virtual CPUs\n (bsc#1152489).\n - l2tp: Allow management of tunnels and session in user namespace\n (networking-stable-20_04_17).\n - libata: Remove extra scsi_host_put() in ata_scsi_add_hosts()\n (bsc#1051510).\n - libata: Return correct status in sata_pmp_eh_recover_pm() when\n ATA_DFLAG_DETACH is set (bsc#1051510).\n - lib: raid6: fix awk build warnings (git fixes (block drivers)).\n - lib/raid6/test: fix build on distros whose /bin/sh is not bash (git\n fixes (block drivers)).\n - lib/stackdepot.c: fix global out-of-bounds in stack_slabs (git fixes\n (block drivers)).\n - locks: print unsigned ino in /proc/locks (bsc#1171951).\n - mac80211: add ieee80211_is_any_nullfunc() (bsc#1051510).\n - mac80211_hwsim: Use kstrndup() in place of kasprintf() (bsc#1051510).\n - mac80211: mesh: fix discovery timer re-arming issue / crash\n (bsc#1051510).\n - macsec: avoid to set wrong mtu (bsc#1051510).\n - macsec: restrict to ethernet devices (networking-stable-20_03_28).\n - macvlan: add cond_resched() during multicast processing\n (networking-stable-20_03_14).\n - macvlan: fix null dereference in macvlan_device_event() (bsc#1051510).\n - md: improve handling of bio with REQ_PREFLUSH in md_flush_request()\n (git-fixes).\n - md/raid0: Fix an error message in raid0_make_request() (git fixes (block\n drivers)).\n - md/raid10: prevent access of uninitialized resync_pages offset\n (git-fixes).\n - media: dvb: return -EREMOTEIO on i2c transfer failure (bsc#1051510).\n - media: platform: fcp: Set appropriate DMA parameters (bsc#1051510).\n - media: ti-vpe: cal: fix disable_irqs to only the intended target\n (git-fixes).\n - mei: release me_cl object reference (bsc#1051510).\n - mlxsw: Fix some IS_ERR() vs NULL bugs (networking-stable-20_04_27).\n - mlxsw: spectrum_flower: Do not stop at FLOW_ACTION_VLAN_MANGLE\n (networking-stable-20_04_09).\n - mlxsw: spectrum_mr: Fix list iteration in error path (bsc#1112374).\n - mmc: atmel-mci: Fix debugfs on 64-bit platforms (git-fixes).\n - mmc: core: Check request type before completing the request (git-fixes).\n - mmc: core: Fix recursive locking issue in CQE recovery path (git-fixes).\n - mmc: cqhci: Avoid false "cqhci: CQE stuck on" by not open-coding timeout\n loop (git-fixes).\n - mmc: dw_mmc: Fix debugfs on 64-bit platforms (git-fixes).\n - mmc: meson-gx: make sure the descriptor is stopped on errors (git-fixes).\n - mmc: meson-gx: simplify interrupt handler (git-fixes).\n - mmc: renesas_sdhi: limit block count to 16 bit for old revisions\n (git-fixes).\n - mmc: sdhci-esdhc-imx: fix the mask for tuning start point (bsc#1051510).\n - mmc: sdhci-msm: Clear tuning done flag while hs400 tuning (bsc#1051510).\n - mmc: sdhci-of-at91: fix memleak on clk_get failure (git-fixes).\n - mmc: sdhci-pci: Fix eMMC driver strength for BYT-based controllers\n (bsc#1051510).\n - mmc: sdhci: Update the tuning failed messages to pr_debug level\n (git-fixes).\n - mmc: sdhci-xenon: fix annoying 1.8V regulator warning (bsc#1051510).\n - mmc: sdio: Fix potential NULL pointer error in mmc_sdio_init_card()\n (bsc#1051510).\n - mmc: tmio: fix access width of Block Count Register (git-fixes).\n - mm: limit boost_watermark on small zones (git fixes (mm/pgalloc)).\n - mm: thp: handle page cache THP correctly in PageTransCompoundMap (git\n fixes (block drivers)).\n - mtd: cfi: fix deadloop in cfi_cmdset_0002.c do_write_buffer\n (bsc#1051510).\n - mtd: spi-nor: cadence-quadspi: add a delay in write sequence (git-fixes).\n - mtd: spi-nor: enable 4B opcodes for mx66l51235l (git-fixes).\n - mtd: spi-nor: fsl-quadspi: Do not let -EINVAL on the bus (git-fixes).\n - mwifiex: avoid -Wstringop-overflow warning (bsc#1051510).\n - mwifiex: Fix memory corruption in dump_station (bsc#1051510).\n - net: bcmgenet: correct per TX/RX ring statistics\n (networking-stable-20_04_27).\n - net: dsa: b53: Fix ARL register definitions (networking-stable-20_04_27).\n - net: dsa: b53: Rework ARL bin logic (networking-stable-20_04_27).\n - net: dsa: bcm_sf2: Do not register slave MDIO bus with OF\n (networking-stable-20_04_09).\n - net: dsa: bcm_sf2: Ensure correct sub-node is parsed\n (networking-stable-20_04_09).\n - net: dsa: bcm_sf2: Fix overflow checks (git-fixes).\n - net: dsa: Fix duplicate frames flooded by learning\n (networking-stable-20_03_28).\n - net: dsa: mv88e6xxx: fix lockup on warm boot\n (networking-stable-20_03_14).\n - net/ethernet: add Google GVE driver (jsc#SLE-10538)\n - net: fec: add phy_reset_after_clk_enable() support (git-fixes).\n - net: fec: validate the new settings in fec_enet_set_coalesce()\n (networking-stable-20_03_14).\n - net: fib_rules: Correctly set table field when table number exceeds 8\n bits (networking-stable-20_03_01).\n - net: fix race condition in __inet_lookup_established() (bsc#1151794).\n - net: fq: add missing attribute validation for orphan mask\n (networking-stable-20_03_14).\n - net: hns3: fix "tc qdisc del" failed issue (bsc#1109837).\n - net, ip_tunnel: fix interface lookup with no key\n (networking-stable-20_04_02).\n - net: ipv4: devinet: Fix crash when add/del multicast IP with autojoin\n (networking-stable-20_04_17).\n - net: ipv6: do not consider routes via gateways for anycast address check\n (networking-stable-20_04_17).\n - netlink: Use netlink header as base to calculate bad attribute offset\n (networking-stable-20_03_14).\n - net: macsec: update SCI upon MAC address change\n (networking-stable-20_03_14).\n - net: memcg: fix lockdep splat in inet_csk_accept()\n (networking-stable-20_03_14).\n - net: memcg: late association of sock to memcg\n (networking-stable-20_03_14).\n - net/mlx4_en: avoid indirect call in TX completion\n (networking-stable-20_04_27).\n - net/mlx5: Add new fields to Port Type and Speed register (bsc#1171118).\n - net/mlx5: Expose link speed directly (bsc#1171118).\n - net/mlx5: Expose port speed when possible (bsc#1171118).\n - net/mlx5: Fix failing fw tracer allocation on s390 (bsc#1103990 ).\n - net: mvneta: Fix the case where the last poll did not process all rx\n (networking-stable-20_03_28).\n - net: netrom: Fix potential nr_neigh refcnt leak in nr_add_node\n (networking-stable-20_04_27).\n - net/packet: tpacket_rcv: do not increment ring index on drop\n (networking-stable-20_03_14).\n - net: phy: restore mdio regs in the iproc mdio driver\n (networking-stable-20_03_01).\n - net: qmi_wwan: add support for ASKEY WWHC050\n (networking-stable-20_03_28).\n - net: revert default NAPI poll timeout to 2 jiffies\n (networking-stable-20_04_17).\n - net_sched: cls_route: remove the right filter from hashtable\n (networking-stable-20_03_28).\n - net_sched: sch_skbprio: add message validation to skbprio_change()\n (bsc#1109837).\n - net/x25: Fix x25_neigh refcnt leak when receiving frame\n (networking-stable-20_04_27).\n - nfc: add missing attribute validation for SE API\n (networking-stable-20_03_14).\n - nfc: add missing attribute validation for vendor subcommand\n (networking-stable-20_03_14).\n - nfc: pn544: Fix occasional HW initialization failure\n (networking-stable-20_03_01).\n - NFC: st21nfca: add missed kfree_skb() in an error path (bsc#1051510).\n - nfp: abm: fix a memory leak bug (bsc#1109837).\n - nfsd4: fix up replay_matches_cache() (git-fixes).\n - nfsd: Ensure CLONE persists data and metadata changes to the target file\n (git-fixes).\n - nfsd: fix delay timer on 32-bit architectures (git-fixes).\n - nfsd: fix jiffies/time_t mixup in LRU list (git-fixes).\n - nfs: Directory page cache pages need to be locked when read (git-fixes).\n - nfsd: memory corruption in nfsd4_lock() (git-fixes).\n - nfs: Do not call generic_error_remove_page() while holding locks\n (bsc#1170457).\n - nfs: Fix memory leaks and corruption in readdir (git-fixes).\n - nfs: Fix O_DIRECT accounting of number of bytes read/written (git-fixes).\n - nfs: Fix potential posix_acl refcnt leak in nfs3_set_acl (git-fixes).\n - nfs: fix racey wait in nfs_set_open_stateid_locked (bsc#1170592).\n - NFS/flexfiles: Use the correct TCP timeout for flexfiles I/O (git-fixes).\n - NFS/pnfs: Fix pnfs_generic_prepare_to_resend_writes() (git-fixes).\n - nfs: Revalidate the file size on a fatal write error (git-fixes).\n - NFSv4.0: nfs4_do_fsinfo() should not do implicit lease renewals\n (git-fixes).\n - NFSv4: Do not allow a cached open with a revoked delegation (git-fixes).\n - NFSv4: Fix leak of clp->cl_acceptor string (git-fixes).\n - NFSv4-Fix-OPEN-CLOSE-race.patch\n - NFSv4/pnfs: Return valid stateids in nfs_layout_find_inode_by_stateid()\n (git-fixes).\n - NFSv4: try lease recovery on NFS4ERR_EXPIRED (git-fixes).\n - NFSv4.x: Drop the slot if nfs4_delegreturn_prepare waits for\n layoutreturn (git-fixes).\n - nl802154: add missing attribute validation for dev_type\n (networking-stable-20_03_14).\n - nl802154: add missing attribute validation (networking-stable-20_03_14).\n - nvme-fc: print proper nvme-fc devloss_tmo value (bsc#1172391).\n - objtool: Fix stack offset tracking for indirect CFAs (bsc#1169514).\n - objtool: Fix switch table detection in .text.unlikely (bsc#1169514).\n - objtool: Make BP scratch register warning more robust (bsc#1169514).\n - padata: Remove broken queue flushing (git-fixes).\n - Partially revert "kfifo: fix kfifo_alloc() and kfifo_init()" (git fixes\n (block drivers)).\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2\n (bsc#1172201, bsc#1172202).\n - PCI: hv: Decouple the func definition in hv_dr_state from VSP message\n (bsc#1172201, bsc#1172202).\n - PCI/PM: Call .bridge_d3() hook only if non-NULL (git-fixes).\n - perf: Allocate context task_ctx_data for child event (git-fixes).\n - perf/cgroup: Fix perf cgroup hierarchy support (git-fixes).\n - perf: Copy parent's address filter offsets on clone (git-fixes).\n - perf/core: Add sanity check to deal with pinned event failure\n (git-fixes).\n - perf/core: Avoid freeing static PMU contexts when PMU is unregistered\n (git-fixes).\n - perf/core: Correct event creation with PERF_FORMAT_GROUP (git-fixes).\n - perf/core: Do not WARN() for impossible ring-buffer sizes (git-fixes).\n - perf/core: Fix ctx_event_type in ctx_resched() (git-fixes).\n - perf/core: Fix error handling in perf_event_alloc() (git-fixes).\n - perf/core: Fix exclusive events' grouping (git-fixes).\n - perf/core: Fix group scheduling with mixed hw and sw events (git-fixes).\n - perf/core: Fix impossible ring-buffer sizes warning (git-fixes).\n - perf/core: Fix locking for children siblings group read (git-fixes).\n - perf/core: Fix lock inversion between perf,trace,cpuhp (git-fixes\n (dependent patch for 18736eef1213)).\n - perf/core: Fix perf_event_read_value() locking (git-fixes).\n - perf/core: Fix perf_pmu_unregister() locking (git-fixes).\n - perf/core: Fix __perf_read_group_add() locking (git-fixes (dependent\n patch)).\n - perf/core: Fix perf_sample_regs_user() mm check (git-fixes).\n - perf/core: Fix possible Spectre-v1 indexing for ->aux_pages (git-fixes).\n - perf/core: Fix race between close() and fork() (git-fixes).\n - perf/core: Fix the address filtering fix (git-fixes).\n - perf/core: Fix use-after-free in uprobe_perf_close() (git-fixes).\n - perf/core: Force USER_DS when recording user stack data (git-fixes).\n - perf/core: Restore mmap record type correctly (git-fixes).\n - perf: Fix header.size for namespace events (git-fixes).\n - perf/ioctl: Add check for the sample_period value (git-fixes).\n - perf, pt, coresight: Fix address filters for vmas with non-zero offset\n (git-fixes).\n - perf: Return proper values for user stack errors (git-fixes).\n - pinctrl: baytrail: Enable pin configuration setting for GPIO chip\n (git-fixes).\n - pinctrl: cherryview: Add missing spinlock usage in chv_gpio_irq_handler\n (git-fixes).\n - pinctrl: sunrisepoint: Fix PAD lock register offset for SPT-H\n (git-fixes).\n - platform/x86: asus-nb-wmi: Do not load on Asus T100TA and T200TA\n (bsc#1051510).\n - pnfs: Ensure we do clear the return-on-close layout stateid on fatal\n errors (git-fixes).\n - powerpc: Add attributes for setjmp/longjmp (bsc#1065729).\n - powerpc/pci/of: Parse unassigned resources (bsc#1065729).\n - powerpc/setup_64: Set cache-line-size based on cache-block-size\n (bsc#1065729).\n - powerpc/sstep: Fix DS operand in ld encoding to appropriate value\n (bsc#1065729).\n - qede: Fix race between rdma destroy workqueue and link change event\n (networking-stable-20_03_01).\n - r8152: check disconnect status after long sleep\n (networking-stable-20_03_14).\n - raid6/ppc: Fix build for clang (git fixes (block drivers)).\n - random: always use batched entropy for get_random_u{32,64} (bsc#1164871).\n - rcu: locking and unlocking need to always be at least barriers (git\n fixes (block drivers)).\n - Redo patch for SLE15-SP1, based on feedback from IBM:\n patches.suse/s390-ftrace-fix-potential-crashes-when-switching-tracers\n (bsc#1171244 LTC#185785 git-fixes).\n - resolve KABI warning for perf-pt-coresight (git-fixes).\n - Revert "ALSA: hda/realtek: Fix pop noise on ALC225" (git-fixes).\n - Revert "drm/panel: simple: Add support for Sharp LQ150X1LG11 panels"\n (bsc#1114279) * offset changes\n - Revert "HID: i2c-hid: add Trekstor Primebook C11B to descriptor\n override" Depends on 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was\n also reverted.\n - Revert "HID: i2c-hid: override HID descriptors for certain devices" This\n broke i2c-hid.ko's build, there is no way around it without a big file\n rename or renaming the kernel module.\n - Revert "i2c-hid: properly terminate i2c_hid_dmi_desc_override_table"\n Fixed 9b5c747685982d22efffeafc5ec601bd28f6d78b, which was also reverted.\n - Revert "ipc,sem: remove uneeded sem_undo_list lock usage in exit_sem()"\n (bsc#1172221).\n - Revert "RDMA/cma: Simplify rdma_resolve_addr() error flow" (bsc#1103992).\n - rtlwifi: Fix a double free in _rtl_usb_tx_urb_setup() (bsc#1051510).\n - s390/cio: avoid duplicated 'ADD' uevents (git-fixes).\n - s390/cio: generate delayed uevent for vfio-ccw subchannels (git-fixes).\n - s390/cpuinfo: fix wrong output when CPU0 is offline (git-fixes).\n - s390/cpum_cf: Add new extended counters for IBM z15 (bsc#1169762\n LTC#185291).\n - s390/diag: fix display of diagnose call statistics (git-fixes).\n - s390/ftrace: fix potential crashes when switching tracers (git-fixes).\n - s390/gmap: return proper error code on ksm unsharing (git-fixes).\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n - s390/pci: do not set affinity for floating irqs (git-fixes).\n - s390/pci: Fix possible deadlock in recover_store() (bsc#1165183\n LTC#184103).\n - s390/pci: Recover handle in clp_set_pci_fn() (bsc#1165183 LTC#184103).\n - s390/qeth: cancel RX reclaim work earlier (git-fixes).\n - s390/qeth: do not return -ENOTSUPP to userspace (git-fixes).\n - s390/qeth: do not warn for napi with 0 budget (git-fixes).\n - s390/qeth: fix off-by-one in RX copybreak check (git-fixes).\n - s390/qeth: fix promiscuous mode after reset (git-fixes).\n - s390/qeth: fix qdio teardown after early init error (git-fixes).\n - s390/qeth: handle error due to unsupported transport mode (git-fixes).\n - s390/qeth: handle error when backing RX buffer (git-fixes).\n - s390/qeth: lock the card while changing its hsuid (git-fixes).\n - s390/qeth: support net namespaces for L3 devices (git-fixes).\n - s390/time: Fix clk type in get_tod_clock (git-fixes).\n - scripts/decodecode: fix trapping instruction formatting (bsc#1065729).\n - scripts/dtc: Remove redundant YYLOC global declaration (bsc#1160388).\n - scsi: bnx2i: fix potential use after free (bsc#1171600).\n - scsi: core: Handle drivers which set sg_tablesize to zero (bsc#1171601)\n - scsi: core: save/restore command resid for error handling (bsc#1171602).\n - scsi: core: scsi_trace: Use get_unaligned_be*() (bsc#1171604).\n - scsi: core: try to get module before removing device (bsc#1171605).\n - scsi: csiostor: Adjust indentation in csio_device_reset (bsc#1171606).\n - scsi: csiostor: Do not enable IRQs too early (bsc#1171607).\n - scsi: esas2r: unlock on error in esas2r_nvram_read_direct()\n (bsc#1171608).\n - scsi: fnic: fix invalid stack access (bsc#1171609).\n - scsi: fnic: fix msix interrupt allocation (bsc#1171610).\n - scsi-ibmvfc-Don-t-send-implicit-logouts-prior-to-NPI.patch\n - scsi: ibmvscsi: Fix WARN_ON during event pool release (bsc#1170791\n ltc#185128).\n - scsi-ibmvscsi-Fix-WARN_ON-during-event-pool-release.patch\n - scsi: iscsi: Avoid potential deadlock in iscsi_if_rx func (bsc#1171611).\n - scsi: iscsi: Fix a potential deadlock in the timeout handler\n (bsc#1171612).\n - scsi: iscsi: qla4xxx: fix double free in probe (bsc#1171613).\n - scsi: lpfc: Change default queue allocation for reduced memory\n consumption (bsc#1164780).\n - scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer\n dereferences (bsc#1171614).\n - scsi: lpfc: Fix crash in target side cable pulls hitting WAIT_FOR_UNREG\n (bsc#1171615).\n - scsi: lpfc: Fix lpfc_nodelist leak when processing unsolicited event\n (bsc#1164780).\n - scsi: lpfc: Fix MDS Diagnostic Enablement definition (bsc#1164780).\n - scsi: lpfc: Fix negation of else clause in lpfc_prep_node_fc4type\n (bsc#1164780).\n - scsi: lpfc: Fix noderef and address space warnings (bsc#1164780).\n - scsi: lpfc: Maintain atomic consistency of queue_claimed flag\n (bsc#1164780).\n - scsi: lpfc: remove duplicate unloading checks (bsc#1164780).\n - scsi: lpfc: Remove re-binding of nvme rport during registration\n (bsc#1164780).\n - scsi: lpfc: Remove redundant initialization to variable rc (bsc#1164780).\n - scsi: lpfc: Remove unnecessary lockdep_assert_held calls (bsc#1164780).\n - scsi: lpfc: Update lpfc version to 12.8.0.1 (bsc#1164780).\n - scsi: megaraid_sas: Do not initiate OCR if controller is not in ready\n state (bsc#1171616).\n - scsi: qla2xxx: add ring buffer for tracing debug logs (bsc#1157169).\n - scsi-qla2xxx-check-UNLOADING-before-posting-async-wo.patch\n - scsi: qla2xxx: check UNLOADING before posting async work (bsc#1157169).\n - scsi: qla2xxx: Delete all sessions before unregister local nvme port\n (bsc#1157169).\n - scsi: qla2xxx: Do not log message when reading port speed via sysfs\n (bsc#1157169).\n - scsi: qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV\n (bsc#1157169).\n - scsi: qla2xxx: Fix regression warnings (bsc#1157169).\n - scsi: qla2xxx: Remove non functional code (bsc#1157169).\n - scsi: qla2xxx: set UNLOADING before waiting for session deletion\n (bsc#1157169).\n - scsi-qla2xxx-set-UNLOADING-before-waiting-for-sessio.patch\n - scsi: qla4xxx: Adjust indentation in qla4xxx_mem_free (bsc#1171617).\n - scsi: qla4xxx: fix double free bug (bsc#1171618).\n - scsi: sd: Clear sdkp->protection_type if disk is reformatted without PI\n (bsc#1171619).\n - scsi: sg: add sg_remove_request in sg_common_write (bsc#1171620).\n - scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and\n WRITE(6) (bsc#1171621).\n - scsi: ufs: change msleep to usleep_range (bsc#1171622).\n - scsi: ufs: Clean up ufshcd_scale_clks() and clock scaling error out path\n (bsc#1171623).\n - scsi: ufs: Fix ufshcd_hold() caused scheduling while atomic\n (bsc#1171624).\n - scsi: ufs: Fix ufshcd_probe_hba() reture value in case\n ufshcd_scsi_add_wlus() fails (bsc#1171625).\n - scsi: ufs: Recheck bkops level if bkops is disabled (bsc#1171626).\n - scsi: zfcp: fix missing erp_lock in port recovery trigger for\n point-to-point (git-fixes).\n - sctp: fix possibly using a bad saddr with a given dst\n (networking-stable-20_04_02).\n - sctp: fix refcount bug in sctp_wfree (networking-stable-20_04_02).\n - sctp: move the format error check out of __sctp_sf_do_9_1_abort\n (networking-stable-20_03_01).\n - selftests/powerpc: Fix build errors in powerpc ptrace selftests\n (boo#1124278).\n - seq_file: fix problem when seeking mid-record (bsc#1170125).\n - serial: uartps: Move the spinlock after the read of the tx empty\n (git-fixes).\n - sfc: detach from cb_page in efx_copy_channel()\n (networking-stable-20_03_14).\n - signal/pid_namespace: Fix reboot_pid_ns to use send_sig not force_sig\n (bsc#1172185).\n - slcan: not call free_netdev before rtnl_unlock in slcan_open\n (networking-stable-20_03_28).\n - slip: make slhc_compress() more robust against malicious packets\n (networking-stable-20_03_14).\n - smb3: Additional compression structures (bsc#1144333).\n - smb3: Add new compression flags (bsc#1144333).\n - smb3: change noisy error message to FYI (bsc#1144333).\n - smb3: enable swap on SMB3 mounts (bsc#1144333).\n - smb3-fix-performance-regression-with-setting-mtime.patch\n - smb3: Minor cleanup of protocol definitions (bsc#1144333).\n - smb3: remove overly noisy debug line in signing errors (bsc#1144333).\n - smb3: smbdirect support can be configured by default (bsc#1144333).\n - smb3: use SMB2_SIGNATURE_SIZE define (bsc#1144333).\n - spi: bcm2835: Fix 3-wire mode if DMA is enabled (git-fixes).\n - spi: bcm63xx-hsspi: Really keep pll clk enabled (bsc#1051510).\n - spi: bcm-qspi: when tx/rx buffer is NULL set to 0 (bsc#1051510).\n - spi: dw: Add SPI Rx-done wait method to DMA-based transfer (bsc#1051510).\n - spi: dw: Add SPI Tx-done wait method to DMA-based transfer (bsc#1051510).\n - spi: dw: Zero DMA Tx and Rx configurations on stack (bsc#1051510).\n - spi: fsl: do not map irq during probe (git-fixes).\n - spi: fsl: use platform_get_irq() instead of of_irq_to_resource()\n (git-fixes).\n - spi: pxa2xx: Add CS control clock quirk (bsc#1051510).\n - spi: qup: call spi_qup_pm_resume_runtime before suspending (bsc#1051510).\n - spi: spi-fsl-dspi: Replace interruptible wait queue with a simple\n completion (git-fixes).\n - spi: spi-s3c64xx: Fix system resume support (git-fixes).\n - spi/zynqmp: remove entry that causes a cs glitch (bsc#1051510).\n - staging: comedi: dt2815: fix writing hi byte of analog output\n (bsc#1051510).\n - staging: comedi: Fix comedi_device refcnt leak in comedi_open\n (bsc#1051510).\n - staging: iio: ad2s1210: Fix SPI reading (bsc#1051510).\n - staging: vt6656: Do not set RCR_MULTICAST or RCR_BROADCAST by default\n (git-fixes).\n - staging: vt6656: Fix drivers TBTT timing counter (git-fixes).\n - staging: vt6656: Fix pairwise key entry save (git-fixes).\n - sunrpc: expiry_time should be seconds not timeval (git-fixes).\n - sunrpc: Fix a potential buffer overflow in 'svc_print_xprts()'\n (git-fixes).\n - supported.conf: Add br_netfilter to base (bsc#1169020).\n - supported.conf: support w1 core and thermometer support\n - svcrdma: Fix double svc_rdma_send_ctxt_put() in an error path\n (bsc#1103992).\n - svcrdma: Fix leak of transport addresses (git-fixes).\n - svcrdma: Fix trace point use-after-free race (bsc#1103992 ).\n - taskstats: fix data-race (bsc#1172188).\n - tcp: cache line align MAX_TCP_HEADER (networking-stable-20_04_27).\n - tcp: repair: fix TCP_QUEUE_SEQ implementation\n (networking-stable-20_03_28).\n - team: add missing attribute validation for array index\n (networking-stable-20_03_14).\n - team: add missing attribute validation for port ifindex\n (networking-stable-20_03_14).\n - team: fix hang in team_mode_get() (networking-stable-20_04_27).\n - tools lib traceevent: Remove unneeded qsort and uses memmove instead\n (git-fixes).\n - tpm: ibmvtpm: retry on H_CLOSED in tpm_ibmvtpm_send() (bsc#1065729).\n - tpm/tpm_tis: Free IRQ if probing fails (bsc#1082555).\n - tpm/tpm_tis: Free IRQ if probing fails (git-fixes).\n - tracing: Add a vmalloc_sync_mappings() for safe measure (git-fixes).\n - tracing: Disable trace_printk() on post poned tests (git-fixes).\n - tracing: Fix the race between registering 'snapshot' event trigger and\n triggering 'snapshot' operation (git-fixes).\n - tty: rocket, avoid OOB access (git-fixes).\n - tun: Do not put_page() for all negative return values from XDP program\n (bsc#1109837).\n - UAS: fix deadlock in error handling and PM flushing work (git-fixes).\n - UAS: no use logging any details in case of ENODEV (git-fixes).\n - Update config files: Build w1 bus on arm64 (jsc#SLE-11048)\n - Update config files: re-enable CONFIG_HAMRADIO and co (bsc#1170740)\n - Update\n patches.suse/powerpc-pseries-ddw-Extend-upper-limit-for-huge-DMA-.patch\n (bsc#1142685 bsc#1167867 ltc#179509 ltc#184616).\n - Update patches.suse/x86-mm-split-vmalloc_sync_all.patch (bsc#1165741,\n bsc#1166969).\n - Update references:\n patches.suse/s390-pci-do-not-set-affinity-for-floating-irqs (bsc#1171817\n LTC#185819 git-fixes).\n - usb: Add USB_QUIRK_DELAY_CTRL_MSG and USB_QUIRK_DELAY_INIT for Corsair\n K70 RGB RAPIDFIRE (git-fixes).\n - usb: cdc-acm: restore capability check order (git-fixes).\n - usb: core: Fix misleading driver bug report (bsc#1051510).\n - usb: dwc3: do not set gadget->is_otg flag (git-fixes).\n - usb: dwc3: gadget: Do link recovery for SS and SSP (git-fixes).\n - usb: early: Handle AMD's spec-compliant identifiers, too (git-fixes).\n - usb: f_fs: Clear OS Extended descriptor counts to zero in\n ffs_data_reset() (git-fixes).\n - usb: gadget: audio: Fix a missing error return value in audio_bind()\n (git-fixes).\n - usb: gadget: composite: Inform controller driver of self-powered\n (git-fixes).\n - usb: gadget: legacy: fix error return code in cdc_bind() (git-fixes).\n - usb: gadget: legacy: fix error return code in gncm_bind() (git-fixes).\n - usb: gadget: legacy: fix redundant initialization warnings (bsc#1051510).\n - usb: gadget: net2272: Fix a memory leak in an error handling path in\n 'net2272_plat_probe()' (git-fixes).\n - usb: gadget: udc: atmel: Fix vbus disconnect handling (git-fixes).\n - usb: gadget: udc: atmel: Make some symbols static (git-fixes).\n - usb: gadget: udc: bdc: Remove unnecessary NULL checks in\n bdc_req_complete (git-fixes).\n - usb: host: xhci-plat: keep runtime active when removing host (git-fixes).\n - usb: hub: Fix handling of connect changes during sleep (git-fixes).\n - usbnet: silence an unnecessary warning (bsc#1170770).\n - usb: serial: garmin_gps: add sanity checking for data length (git-fixes).\n - usb: serial: option: add BroadMobi BM806U (git-fixes).\n - usb: serial: option: add support for ASKEY WWHC050 (git-fixes).\n - usb: serial: option: add Wistron Neweb D19Q1 (git-fixes).\n - usb: serial: qcserial: Add DW5816e support (git-fixes).\n - usb: sisusbvga: Change port variable from signed to unsigned (git-fixes).\n - usb-storage: Add unusual_devs entry for JMicron JMS566 (git-fixes).\n - usb: uas: add quirk for LaCie 2Big Quadra (git-fixes).\n - usb: xhci: Fix NULL pointer dereference when enqueuing trbs from urb sg\n list (git-fixes).\n - video: fbdev: sis: Remove unnecessary parentheses and commented code\n (bsc#1114279)\n - video: fbdev: w100fb: Fix a potential double free (bsc#1051510).\n - vrf: Check skb for XFRM_TRANSFORMED flag (networking-stable-20_04_27).\n - vt: ioctl, switch VT_IS_IN_USE and VT_BUSY to inlines (git-fixes).\n - vt: selection, introduce vc_is_sel (git-fixes).\n - vt: vt_ioctl: fix race in VT_RESIZEX (git-fixes).\n - vt: vt_ioctl: fix use-after-free in vt_in_use() (git-fixes).\n - vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console\n (git-fixes).\n - vxlan: check return value of gro_cells_init()\n (networking-stable-20_03_28).\n - w1: Add subsystem kernel public interface (jsc#SLE-11048).\n - w1: Fix slave count on 1-Wire bus (resend) (jsc#SLE-11048).\n - w1: keep balance of mutex locks and refcnts (jsc#SLE-11048).\n - w1: use put_device() if device_register() fail (jsc#SLE-11048).\n - watchdog: reset last_hw_keepalive time at start (git-fixes).\n - wcn36xx: Fix error handling path in 'wcn36xx_probe()' (bsc#1051510).\n - wil6210: remove reset file from debugfs (git-fixes).\n - wimax/i2400m: Fix potential urb refcnt leak (bsc#1051510).\n - workqueue: do not use wq_select_unbound_cpu() for bound works\n (bsc#1172130).\n - x86/entry/64: Fix unwind hints in kernel exit path (bsc#1058115).\n - x86/entry/64: Fix unwind hints in register clearing code (bsc#1058115).\n - x86/entry/64: Fix unwind hints in rewind_stack_do_exit() (bsc#1058115).\n - x86/entry/64: Fix unwind hints in __switch_to_asm() (bsc#1058115).\n - x86/hyperv: Allow guests to enable InvariantTSC (bsc#1170621,\n bsc#1170620).\n - x86/Hyper-V: Free hv_panic_page when fail to register kmsg dump\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash data in die() when panic_on_oops is set\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash register data or kmsg before running crash\n kernel (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Report crash register data when sysctl_record_panic_msg is\n not set (bsc#1170617, bsc#1170618).\n - x86: hyperv: report value of misc_features (git fixes).\n - x86/Hyper-V: Trigger crash enlightenment only once during system crash\n (bsc#1170617, bsc#1170618).\n - x86/Hyper-V: Unload vmbus channel in hv panic callback (bsc#1170617,\n bsc#1170618).\n - x86/kprobes: Avoid kretprobe recursion bug (bsc#1114279).\n - x86/resctrl: Fix invalid attempt at removing the default resource group\n (git-fixes).\n - x86/resctrl: Preserve CDP enable over CPU hotplug (bsc#1114279).\n - x86/unwind/orc: Do not skip the first frame for inactive tasks\n (bsc#1058115).\n - x86/unwind/orc: Fix error handling in __unwind_start() (bsc#1058115).\n - x86/unwind/orc: Fix error path for bad ORC entry type (bsc#1058115).\n - x86/unwind/orc: Fix unwind_get_return_address_ptr() for inactive tasks\n (bsc#1058115).\n - x86/unwind/orc: Prevent unwinding before ORC initialization\n (bsc#1058115).\n - x86/unwind: Prevent false warnings for non-current tasks (bsc#1058115).\n - x86/xen: fix booting 32-bit pv guest (bsc#1071995).\n - x86/xen: Make the boot CPU idle task reliable (bsc#1071995).\n - x86/xen: Make the secondary CPU idle tasks reliable (bsc#1071995).\n - xen/pci: reserve MCFG areas earlier (bsc#1170145).\n - xfrm: Always set XFRM_TRANSFORMED in xfrm{4,6}_output_finish\n (networking-stable-20_04_27).\n - xfs: clear PF_MEMALLOC before exiting xfsaild thread (git-fixes).\n - xfs: Correctly invert xfs_buftarg LRU isolation logic (git-fixes).\n - xfs: do not ever return a stale pointer from __xfs_dir3_free_read\n (git-fixes).\n - xprtrdma: Fix completion wait during device removal (git-fixes).\n\n", "edition": 1, "modified": "2020-06-13T09:19:11", "published": "2020-06-13T09:19:11", "id": "OPENSUSE-SU-2020:0801-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html", "title": "Security update for the Linux Kernel (important)", "type": "suse", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "amazon": [{"lastseen": "2020-11-10T12:35:38", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19462", "CVE-2018-20669", "CVE-2020-10732", "CVE-2020-10768", "CVE-2020-10766", "CVE-2020-10757", "CVE-2020-12771", "CVE-2020-10767"], "description": "**Issue Overview:**\n\nAn issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. ([CVE-2018-20669 __](<https://access.redhat.com/security/cve/CVE-2018-20669>))\n\nA flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality. ([CVE-2020-10768 __](<https://access.redhat.com/security/cve/CVE-2020-10768>))\n\nrelay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result. ([CVE-2019-19462 __](<https://access.redhat.com/security/cve/CVE-2019-19462>))\n\nA logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. ([CVE-2020-10766 __](<https://access.redhat.com/security/cve/CVE-2020-10766>))\n\nA flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. ( [CVE-2020-10767 __](<https://access.redhat.com/security/cve/CVE-2020-10767>))\n\nAn issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails. ([CVE-2020-12771 __](<https://access.redhat.com/security/cve/CVE-2020-12771>))\n\nA flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data. ([CVE-2020-10732 __](<https://access.redhat.com/security/cve/CVE-2020-10732>))\n\nA flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system. ([CVE-2020-10757 __](<https://access.redhat.com/security/cve/CVE-2020-10757>))\n\n \n**Affected Packages:** \n\n\nkernel\n\n \n**Issue Correction:** \nRun _yum update kernel_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n aarch64: \n kernel-4.14.186-146.268.amzn2.aarch64 \n kernel-headers-4.14.186-146.268.amzn2.aarch64 \n kernel-debuginfo-common-aarch64-4.14.186-146.268.amzn2.aarch64 \n perf-4.14.186-146.268.amzn2.aarch64 \n perf-debuginfo-4.14.186-146.268.amzn2.aarch64 \n python-perf-4.14.186-146.268.amzn2.aarch64 \n python-perf-debuginfo-4.14.186-146.268.amzn2.aarch64 \n kernel-tools-4.14.186-146.268.amzn2.aarch64 \n kernel-tools-devel-4.14.186-146.268.amzn2.aarch64 \n kernel-tools-debuginfo-4.14.186-146.268.amzn2.aarch64 \n kernel-devel-4.14.186-146.268.amzn2.aarch64 \n kernel-debuginfo-4.14.186-146.268.amzn2.aarch64 \n \n i686: \n kernel-headers-4.14.186-146.268.amzn2.i686 \n \n src: \n kernel-4.14.186-146.268.amzn2.src \n \n x86_64: \n kernel-4.14.186-146.268.amzn2.x86_64 \n kernel-headers-4.14.186-146.268.amzn2.x86_64 \n kernel-debuginfo-common-x86_64-4.14.186-146.268.amzn2.x86_64 \n perf-4.14.186-146.268.amzn2.x86_64 \n perf-debuginfo-4.14.186-146.268.amzn2.x86_64 \n python-perf-4.14.186-146.268.amzn2.x86_64 \n python-perf-debuginfo-4.14.186-146.268.amzn2.x86_64 \n kernel-tools-4.14.186-146.268.amzn2.x86_64 \n kernel-tools-devel-4.14.186-146.268.amzn2.x86_64 \n kernel-tools-debuginfo-4.14.186-146.268.amzn2.x86_64 \n kernel-devel-4.14.186-146.268.amzn2.x86_64 \n kernel-debuginfo-4.14.186-146.268.amzn2.x86_64 \n kernel-livepatch-4.14.186-146.268-1.0-0.amzn2.x86_64 \n \n \n", "edition": 1, "modified": "2020-07-21T16:34:00", "published": "2020-07-21T16:34:00", "id": "ALAS2-2020-1465", "href": "https://alas.aws.amazon.com/AL2/ALAS-2020-1465.html", "title": "Important: kernel", "type": "amazon", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2020-11-10T12:36:43", "bulletinFamily": "unix", "cvelist": ["CVE-2019-19462", "CVE-2018-20669", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-10768", "CVE-2020-10766", "CVE-2020-10757", "CVE-2020-12771", "CVE-2020-10767"], "description": "**Issue Overview:**\n\nAn issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. ([CVE-2018-20669 __](<https://access.redhat.com/security/cve/CVE-2018-20669>))\n\nA flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality. ([CVE-2020-10768 __](<https://access.redhat.com/security/cve/CVE-2020-10768>))\n\nA new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both. Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. ([CVE-2020-0543 __](<https://access.redhat.com/security/cve/CVE-2020-0543>))\n\nrelay_open in kernel/relay.c in the Linux kernel through 5.4.1 allows local users to cause a denial of service (such as relay blockage) by triggering a NULL alloc_percpu result. ([CVE-2019-19462 __](<https://access.redhat.com/security/cve/CVE-2019-19462>))\n\nA logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. ([CVE-2019-19462 __](<https://access.redhat.com/security/cve/CVE-2019-19462>))\n\nA flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. ([CVE-2019-19462 __](<https://access.redhat.com/security/cve/CVE-2019-19462>))\n\nAn issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails. ([CVE-2020-12771 __](<https://access.redhat.com/security/cve/CVE-2020-12771>))\n\nA flaw was found in the Linux kernel's implementation of Userspace core dumps. This flaw allows an attacker with a local account to crash a trivial program and exfiltrate private kernel data. ([CVE-2020-10732 __](<https://access.redhat.com/security/cve/CVE-2020-10732>))\n\nA flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system. ([CVE-2020-10757 __](<https://access.redhat.com/security/cve/CVE-2020-10757>)) \n\n\n \n**Affected Packages:** \n\n\nkernel\n\n \n**Issue Correction:** \nRun _yum update kernel_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n i686: \n kernel-debuginfo-common-i686-4.14.186-110.268.amzn1.i686 \n perf-debuginfo-4.14.186-110.268.amzn1.i686 \n kernel-tools-4.14.186-110.268.amzn1.i686 \n kernel-tools-debuginfo-4.14.186-110.268.amzn1.i686 \n kernel-debuginfo-4.14.186-110.268.amzn1.i686 \n kernel-tools-devel-4.14.186-110.268.amzn1.i686 \n perf-4.14.186-110.268.amzn1.i686 \n kernel-4.14.186-110.268.amzn1.i686 \n kernel-devel-4.14.186-110.268.amzn1.i686 \n kernel-headers-4.14.186-110.268.amzn1.i686 \n \n src: \n kernel-4.14.186-110.268.amzn1.src \n \n x86_64: \n kernel-tools-devel-4.14.186-110.268.amzn1.x86_64 \n kernel-debuginfo-4.14.186-110.268.amzn1.x86_64 \n kernel-tools-debuginfo-4.14.186-110.268.amzn1.x86_64 \n kernel-debuginfo-common-x86_64-4.14.186-110.268.amzn1.x86_64 \n perf-4.14.186-110.268.amzn1.x86_64 \n kernel-tools-4.14.186-110.268.amzn1.x86_64 \n kernel-4.14.186-110.268.amzn1.x86_64 \n kernel-headers-4.14.186-110.268.amzn1.x86_64 \n perf-debuginfo-4.14.186-110.268.amzn1.x86_64 \n kernel-devel-4.14.186-110.268.amzn1.x86_64 \n \n \n", "edition": 3, "modified": "2020-07-14T21:14:00", "published": "2020-07-14T21:14:00", "id": "ALAS-2020-1401", "href": "https://alas.aws.amazon.com/ALAS-2020-1401.html", "title": "Important: kernel", "type": "amazon", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-12-06T01:19:18", "bulletinFamily": "unix", "cvelist": ["CVE-2020-10711", "CVE-2020-12770", "CVE-2020-12768", "CVE-2019-19462", "CVE-2020-12114", "CVE-2019-3016", "CVE-2020-10732", "CVE-2020-0543", "CVE-2020-12464", "CVE-2020-10751", "CVE-2020-13143", "CVE-2020-10757"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4699-1 security@debian.org\nhttps://www.debian.org/security/ Ben Hutchings\nJune 09, 2020 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : linux\nCVE ID : CVE-2019-3016 CVE-2019-19462 CVE-2020-0543 CVE-2020-10711\n CVE-2020-10732 CVE-2020-10751 CVE-2020-10757 CVE-2020-12114\n CVE-2020-12464 CVE-2020-12768 CVE-2020-12770 CVE-2020-13143\nDebian Bug : 960271\n\nSeveral vulnerabilities have been discovered in the Linux kernel that\nmay lead to a privilege escalation, denial of service or information\nleaks.\n\nCVE-2019-3016\n\n It was discovered that the KVM implementation for x86 did not\n always perform TLB flushes when needed, if the paravirtualised\n TLB flush feature was enabled. This could lead to disclosure of\n sensitive information within a guest VM.\n\nCVE-2019-19462\n\n The syzkaller tool found a missing error check in the 'relay'\n library used to implement various files under debugfs. A local\n user permitted to access debugfs could use this to cause a denial\n of service (crash) or possibly for privilege escalation.\n\nCVE-2020-0543\n\n Researchers at VU Amsterdam discovered that on some Intel CPUs\n supporting the RDRAND and RDSEED instructions, part of a random\n value generated by these instructions may be used in a later\n speculative execution on any core of the same physical CPU.\n Depending on how these instructions are used by applications, a\n local user or VM guest could use this to obtain sensitive\n information such as cryptographic keys from other users or VMs.\n\n This vulnerability can be mitigated by a microcode update, either\n as part of system firmware (BIOS) or through the intel-microcode\n package in Debian's non-free archive section. This kernel update\n only provides reporting of the vulnerability and the option to\n disable the mitigation if it is not needed.\n\nCVE-2020-10711\n\n Matthew Sheets reported NULL pointer dereference issues in the\n SELinux subsystem while receiving CIPSO packet with null category. A\n remote attacker can take advantage of this flaw to cause a denial of\n service (crash). Note that this issue does not affect the binary\n packages distributed in Debian as CONFIG_NETLABEL is not enabled.\n\nCVE-2020-10732\n\n An information leak of kernel private memory to userspace was found\n in the kernel's implementation of core dumping userspace processes.\n\nCVE-2020-10751\n\n Dmitry Vyukov reported that the SELinux subsystem did not properly\n handle validating multiple messages, which could allow a privileged\n attacker to bypass SELinux netlink restrictions.\n\nCVE-2020-10757\n\n Fan Yang reported a flaw in the way mremap handled DAX hugepages,\n allowing a local user to escalate their privileges.\n\nCVE-2020-12114\n\n Piotr Krysiuk discovered a race condition between the umount and\n pivot_root operations in the filesystem core (vfs). A local user\n with the CAP_SYS_ADMIN capability in any user namespace could use\n this to cause a denial of service (crash).\n\nCVE-2020-12464\n\n Kyungtae Kim reported a race condition in the USB core that can\n result in a use-after-free. It is not clear how this can be\n exploited, but it could result in a denial of service (crash or\n memory corruption) or privilege escalation.\n\nCVE-2020-12768\n\n A bug was discovered in the KVM implementation for AMD processors,\n which could result in a memory leak. The security impact of this\n is unclear.\n\nCVE-2020-12770\n\n It was discovered that the sg (SCSI generic) driver did not\n correctly release internal resources in a particular error case.\n A local user permitted to access an sg device could possibly use\n this to cause a denial of service (resource exhaustion).\n\nCVE-2020-13143\n\n Kyungtae Kim reported a potential heap out-of-bounds write in\n the USB gadget subsystem. A local user permitted to write to\n the gadget configuration filesystem could use this to cause a\n denial of service (crash or memory corruption) or potentially\n for privilege escalation.\n\nFor the stable distribution (buster), these problems have been fixed\nin version 4.19.118-2+deb10u1. This version also fixes some related\nbugs that do not have their own CVE IDs, and a regression in the\n<linux/swab.h> UAPI header introduced in the previous point release\n(bug #960271).\n\nWe recommend that you upgrade your linux packages.\n\nFor the detailed security status of linux please refer to its security\ntracker page at:\nhttps://security-tracker.debian.org/tracker/linux\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 12, "modified": "2020-06-09T19:44:40", "published": "2020-06-09T19:44:40", "id": "DEBIAN:DSA-4699-1:122C4", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2020/msg00103.html", "title": "[SECURITY] [DSA 4699-1] linux security update", "type": "debian", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}]}