Description
[8.3.1-5.0.3]
- Fix Orabug 29838827 - provide an option to adjust the maximum depth of nested #include
This is the same bug as gcc upstream PR90581 from Gcc9:
gcc9-pr90581.patch
- Fix Orabug 29541051 - confusing error message when there is a problem
with ASAN_OPTIONS 'ERROR: expected '=''
This is the same bug as gcc upstream PR89832 from Gcc9:
gcc9-pr89832.patch
[8.3.1-5.0.2]
- Update support for CTF
- Fix Orabug 30833294 GCC generates incorrect CTF for single element arrays
- Fix Orabug 30808764 CTF generation fails when __attribute__ ((mode (XX))) is
used
[8.3.1-5.0.1]
- Forward-port Oracle patches from ol8-u1.
- Apply ares/neoverse support patches only ifarch aarch64.
(Qing Zhao
8.3.1-4.5.0.6)
- Add 5 patches from gcc9 to support Arm Ares and Neoverse-N1 for Aarch64
gcc9-add-mtune-support-for-arm-ares.patch
gcc9-add-vec-reverse.patch
gcc9-multiple-changes-align.patch
gcc9-initial-mcpu-ares-tuning.patch
gcc9-add-support-for-neoverse-n1.patch
(Indu Bhagat
8.3.1-4.5.0.5)
- Update support for CTF
- Fix Orabug 30778534 gcc should generate CTF for functions at file-scope only
- Fix Orabug 30779193 CTF generation fails for some flavors of vla
- Fix Orabug 30784275 Fix issues wtih CTF generation for typedef constructs
ctf-3-generation-and-emission-for-a-single-compilation.patch
ctf-4-update-ctf-testsuite.patch
(Indu Bhagat
8.3.1-4.5.0.4)
- Add support for CTF in GCC
- Fix Orabug 30102948 gcc: Add CTF generation to compiler
- Fix Orabug 30102949 gcc: Add CTF generation to compiler (aarch64)
ctf-1-new-function-lang_GNU_GIMPLE.patch
ctf-2-command-line-options-gtLEVEL.patch
ctf-3-generation-and-emission-for-a-single-compilation.patch
ctf-4-update-ctf-testsuite.patch
ctf-5-handle-ctf-sections-when-lto-enabled.patch
(Qing Zhao
8.3.1-4.5.0.3)
- CVE-2018-12207 / Intel SKX102
OL8 gcc: Intel Mitigation for CVE: CVE-2018-12207
- Allow -flto -Wa,-mbranches-within-32B-boundaries to pass -mbranches-within-32B-boundaries
to GNU assembler. Without -lfto, -Wa,-mbranches-within-32B-boundaries to pass
-mbranches-within-32B-boundaries to GNU assembler using existing GCC binaries.
- Mitigation patch:
gcc8-Fix-Wa-with-flto.patch
(Qing Zhao
8.3.1-4.5.0.2)
- Fix Orabug 29968294 - Heap corruption with fprofile-dir=%p prevents
profiling parallel processes, needed for RDBMS:
Add patch to fix PR86057 from Gcc9:
gcc9-pr86057.patch
- Fix Orabug 30044244 - Profile directory concatenated with object file path
This is the same bug as gcc upstream PR91971:
gcc9-pr85759.patch
gcc10-pr91971.patch
(Indu Bhagat
8.3.1-4.5.0.1)
- Fix Orabug 29599147 - Need -fprofile-dir=%q{VAR} backported to gcc8
This is the similar GCC PR47618, add the fix from GCC9:
gcc9-pr47618.patch
- Fix Orabug 29272977 - DB SUPPORT: Need way to dump inlining report from GCC
Add -fopt-info-inline support from GCC9:
gcc9-opt-info-inline.patch
- Fix Orabug 29273006 - DB SUPPORT: need way to turn off inlining of global functions
Add -flive-patching support from GCC9:
gcc9-fipa-reference-addressable.patch
gcc9-fipa-stack-alignment.patch
gcc9-add-fomit-frame-pointer-to-test.patch
gcc9-extend-live-patching-option-handling.patch
gcc9-ipa-stack-alignment-386-test.patch
- Introduce 'oracle_release' into .spec file. Echo it to gcc/DEV-PHASE.
- Backport 17 ampere patches from
https://git.theobroma-systems.com/ampere-computing/gcc.git/log/?h=gcc-8_2_0-amp3-branch
e18301133ea622f6d6796ded1d15466e70475cf8: Retpoline (Spectre-V2 mitigation) for
aarch64.
d735f3ae4712f66362326d179b4d7e9332c79677: Revert 2017-10-24 Richard Biener
271e2811e59c0c77fc022fa86a7030f20b4cac8e: Correct the maximum shift amount for
shifted
0512749950d927de3dd695f2f2aacdfd30cf32fd: Add CPU support for Ampere Computings
eMAG.
c8b87078f9e0714cb9cab602e12a18ceb12df05a: eMAG/Xgene: Procedural cost-model for
X-Gene
74610471b3577c5d465c3fd095a65b796b1e074c: Updating cost table for xgene1.
ddba1553ac412be5596e6e2962c148032c4cf231: [AArch64] Add Xgene1 prefetch tunings.
b7ebb0a10a8900324074070188a0936ed81b28a4: [AArch64] Fix in xgene1_addrcost_table
393dc5c50d55d069f91627bf0be5bab812978850: X-Gene: Adapt tuning struct for GCC 8.
b9136d58824af2118c4969c3edb42cad3318b08f: tree-ssa-list-find-pipeline:
Add pipelining loads for list finds.
095496dd8a9491a17a9caec173281ad02e559df5: uncse: Added pass to undo common
subexpression elimination.
a7c8dc238e3656e9d2f9256ee76f933c8d7956fb: loop-prefetcher: Adapt defaults for
X-Gene cores.
256307f293f1750851576e14c8a42b696eced2da: tree-ssa-cpp: Dont crash on SSA names
without definition stmts.
6e32f53be4f6733f6bfe267ad2337aecaf4047f6: Introduce new option -funroll-more.
1ac2485a2fced091a5cce6343fe6a6337f850e73: New option to bypass aliasing-checks.
66d7d833bece61e58998ad53a609cd32e3ee4fad: cfgloopmanip: Allow forced creation
of loop preheaders.
c4f89d50e200538b1ac8889801705300e0b27ef2: Add new pass to optimise loops.
- Reviewed by: Elena Zannoni
[8.3.1-5]
- update from Fedora gcc-8.3.1-5 (#1747157)
- use unspec_volatile for darn (PR target/91481, #1760205, CVE-2019-15847)
Affected Package
Related
{"id": "ELSA-2020-1864", "type": "oraclelinux", "bulletinFamily": "unix", "title": "gcc security and bug fix update", "description": "[8.3.1-5.0.3]\n- Fix Orabug 29838827 - provide an option to adjust the maximum depth of nested #include\n This is the same bug as gcc upstream PR90581 from Gcc9:\n gcc9-pr90581.patch\n- Fix Orabug 29541051 - confusing error message when there is a problem\n with ASAN_OPTIONS 'ERROR: expected '=''\n This is the same bug as gcc upstream PR89832 from Gcc9:\n gcc9-pr89832.patch\n[8.3.1-5.0.2]\n- Update support for CTF\n- Fix Orabug 30833294 GCC generates incorrect CTF for single element arrays\n- Fix Orabug 30808764 CTF generation fails when __attribute__ ((mode (XX))) is\n used\n[8.3.1-5.0.1]\n- Forward-port Oracle patches from ol8-u1.\n- Apply ares/neoverse support patches only ifarch aarch64.\n (Qing Zhao \n 8.3.1-4.5.0.6)\n- Add 5 patches from gcc9 to support Arm Ares and Neoverse-N1 for Aarch64\n gcc9-add-mtune-support-for-arm-ares.patch\n gcc9-add-vec-reverse.patch\n gcc9-multiple-changes-align.patch\n gcc9-initial-mcpu-ares-tuning.patch\n gcc9-add-support-for-neoverse-n1.patch\n (Indu Bhagat \n 8.3.1-4.5.0.5)\n- Update support for CTF\n- Fix Orabug 30778534 gcc should generate CTF for functions at file-scope only\n- Fix Orabug 30779193 CTF generation fails for some flavors of vla\n- Fix Orabug 30784275 Fix issues wtih CTF generation for typedef constructs\n ctf-3-generation-and-emission-for-a-single-compilation.patch\n ctf-4-update-ctf-testsuite.patch\n (Indu Bhagat \n 8.3.1-4.5.0.4)\n- Add support for CTF in GCC\n- Fix Orabug 30102948 gcc: Add CTF generation to compiler\n- Fix Orabug 30102949 gcc: Add CTF generation to compiler (aarch64)\n ctf-1-new-function-lang_GNU_GIMPLE.patch\n ctf-2-command-line-options-gtLEVEL.patch\n ctf-3-generation-and-emission-for-a-single-compilation.patch\n ctf-4-update-ctf-testsuite.patch\n ctf-5-handle-ctf-sections-when-lto-enabled.patch\n (Qing Zhao \n 8.3.1-4.5.0.3)\n- CVE-2018-12207 / Intel SKX102\n OL8 gcc: Intel Mitigation for CVE: CVE-2018-12207\n- Allow -flto -Wa,-mbranches-within-32B-boundaries to pass -mbranches-within-32B-boundaries\n to GNU assembler. Without -lfto, -Wa,-mbranches-within-32B-boundaries to pass\n -mbranches-within-32B-boundaries to GNU assembler using existing GCC binaries.\n- Mitigation patch:\n gcc8-Fix-Wa-with-flto.patch\n (Qing Zhao \n 8.3.1-4.5.0.2)\n- Fix Orabug 29968294 - Heap corruption with fprofile-dir=%p prevents\n profiling parallel processes, needed for RDBMS:\n Add patch to fix PR86057 from Gcc9:\n gcc9-pr86057.patch\n- Fix Orabug 30044244 - Profile directory concatenated with object file path\n This is the same bug as gcc upstream PR91971:\n gcc9-pr85759.patch\n gcc10-pr91971.patch\n (Indu Bhagat \n 8.3.1-4.5.0.1)\n- Fix Orabug 29599147 - Need -fprofile-dir=%q{VAR} backported to gcc8\n This is the similar GCC PR47618, add the fix from GCC9:\n gcc9-pr47618.patch\n- Fix Orabug 29272977 - DB SUPPORT: Need way to dump inlining report from GCC\n Add -fopt-info-inline support from GCC9:\n gcc9-opt-info-inline.patch\n- Fix Orabug 29273006 - DB SUPPORT: need way to turn off inlining of global functions\n Add -flive-patching support from GCC9:\n gcc9-fipa-reference-addressable.patch\n gcc9-fipa-stack-alignment.patch\n gcc9-add-fomit-frame-pointer-to-test.patch\n gcc9-extend-live-patching-option-handling.patch\n gcc9-ipa-stack-alignment-386-test.patch\n- Introduce 'oracle_release' into .spec file. Echo it to gcc/DEV-PHASE.\n- Backport 17 ampere patches from\n https://git.theobroma-systems.com/ampere-computing/gcc.git/log/?h=gcc-8_2_0-amp3-branch\n e18301133ea622f6d6796ded1d15466e70475cf8: Retpoline (Spectre-V2 mitigation) for\n \t\t\t\t\t aarch64.\n d735f3ae4712f66362326d179b4d7e9332c79677: Revert 2017-10-24 Richard Biener\n 271e2811e59c0c77fc022fa86a7030f20b4cac8e: Correct the maximum shift amount for\n \t\t\t\t\t shifted\n 0512749950d927de3dd695f2f2aacdfd30cf32fd: Add CPU support for Ampere Computings\n \t\t\t\t \t eMAG.\n c8b87078f9e0714cb9cab602e12a18ceb12df05a: eMAG/Xgene: Procedural cost-model for\n \t\t\t\t\t X-Gene\n 74610471b3577c5d465c3fd095a65b796b1e074c: Updating cost table for xgene1.\n ddba1553ac412be5596e6e2962c148032c4cf231: [AArch64] Add Xgene1 prefetch tunings.\n b7ebb0a10a8900324074070188a0936ed81b28a4: [AArch64] Fix in xgene1_addrcost_table\n 393dc5c50d55d069f91627bf0be5bab812978850: X-Gene: Adapt tuning struct for GCC 8.\n b9136d58824af2118c4969c3edb42cad3318b08f: tree-ssa-list-find-pipeline:\n \t\t\t\t\t Add pipelining loads for list finds.\n 095496dd8a9491a17a9caec173281ad02e559df5: uncse: Added pass to undo common\n \t\t\t\t\t subexpression elimination.\n a7c8dc238e3656e9d2f9256ee76f933c8d7956fb: loop-prefetcher: Adapt defaults for\n \t\t\t\t\t X-Gene cores.\n 256307f293f1750851576e14c8a42b696eced2da: tree-ssa-cpp: Dont crash on SSA names\n \t\t\t\t\t without definition stmts.\n 6e32f53be4f6733f6bfe267ad2337aecaf4047f6: Introduce new option -funroll-more.\n 1ac2485a2fced091a5cce6343fe6a6337f850e73: New option to bypass aliasing-checks.\n 66d7d833bece61e58998ad53a609cd32e3ee4fad: cfgloopmanip: Allow forced creation\n \t\t\t\t\t of loop preheaders.\n c4f89d50e200538b1ac8889801705300e0b27ef2: Add new pass to optimise loops.\n- Reviewed by: Elena Zannoni \n[8.3.1-5]\n- update from Fedora gcc-8.3.1-5 (#1747157)\n- use unspec_volatile for darn (PR target/91481, #1760205, CVE-2019-15847)", "published": "2020-05-05T00:00:00", "modified": "2020-05-05T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 3.9, "impactScore": 3.6}, "href": "http://linux.oracle.com/errata/ELSA-2020-1864.html", "reporter": "OracleLinux", "references": [], "cvelist": ["CVE-2018-12207", "CVE-2019-15847"], "immutableFields": [], "lastseen": "2021-07-28T14:24:36", "viewCount": 51, "enchantments": {"dependencies": {"references": [{"type": "amazon", "idList": ["ALAS-2019-1322", "ALAS2-2019-1366"]}, {"type": "centos", "idList": ["CESA-2019:3834", "CESA-2019:3836"]}, {"type": "citrix", "idList": ["CTX263684"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:A9246B54233F05FAAFEBCA42A471540D", "CFOUNDRY:F1FD906C8A4009015525A4BE5BA37775"]}, {"type": "cve", "idList": ["CVE-2018-12207", "CVE-2019-1391", "CVE-2019-15847", "CVE-2019-19339"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1990-1:DF706", "DEBIAN:DSA-4564-1:E0777", "DEBIAN:DSA-4564-1:F8764", "DEBIAN:DSA-4602-1:C29F7"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-12207", "DEBIANCVE:CVE-2019-15847"]}, {"type": "f5", "idList": ["F5:K17269881"]}, {"type": "fedora", "idList": ["FEDORA:07FF360D17A8", "FEDORA:224AE608F491", "FEDORA:267796076024", "FEDORA:2CDA460E9B22", "FEDORA:2E87261278ED", "FEDORA:308A766A87C1", "FEDORA:347EC6014770", "FEDORA:371E06040B12", "FEDORA:4002B609954A", "FEDORA:511A7608E6E1", "FEDORA:51B856067EB8", "FEDORA:5445B61185FA", "FEDORA:56A076119752", "FEDORA:59E3F606D998", "FEDORA:5BC786077CC2", "FEDORA:5F24260E9922", "FEDORA:5FE4A6076D31", "FEDORA:628EB603ECD0", "FEDORA:6D8F5627F513", "FEDORA:803AE30C6416", "FEDORA:87DAB6118614", "FEDORA:89A31604C861", "FEDORA:8C2F86119EC0", "FEDORA:8FEA960A4096", "FEDORA:94BC060A4ECF", "FEDORA:9E9D96119EC1", "FEDORA:B7184611861B", "FEDORA:BF5EC607125E", "FEDORA:C1D196119EC1", "FEDORA:C63426076F58", "FEDORA:C63656040AE1", "FEDORA:C7391611860D", "FEDORA:CB0956087865", "FEDORA:E9C7E608767D", "FEDORA:EC9F26076D31"]}, {"type": "freebsd", "idList": ["EDC0BF7E-05A1-11EA-9DFA-F8B156AC3FF9"]}, {"type": "gentoo", "idList": ["GLSA-202003-56"]}, {"type": "ibm", "idList": ["0EF2B3BEA4403B998499114AE5D3693C840E985B7ECCF95FA6F6834A4F819197"]}, {"type": "intel", "idList": ["INTEL:INTEL-SA-00210"]}, {"type": "kaspersky", "idList": ["KLA11608", "KLA11871"]}, {"type": "mageia", "idList": ["MGASA-2019-0332", "MGASA-2019-0333", "MGASA-2019-0334", "MGASA-2019-0413", "MGASA-2020-0113"]}, {"type": "mscve", "idList": ["MS:CVE-2018-12207"]}, {"type": "mskb", "idList": ["KB4523205", "KB4524570", "KB4525232", "KB4525233", "KB4525235", "KB4525236", "KB4525237", "KB4525241", "KB4525243", "KB4525245", "KB4525246", "KB4525250", "KB4525253"]}, {"type": "nessus", "idList": ["AL2_ALAS-2019-1366.NASL", "ALA_ALAS-2019-1322.NASL", "CENTOS_RHSA-2019-3834.NASL", "CENTOS_RHSA-2019-3836.NASL", "DEBIAN_DLA-1990.NASL", "DEBIAN_DSA-4564.NASL", "DEBIAN_DSA-4602.NASL", "EULEROS_SA-2019-2073.NASL", "EULEROS_SA-2019-2308.NASL", "EULEROS_SA-2020-1112.NASL", "EULEROS_SA-2020-1396.NASL", "EULEROS_SA-2020-1792.NASL", "F5_BIGIP_SOL17269881.NASL", "FEDORA_2019-1689D3FE07.NASL", "FEDORA_2019-376EC5C107.NASL", "FEDORA_2019-68D7F68507.NASL", "FEDORA_2019-7A3FC17778.NASL", "FEDORA_2019-CBB732F760.NASL", "FREEBSD_PKG_EDC0BF7E05A111EA9DFAF8B156AC3FF9.NASL", "GENTOO_GLSA-202003-56.NASL", "NEWSTART_CGSL_NS-SA-2019-0264_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0266_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2020-0002_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2020-0021_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2022-0075_KERNEL.NASL", "OPENSUSE-2019-2364.NASL", "OPENSUSE-2019-2365.NASL", "OPENSUSE-2019-2503.NASL", "OPENSUSE-2019-2505.NASL", "OPENSUSE-2019-2506.NASL", "OPENSUSE-2019-2507.NASL", "OPENSUSE-2019-2508.NASL", "OPENSUSE-2019-2510.NASL", "OPENSUSE-2019-2710.NASL", "OPENSUSE-2020-716.NASL", "ORACLELINUX_ELSA-2019-3832.NASL", "ORACLELINUX_ELSA-2019-3834.NASL", "ORACLELINUX_ELSA-2019-3836.NASL", "ORACLELINUX_ELSA-2019-4836.NASL", "ORACLELINUX_ELSA-2019-4837.NASL", "ORACLELINUX_ELSA-2019-4850.NASL", "ORACLEVM_OVMSA-2019-0052.NASL", "ORACLEVM_OVMSA-2019-0054.NASL", "ORACLEVM_OVMSA-2019-0056.NASL", "ORACLEVM_OVMSA-2020-0027.NASL", "ORACLEVM_OVMSA-2020-0039.NASL", "REDHAT-RHSA-2019-3832.NASL", "REDHAT-RHSA-2019-3833.NASL", "REDHAT-RHSA-2019-3834.NASL", "REDHAT-RHSA-2019-3835.NASL", "REDHAT-RHSA-2019-3836.NASL", "REDHAT-RHSA-2019-3837.NASL", "REDHAT-RHSA-2019-3838.NASL", "REDHAT-RHSA-2019-3839.NASL", "REDHAT-RHSA-2019-3840.NASL", "REDHAT-RHSA-2019-3841.NASL", "REDHAT-RHSA-2019-3842.NASL", "REDHAT-RHSA-2019-3843.NASL", "REDHAT-RHSA-2019-3844.NASL", "REDHAT-RHSA-2019-3860.NASL", "REDHAT-RHSA-2019-3936.NASL", "REDHAT-RHSA-2019-4245.NASL", "REDHAT-RHSA-2020-0026.NASL", "REDHAT-RHSA-2020-0028.NASL", "REDHAT-RHSA-2020-0204.NASL", "REDHAT-RHSA-2020-1864.NASL", "SL_20191113_KERNEL_ON_SL6_X.NASL", "SL_20191113_KERNEL_ON_SL7_X.NASL", "SMB_NT_MS19_NOV_4523205.NASL", "SMB_NT_MS19_NOV_4524570.NASL", "SMB_NT_MS19_NOV_4525232.NASL", "SMB_NT_MS19_NOV_4525235.NASL", "SMB_NT_MS19_NOV_4525236.NASL", "SMB_NT_MS19_NOV_4525237.NASL", "SMB_NT_MS19_NOV_4525241.NASL", "SMB_NT_MS19_NOV_4525243.NASL", "SMB_NT_MS19_NOV_4525246.NASL", "SOLARIS_JUL2020_SRU11_4_21_69_0.NASL", "SUSE_SU-2019-14218-1.NASL", "SUSE_SU-2019-2702-1.NASL", "SUSE_SU-2019-2946-1.NASL", "SUSE_SU-2019-2947-1.NASL", "SUSE_SU-2019-2948-1.NASL", "SUSE_SU-2019-2949-1.NASL", "SUSE_SU-2019-2950-1.NASL", "SUSE_SU-2019-2953-1.NASL", "SUSE_SU-2019-2954-1.NASL", "SUSE_SU-2019-2955-1.NASL", "SUSE_SU-2019-2956-1.NASL", "SUSE_SU-2019-2960-1.NASL", "SUSE_SU-2019-2961-1.NASL", "SUSE_SU-2019-2962-1.NASL", "SUSE_SU-2019-2984-1.NASL", "SUSE_SU-2019-3061-1.NASL", "SUSE_SU-2019-3295-1.NASL", "SUSE_SU-2019-3297-1.NASL", "SUSE_SU-2019-3340-1.NASL", "SUSE_SU-2019-3348-1.NASL", "SUSE_SU-2020-0093-1.NASL", "SUSE_SU-2020-0334-1.NASL", "SUSE_SU-2020-0388-1.NASL", "SUSE_SU-2020-0394-1.NASL", "SUSE_SU-2020-14444-1.NASL", "UBUNTU_USN-4183-1.NASL", "UBUNTU_USN-4183-2.NASL", "UBUNTU_USN-4184-1.NASL", "UBUNTU_USN-4184-2.NASL", "UBUNTU_USN-4185-1.NASL", "UBUNTU_USN-4185-3.NASL", "UBUNTU_USN-4186-1.NASL", "UBUNTU_USN-4186-3.NASL", "VIRTUOZZO_VZA-2019-089.NASL", "VMWARE_VMSA-2019-0020.NASL", "XEN_SERVER_XSA-304.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108766", "OPENVAS:1361412562310108767", "OPENVAS:1361412562310704564", "OPENVAS:1361412562310704602", "OPENVAS:1361412562310815720", "OPENVAS:1361412562310815722", "OPENVAS:1361412562310815834", "OPENVAS:1361412562310815835", "OPENVAS:1361412562310815836", "OPENVAS:1361412562310815837", "OPENVAS:1361412562310815839", "OPENVAS:1361412562310844230", "OPENVAS:1361412562310844231", "OPENVAS:1361412562310844233", "OPENVAS:1361412562310844234", "OPENVAS:1361412562310844235", "OPENVAS:1361412562310844236", "OPENVAS:1361412562310844274", "OPENVAS:1361412562310844277", "OPENVAS:1361412562310852747", "OPENVAS:1361412562310852772", "OPENVAS:1361412562310852773", "OPENVAS:1361412562310852774", "OPENVAS:1361412562310852810", "OPENVAS:1361412562310852883", "OPENVAS:1361412562310852891", "OPENVAS:1361412562310852949", "OPENVAS:1361412562310853181", "OPENVAS:1361412562310876993", "OPENVAS:1361412562310876995", "OPENVAS:1361412562310876996", "OPENVAS:1361412562310876997", "OPENVAS:1361412562310876998", "OPENVAS:1361412562310876999", "OPENVAS:1361412562310877000", "OPENVAS:1361412562310877001", "OPENVAS:1361412562310877045", "OPENVAS:1361412562310877052", "OPENVAS:1361412562310877058", "OPENVAS:1361412562310877070", "OPENVAS:1361412562310877081", "OPENVAS:1361412562310877102", "OPENVAS:1361412562310877113", "OPENVAS:1361412562310877132", "OPENVAS:1361412562310877136", "OPENVAS:1361412562310877144", "OPENVAS:1361412562310877169", "OPENVAS:1361412562310877197", "OPENVAS:1361412562310877198", "OPENVAS:1361412562310877209", "OPENVAS:1361412562310877213", "OPENVAS:1361412562310877281", "OPENVAS:1361412562310877292", "OPENVAS:1361412562310877358", "OPENVAS:1361412562310877370", "OPENVAS:1361412562310877391", "OPENVAS:1361412562310877407", "OPENVAS:1361412562310877476", "OPENVAS:1361412562310877479", "OPENVAS:1361412562310877533", "OPENVAS:1361412562310877540", "OPENVAS:1361412562310877541", "OPENVAS:1361412562310877952", "OPENVAS:1361412562310883131", "OPENVAS:1361412562310883133", "OPENVAS:1361412562310891990", "OPENVAS:1361412562311220192073", "OPENVAS:1361412562311220192308", "OPENVAS:1361412562311220201112", "OPENVAS:1361412562311220201396", "OPENVAS:1361412562311220201792"]}, {"type": "oracle", "idList": ["ORACLE:CPUJUL2020"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-3832", "ELSA-2019-3834", "ELSA-2019-3836", "ELSA-2019-3872", "ELSA-2019-3979", "ELSA-2019-4256", "ELSA-2019-4836", "ELSA-2019-4837", "ELSA-2019-4850", "ELSA-2019-4867", "ELSA-2019-4868", "ELSA-2020-1016"]}, {"type": "osv", "idList": ["OSV:DLA-1990-1", "OSV:DSA-4564-1", "OSV:DSA-4602-1"]}, {"type": "redhat", "idList": ["RHSA-2019:3832", "RHSA-2019:3833", "RHSA-2019:3834", "RHSA-2019:3835", "RHSA-2019:3836", "RHSA-2019:3837", "RHSA-2019:3838", "RHSA-2019:3839", "RHSA-2019:3840", "RHSA-2019:3841", "RHSA-2019:3842", "RHSA-2019:3843", "RHSA-2019:3844", "RHSA-2019:3860", "RHSA-2019:3916", "RHSA-2019:3936", "RHSA-2019:3941", "RHSA-2019:4245", "RHSA-2020:0026", "RHSA-2020:0028", "RHSA-2020:0204", "RHSA-2020:0924", "RHSA-2020:1864", "RHSA-2020:2274", "RHSA-2020:3194", "RHSA-2020:4298"]}, {"type": "redhatcve", "idList": ["RH:CVE-2018-12207", "RH:CVE-2019-15847", "RH:CVE-2019-19339"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:2364-1", "OPENSUSE-SU-2019:2365-1", "OPENSUSE-SU-2019:2503-1", "OPENSUSE-SU-2019:2505-1", "OPENSUSE-SU-2019:2506-1", "OPENSUSE-SU-2019:2507-1", "OPENSUSE-SU-2019:2510-1", "OPENSUSE-SU-2019:2710-1", "OPENSUSE-SU-2020:0716-1"]}, {"type": "symantec", "idList": ["SMNTC-110803"]}, {"type": "talosblog", "idList": ["TALOSBLOG:D617C7EFD22C4CD2ECFE1B030BD80B0E"]}, {"type": "ubuntu", "idList": ["USN-4183-1", "USN-4183-2", "USN-4184-1", "USN-4184-2", "USN-4185-1", "USN-4185-2", "USN-4185-3", "USN-4186-1", "USN-4186-2", "USN-4186-3"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-12207", "UB:CVE-2019-15847", "UB:CVE-2019-19339"]}, {"type": "veracode", "idList": ["VERACODE:21942", "VERACODE:22768"]}, {"type": "virtuozzo", "idList": ["VZA-2019-088", "VZA-2019-089"]}, {"type": "vmware", "idList": ["VMSA-2019-0020"]}, {"type": "xen", "idList": ["XSA-304"]}]}, "score": {"value": -0.5, "vector": "NONE"}, "backreferences": {"references": [{"type": "amazon", "idList": ["ALAS-2019-1322"]}, {"type": "centos", "idList": ["CESA-2019:3834", "CESA-2019:3836"]}, {"type": "citrix", "idList": ["CTX263684"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:A9246B54233F05FAAFEBCA42A471540D", "CFOUNDRY:F1FD906C8A4009015525A4BE5BA37775"]}, {"type": "cve", "idList": ["CVE-2018-12207", "CVE-2019-15847"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1990-1:DF706", "DEBIAN:DSA-4564-1:E0777"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2019-15847"]}, {"type": "f5", "idList": ["F5:K17269881"]}, {"type": "fedora", "idList": ["FEDORA:07FF360D17A8", "FEDORA:224AE608F491", "FEDORA:267796076024", "FEDORA:2CDA460E9B22", "FEDORA:2E87261278ED", "FEDORA:308A766A87C1", "FEDORA:347EC6014770", "FEDORA:371E06040B12", "FEDORA:4002B609954A", "FEDORA:511A7608E6E1", "FEDORA:51B856067EB8", "FEDORA:5445B61185FA", "FEDORA:56A076119752", "FEDORA:59E3F606D998", "FEDORA:5BC786077CC2", "FEDORA:5F24260E9922", "FEDORA:5FE4A6076D31", "FEDORA:628EB603ECD0", "FEDORA:6D8F5627F513", "FEDORA:803AE30C6416", "FEDORA:87DAB6118614", "FEDORA:89A31604C861", "FEDORA:8C2F86119EC0", "FEDORA:8FEA960A4096", "FEDORA:94BC060A4ECF", "FEDORA:9E9D96119EC1", "FEDORA:B7184611861B", "FEDORA:BF5EC607125E", "FEDORA:C1D196119EC1", "FEDORA:C63426076F58", "FEDORA:C63656040AE1", "FEDORA:C7391611860D", "FEDORA:CB0956087865", "FEDORA:E9C7E608767D", "FEDORA:EC9F26076D31"]}, {"type": "freebsd", "idList": ["EDC0BF7E-05A1-11EA-9DFA-F8B156AC3FF9"]}, {"type": "gentoo", "idList": ["GLSA-202003-56"]}, {"type": "ibm", "idList": ["0EF2B3BEA4403B998499114AE5D3693C840E985B7ECCF95FA6F6834A4F819197"]}, {"type": "kaspersky", "idList": ["KLA11608", "KLA11871"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/FREEBSD-CVE-2018-12207/", "MSF:ILITIES/REDHAT-OPENSHIFT-CVE-2018-12207/", "MSF:ILITIES/REDHAT_LINUX-CVE-2018-12207/"]}, {"type": "mscve", "idList": ["MS:CVE-2018-12207"]}, {"type": "mskb", "idList": ["KB4525233", "KB4525237", "KB4525241", "KB4525250", "KB4525253"]}, {"type": "nessus", "idList": ["AL2_ALAS-2019-1366.NASL", "ALA_ALAS-2019-1322.NASL", "CENTOS_RHSA-2019-3834.NASL", "CENTOS_RHSA-2019-3836.NASL", "DEBIAN_DLA-1990.NASL", "DEBIAN_DSA-4564.NASL", "EULEROS_SA-2019-2073.NASL", "EULEROS_SA-2019-2308.NASL", "FEDORA_2019-1689D3FE07.NASL", "FEDORA_2019-376EC5C107.NASL", "FEDORA_2019-68D7F68507.NASL", "FEDORA_2019-7A3FC17778.NASL", "FEDORA_2019-CBB732F760.NASL", "FREEBSD_PKG_EDC0BF7E05A111EA9DFAF8B156AC3FF9.NASL", "GENTOO_GLSA-202003-56.NASL", "OPENSUSE-2019-2503.NASL", "OPENSUSE-2019-2505.NASL", "OPENSUSE-2019-2506.NASL", "OPENSUSE-2019-2507.NASL", "OPENSUSE-2019-2508.NASL", "OPENSUSE-2019-2510.NASL", "ORACLELINUX_ELSA-2019-3832.NASL", "ORACLELINUX_ELSA-2019-3834.NASL", "ORACLELINUX_ELSA-2019-3836.NASL", "ORACLELINUX_ELSA-2019-4836.NASL", "ORACLELINUX_ELSA-2019-4837.NASL", "ORACLELINUX_ELSA-2019-4850.NASL", "ORACLEVM_OVMSA-2019-0052.NASL", "ORACLEVM_OVMSA-2019-0054.NASL", "ORACLEVM_OVMSA-2019-0056.NASL", "REDHAT-RHSA-2019-3832.NASL", "REDHAT-RHSA-2019-3833.NASL", "REDHAT-RHSA-2019-3834.NASL", "REDHAT-RHSA-2019-3835.NASL", "REDHAT-RHSA-2019-3836.NASL", "REDHAT-RHSA-2019-3837.NASL", "REDHAT-RHSA-2019-3838.NASL", "REDHAT-RHSA-2019-3839.NASL", "REDHAT-RHSA-2019-3840.NASL", "REDHAT-RHSA-2019-3841.NASL", "REDHAT-RHSA-2019-3842.NASL", "REDHAT-RHSA-2019-3843.NASL", "REDHAT-RHSA-2019-3844.NASL", "REDHAT-RHSA-2019-3860.NASL", "REDHAT-RHSA-2019-3936.NASL", "SL_20191113_KERNEL_ON_SL6_X.NASL", "SL_20191113_KERNEL_ON_SL7_X.NASL", "SMB_NT_MS19_NOV_4523205.NASL", "SMB_NT_MS19_NOV_4524570.NASL", "SMB_NT_MS19_NOV_4525232.NASL", "SMB_NT_MS19_NOV_4525235.NASL", "SMB_NT_MS19_NOV_4525236.NASL", "SMB_NT_MS19_NOV_4525237.NASL", "SMB_NT_MS19_NOV_4525241.NASL", "SMB_NT_MS19_NOV_4525243.NASL", "SMB_NT_MS19_NOV_4525246.NASL", "SUSE_SU-2019-14218-1.NASL", "SUSE_SU-2019-2946-1.NASL", "SUSE_SU-2019-2947-1.NASL", "SUSE_SU-2019-2948-1.NASL", "SUSE_SU-2019-2949-1.NASL", "SUSE_SU-2019-2950-1.NASL", "SUSE_SU-2019-2953-1.NASL", "SUSE_SU-2019-2954-1.NASL", "SUSE_SU-2019-2955-1.NASL", "SUSE_SU-2019-2956-1.NASL", "SUSE_SU-2019-2960-1.NASL", "SUSE_SU-2019-2961-1.NASL", "SUSE_SU-2019-2962-1.NASL", "SUSE_SU-2019-2984-1.NASL", "SUSE_SU-2019-3061-1.NASL", "SUSE_SU-2019-3295-1.NASL", "SUSE_SU-2019-3297-1.NASL", "SUSE_SU-2019-3340-1.NASL", "SUSE_SU-2019-3348-1.NASL", "SUSE_SU-2020-14444-1.NASL", "UBUNTU_USN-4183-1.NASL", "UBUNTU_USN-4183-2.NASL", "UBUNTU_USN-4184-1.NASL", "UBUNTU_USN-4184-2.NASL", "UBUNTU_USN-4185-1.NASL", "UBUNTU_USN-4185-3.NASL", "UBUNTU_USN-4186-1.NASL", "UBUNTU_USN-4186-3.NASL", "VIRTUOZZO_VZA-2019-089.NASL", "VMWARE_VMSA-2019-0020.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704564", "OPENVAS:1361412562310815720", "OPENVAS:1361412562310815722", "OPENVAS:1361412562310815834", "OPENVAS:1361412562310815835", "OPENVAS:1361412562310815836", "OPENVAS:1361412562310815837", "OPENVAS:1361412562310815839", "OPENVAS:1361412562310844230", "OPENVAS:1361412562310844231", "OPENVAS:1361412562310844233", "OPENVAS:1361412562310844234", "OPENVAS:1361412562310844235", "OPENVAS:1361412562310844236", "OPENVAS:1361412562310844274", "OPENVAS:1361412562310844277", "OPENVAS:1361412562310852747", "OPENVAS:1361412562310852772", "OPENVAS:1361412562310852773", "OPENVAS:1361412562310852774", "OPENVAS:1361412562310876993", "OPENVAS:1361412562310876995", "OPENVAS:1361412562310876996", "OPENVAS:1361412562310876997", "OPENVAS:1361412562310876998", "OPENVAS:1361412562310876999", "OPENVAS:1361412562310877000", "OPENVAS:1361412562310877001", "OPENVAS:1361412562310877045", "OPENVAS:1361412562310877052", "OPENVAS:1361412562310877058", "OPENVAS:1361412562310877070", "OPENVAS:1361412562310877081", "OPENVAS:1361412562310883131", "OPENVAS:1361412562310883133", "OPENVAS:1361412562310891990"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-3832", "ELSA-2019-3834", "ELSA-2019-3836", "ELSA-2019-3872", "ELSA-2019-3979", "ELSA-2019-4256", "ELSA-2019-4836", "ELSA-2019-4837", "ELSA-2019-4850", "ELSA-2019-4867", "ELSA-2019-4868", "ELSA-2020-1016"]}, {"type": "redhat", "idList": ["RHSA-2019:3832", "RHSA-2019:3833", "RHSA-2019:3834", "RHSA-2019:3836", "RHSA-2019:3837", "RHSA-2019:3838", "RHSA-2019:3840", "RHSA-2019:3842", "RHSA-2019:3843", "RHSA-2019:3860", "RHSA-2019:3936"]}, {"type": "redhatcve", "idList": ["RH:CVE-2019-19339"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:2364-1", "OPENSUSE-SU-2019:2365-1", "OPENSUSE-SU-2019:2503-1", "OPENSUSE-SU-2019:2505-1", "OPENSUSE-SU-2019:2506-1", "OPENSUSE-SU-2019:2507-1", "OPENSUSE-SU-2019:2510-1", "OPENSUSE-SU-2019:2710-1"]}, {"type": "talosblog", "idList": ["TALOSBLOG:D617C7EFD22C4CD2ECFE1B030BD80B0E"]}, {"type": "ubuntu", "idList": ["USN-4183-1", "USN-4183-2", "USN-4184-1", "USN-4184-2", "USN-4185-1", "USN-4185-2", "USN-4185-3", "USN-4186-1", "USN-4186-2", "USN-4186-3"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-12207", "UB:CVE-2019-15847"]}, {"type": "virtuozzo", "idList": ["VZA-2019-088", "VZA-2019-089"]}, {"type": "vmware", "idList": ["VMSA-2019-0020"]}, {"type": "xen", "idList": ["XSA-304"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2018-12207", "epss": "0.000460000", "percentile": "0.139990000", "modified": "2023-03-15"}, {"cve": "CVE-2019-15847", "epss": "0.002180000", "percentile": "0.580270000", "modified": "2023-03-15"}], "vulnersScore": -0.5}, "affectedPackage": [{"OS": "oracle linux", "OSVersion": "8", "arch": "src", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-8.3.1-5.0.3.el8.src.rpm", "operator": "lt", "packageName": "gcc"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "cpp-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "cpp"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "gcc"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-c++-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "gcc-c++"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-gdb-plugin-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "gcc-gdb-plugin"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-gfortran-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "gcc-gfortran"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-plugin-devel-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "gcc-plugin-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libasan-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libasan"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libatomic-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libatomic"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libatomic-static-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libatomic-static"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgcc-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libgcc"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgfortran-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libgfortran"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgomp-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libgomp"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libitm-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libitm"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libitm-devel-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libitm-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "liblsan-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "liblsan"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libstdc++"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-devel-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libstdc++-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-docs-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libstdc++-docs"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-static-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libstdc++-static"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libtsan-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libtsan"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "aarch64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libubsan-8.3.1-5.0.3.el8.aarch64.rpm", "operator": "lt", "packageName": "libubsan"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "src", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-8.3.1-5.0.3.el8.src.rpm", "operator": "lt", "packageName": "gcc"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "cpp-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "cpp"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "gcc"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-c++-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "gcc-c++"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-gdb-plugin-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "gcc-gdb-plugin"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-gdb-plugin-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "gcc-gdb-plugin"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-gfortran-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "gcc-gfortran"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-offload-nvptx-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "gcc-offload-nvptx"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-plugin-devel-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "gcc-plugin-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "gcc-plugin-devel-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "gcc-plugin-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libasan-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libasan"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libasan-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libasan"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libatomic-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libatomic"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libatomic-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libatomic"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libatomic-static-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libatomic-static"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libatomic-static-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libatomic-static"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgcc-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libgcc"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgcc-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libgcc"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgfortran-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libgfortran"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgfortran-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libgfortran"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgomp-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libgomp"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgomp-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libgomp"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libgomp-offload-nvptx-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libgomp-offload-nvptx"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libitm-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libitm"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libitm-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libitm"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libitm-devel-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libitm-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libitm-devel-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libitm-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "liblsan-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "liblsan"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libquadmath-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libquadmath"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libquadmath-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libquadmath"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libquadmath-devel-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libquadmath-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libquadmath-devel-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libquadmath-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libstdc++"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libstdc++"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-devel-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libstdc++-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-devel-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libstdc++-devel"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-docs-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libstdc++-docs"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-static-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libstdc++-static"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libstdc++-static-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libstdc++-static"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libtsan-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libtsan"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "i686", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libubsan-8.3.1-5.0.3.el8.i686.rpm", "operator": "lt", "packageName": "libubsan"}, {"OS": "oracle linux", "OSVersion": "8", "arch": "x86_64", "packageVersion": "8.3.1-5.0.3.el8", "packageFilename": "libubsan-8.3.1-5.0.3.el8.x86_64.rpm", "operator": "lt", "packageName": "libubsan"}], "_state": {"dependencies": 1660012827, "score": 1698838921, "epss": 1678895942}, "_internal": {"score_hash": "4751f275691778edb0e0afaa7d97c526"}}
{"prion": [{"lastseen": "2023-11-22T02:03:51", "description": "The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 7.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2019-09-02T23:15:00", "type": "prion", "title": "Design/Logic Flaw", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-15847"], "modified": "2020-09-17T13:38:00", "id": "PRION:CVE-2019-15847", "href": "https://www.prio-n.com/kb/vulnerability/CVE-2019-15847", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2023-11-22T02:30:46", "description": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.", "cvss3": {"cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}}, "published": "2019-11-14T20:15:00", "type": "prion", "title": "Input validation", "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 3.1, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0", "accessVector": "LOCAL", "authentication": "SINGLE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-12207"], "modified": "2023-09-27T20:51:00", "id": "PRION:CVE-2018-12207", "href": "https://www.prio-n.com/kb/vulnerability/CVE-2018-12207", "cvss": {"score": 1.7, "vector": "AV:L/AC:L/Au:S/C:N/I:N/A:P"}}, {"lastseen": "2023-11-22T02:08:52", "description": "It was found that the Red Hat Enterprise Linux 8 kpatch update did not include the complete fix for CVE-2018-12207. A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU's local cache and system software's Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor. System software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor's Memory Management Unit (MMU) uses Paging structure entries to translate program's virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses. System software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor's TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.", "cvss3": {"exploitabilityScore": 2.0, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 4.0}, "published": "2020-01-17T19:15:00", "type": "prion", "title": "Code injection", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-12207", "CVE-2019-19339"], "modified": "2020-10-19T19:52:00", "id": "PRION:CVE-2019-19339", "href": "https://www.prio-n.com/kb/vulnerability/CVE-2019-19339", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2023-11-22T01:59:51", "description": "A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'. This CVE ID is unique from CVE-2018-12207.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "baseScore": 5.5, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 3.6}, "published": "2019-11-12T19:15:00", "type": "prion", "title": "Denial of service", "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "impactScore": 6.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-12207", "CVE-2019-1391"], "modified": "2020-08-24T17:37:00", "id": "PRION:CVE-2019-1391", "href": "https://www.prio-n.com/kb/vulnerability/CVE-2019-1391", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:C"}}], "nessus": [{"lastseen": "2023-05-24T14:32:50", "description": "According to the version of the gcc packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerability :\n\n - This is compiler for arm64. Security Fix(es):The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.(CVE-2019-15847)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-12-03T00:00:00", "type": "nessus", "title": "EulerOS Virtualization for ARM 64 3.0.2.0 : gcc (EulerOS-SA-2019-2308)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-15847"], "modified": "2021-02-09T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:cpp", "p-cpe:/a:huawei:euleros:gcc", "p-cpe:/a:huawei:euleros:gcc-c%2b%2b", "p-cpe:/a:huawei:euleros:gcc-gfortran", "p-cpe:/a:huawei:euleros:libgcc", "p-cpe:/a:huawei:euleros:libgfortran", "p-cpe:/a:huawei:euleros:libgomp", "p-cpe:/a:huawei:euleros:libstdc%2b%2b", "p-cpe:/a:huawei:euleros:libstdc%2b%2b-devel", "cpe:/o:huawei:euleros:uvp:3.0.2.0"], "id": "EULEROS_SA-2019-2308.NASL", "href": "https://www.tenable.com/plugins/nessus/131473", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131473);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/09\");\n\n script_cve_id(\n \"CVE-2019-15847\"\n );\n\n script_name(english:\"EulerOS Virtualization for ARM 64 3.0.2.0 : gcc (EulerOS-SA-2019-2308)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization for ARM 64 host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the gcc packages installed, the EulerOS\nVirtualization for ARM 64 installation on the remote host is affected\nby the following vulnerability :\n\n - This is compiler for arm64. Security Fix(es):The POWER9\n backend in GNU Compiler Collection (GCC) before version\n 10 could optimize multiple calls of the __builtin_darn\n intrinsic into a single call, thus reducing the entropy\n of the random number generator. This occurred because a\n volatile operation was not specified. For example,\n within a single execution of a program, the output of\n every __builtin_darn() call may be the\n same.(CVE-2019-15847)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2308\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?50a93f86\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected gcc package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:cpp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gcc-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gcc-gfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libgcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libgfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libgomp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libstdc++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libstdc++-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:3.0.2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"3.0.2.0\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 3.0.2.0\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"cpp-7.3.0-20190804.h18\",\n \"gcc-7.3.0-20190804.h18\",\n \"gcc-c++-7.3.0-20190804.h18\",\n \"gcc-gfortran-7.3.0-20190804.h18\",\n \"libgcc-7.3.0-20190804.h18\",\n \"libgfortran-7.3.0-20190804.h18\",\n \"libgomp-7.3.0-20190804.h18\",\n \"libstdc++-7.3.0-20190804.h18\",\n \"libstdc++-devel-7.3.0-20190804.h18\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gcc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-09-10T16:47:17", "description": "The remote Oracle Linux 8 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2020-1864 advisory.\n\n - The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the\n __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator.\n This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same. (CVE-2019-15847)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-09-07T00:00:00", "type": "nessus", "title": "Oracle Linux 8 : gcc (ELSA-2020-1864)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-15847"], "modified": "2023-09-07T00:00:00", "cpe": ["cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:cpp", "p-cpe:/a:oracle:linux:gcc", "p-cpe:/a:oracle:linux:gcc-c%2b%2b", "p-cpe:/a:oracle:linux:gcc-gdb-plugin", "p-cpe:/a:oracle:linux:gcc-gfortran", "p-cpe:/a:oracle:linux:gcc-offload-nvptx", "p-cpe:/a:oracle:linux:gcc-plugin-devel", "p-cpe:/a:oracle:linux:libasan", "p-cpe:/a:oracle:linux:libatomic", "p-cpe:/a:oracle:linux:libatomic-static", "p-cpe:/a:oracle:linux:libgcc", "p-cpe:/a:oracle:linux:libgfortran", "p-cpe:/a:oracle:linux:libgomp", "p-cpe:/a:oracle:linux:libgomp-offload-nvptx", "p-cpe:/a:oracle:linux:libitm", "p-cpe:/a:oracle:linux:libitm-devel", "p-cpe:/a:oracle:linux:liblsan", "p-cpe:/a:oracle:linux:libquadmath", "p-cpe:/a:oracle:linux:libquadmath-devel", "p-cpe:/a:oracle:linux:libstdc%2b%2b", "p-cpe:/a:oracle:linux:libstdc%2b%2b-devel", "p-cpe:/a:oracle:linux:libstdc%2b%2b-docs", "p-cpe:/a:oracle:linux:libstdc%2b%2b-static", "p-cpe:/a:oracle:linux:libtsan", "p-cpe:/a:oracle:linux:libubsan"], "id": "ORACLELINUX_ELSA-2020-1864.NASL", "href": "https://www.tenable.com/plugins/nessus/180909", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-1864.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(180909);\n script_version(\"1.0\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/09/07\");\n\n script_cve_id(\"CVE-2019-15847\");\n\n script_name(english:\"Oracle Linux 8 : gcc (ELSA-2020-1864)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 8 host has packages installed that are affected by a vulnerability as referenced in the\nELSA-2020-1864 advisory.\n\n - The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the\n __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator.\n This occurred because a volatile operation was not specified. For example, within a single execution of a\n program, the output of every __builtin_darn() call may be the same. (CVE-2019-15847)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2020-1864.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-15847\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/05\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/09/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:cpp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gcc-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gcc-gdb-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gcc-gfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gcc-offload-nvptx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:gcc-plugin-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libasan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libatomic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libatomic-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libgcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libgfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libgomp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libgomp-offload-nvptx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libitm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libitm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:liblsan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libquadmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libquadmath-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libstdc++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libstdc++-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libstdc++-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libstdc++-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libtsan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libubsan\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(os_release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:os_release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 8', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\nvar pkgs = [\n {'reference':'cpp-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-c++-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gdb-plugin-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gfortran-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-plugin-devel-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-static-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgcc-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgfortran-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-devel-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-devel-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-docs-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-static-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan-8.3.1-5.0.3.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gdb-plugin-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-plugin-devel-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-static-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgcc-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgfortran-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-devel-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-devel-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-static-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan-8.3.1-5.0.3.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'cpp-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-c++-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gdb-plugin-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gfortran-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-offload-nvptx-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-plugin-devel-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-static-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgcc-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgfortran-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-offload-nvptx-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-devel-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-devel-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-docs-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-static-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan-8.3.1-5.0.3.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) _release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) _cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && _release) {\n if (exists_check) {\n if (rpm_exists(release:_release, rpm:exists_check) && rpm_check(release:_release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cpp / gcc / gcc-c++ / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-24T14:28:58", "description": "According to the version of the gcc packages installed, the EulerOS installation on the remote host is affected by the following vulnerability :\n\n - The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the\n __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator.\n This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.(CVE-2019-15847)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-09-30T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP8 : gcc (EulerOS-SA-2019-2073)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-15847"], "modified": "2021-02-09T00:00:00", "cpe": ["cpe:/o:huawei:euleros:2.0", "p-cpe:/a:huawei:euleros:cpp", "p-cpe:/a:huawei:euleros:gcc", "p-cpe:/a:huawei:euleros:gcc-gfortran", "p-cpe:/a:huawei:euleros:gcc-objc", "p-cpe:/a:huawei:euleros:libatomic", "p-cpe:/a:huawei:euleros:libatomic-static", "p-cpe:/a:huawei:euleros:libgcc", "p-cpe:/a:huawei:euleros:libgfortran", "p-cpe:/a:huawei:euleros:libgomp", "p-cpe:/a:huawei:euleros:libitm", "p-cpe:/a:huawei:euleros:libitm-devel", "p-cpe:/a:huawei:euleros:libobjc", "p-cpe:/a:huawei:euleros:libasan", "p-cpe:/a:huawei:euleros:gcc-c%2b%2b", "p-cpe:/a:huawei:euleros:gcc-objc%2b%2b", "p-cpe:/a:huawei:euleros:libstdc%2b%2b", "p-cpe:/a:huawei:euleros:libstdc%2b%2b-devel"], "id": "EULEROS_SA-2019-2073.NASL", "href": "https://www.tenable.com/plugins/nessus/129432", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(129432);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/02/09\");\n\n script_cve_id(\n \"CVE-2019-15847\"\n );\n\n script_name(english:\"EulerOS 2.0 SP8 : gcc (EulerOS-SA-2019-2073)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the gcc packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerability :\n\n - The POWER9 backend in GNU Compiler Collection (GCC)\n before version 10 could optimize multiple calls of the\n __builtin_darn intrinsic into a single call, thus\n reducing the entropy of the random number generator.\n This occurred because a volatile operation was not\n specified. For example, within a single execution of a\n program, the output of every __builtin_darn() call may\n be the same.(CVE-2019-15847)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2073\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3af278ca\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected gcc package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/09/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/09/30\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:cpp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gcc-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gcc-gfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gcc-objc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:gcc-objc++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libasan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libatomic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libatomic-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libgcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libgfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libgomp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libitm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libitm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libobjc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libstdc++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:libstdc++-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(8)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP8\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"aarch64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"aarch64\", cpu);\n\nflag = 0;\n\npkgs = [\"cpp-7.3.0-20190804.h19.eulerosv2r8\",\n \"gcc-7.3.0-20190804.h19.eulerosv2r8\",\n \"gcc-c++-7.3.0-20190804.h19.eulerosv2r8\",\n \"gcc-gfortran-7.3.0-20190804.h19.eulerosv2r8\",\n \"gcc-objc++-7.3.0-20190804.h19.eulerosv2r8\",\n \"gcc-objc-7.3.0-20190804.h19.eulerosv2r8\",\n \"libasan-7.3.0-20190804.h19.eulerosv2r8\",\n \"libatomic-7.3.0-20190804.h19.eulerosv2r8\",\n \"libatomic-static-7.3.0-20190804.h19.eulerosv2r8\",\n \"libgcc-7.3.0-20190804.h19.eulerosv2r8\",\n \"libgfortran-7.3.0-20190804.h19.eulerosv2r8\",\n \"libgomp-7.3.0-20190804.h19.eulerosv2r8\",\n \"libitm-7.3.0-20190804.h19.eulerosv2r8\",\n \"libitm-devel-7.3.0-20190804.h19.eulerosv2r8\",\n \"libobjc-7.3.0-20190804.h19.eulerosv2r8\",\n \"libstdc++-7.3.0-20190804.h19.eulerosv2r8\",\n \"libstdc++-devel-7.3.0-20190804.h19.eulerosv2r8\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"8\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gcc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-26T14:19:08", "description": "The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:1864 advisory.\n\n - gcc: POWER9 DARN RNG intrinsic produces repeated output (CVE-2019-15847)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-04-28T00:00:00", "type": "nessus", "title": "RHEL 8 : gcc (RHSA-2020:1864)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-15847"], "modified": "2023-05-25T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:rhel_aus:8.2", "cpe:/o:redhat:rhel_aus:8.4", "cpe:/o:redhat:rhel_aus:8.6", "cpe:/o:redhat:rhel_e4s:8.2", "cpe:/o:redhat:rhel_e4s:8.4", "cpe:/o:redhat:rhel_e4s:8.6", "cpe:/o:redhat:rhel_eus:8.2", "cpe:/o:redhat:rhel_eus:8.4", "cpe:/o:redhat:rhel_eus:8.6", "cpe:/o:redhat:rhel_tus:8.2", "cpe:/o:redhat:rhel_tus:8.4", "cpe:/o:redhat:rhel_tus:8.6", "p-cpe:/a:redhat:enterprise_linux:cpp", "p-cpe:/a:redhat:enterprise_linux:gcc", "p-cpe:/a:redhat:enterprise_linux:gcc-c%2b%2b", "p-cpe:/a:redhat:enterprise_linux:gcc-gdb-plugin", "p-cpe:/a:redhat:enterprise_linux:gcc-gfortran", "p-cpe:/a:redhat:enterprise_linux:gcc-offload-nvptx", "p-cpe:/a:redhat:enterprise_linux:gcc-plugin-devel", "p-cpe:/a:redhat:enterprise_linux:libasan", "p-cpe:/a:redhat:enterprise_linux:libatomic", "p-cpe:/a:redhat:enterprise_linux:libatomic-static", "p-cpe:/a:redhat:enterprise_linux:libgcc", "p-cpe:/a:redhat:enterprise_linux:libgfortran", "p-cpe:/a:redhat:enterprise_linux:libgomp", "p-cpe:/a:redhat:enterprise_linux:libgomp-offload-nvptx", "p-cpe:/a:redhat:enterprise_linux:libitm", "p-cpe:/a:redhat:enterprise_linux:libitm-devel", "p-cpe:/a:redhat:enterprise_linux:liblsan", "p-cpe:/a:redhat:enterprise_linux:libquadmath", "p-cpe:/a:redhat:enterprise_linux:libquadmath-devel", "p-cpe:/a:redhat:enterprise_linux:libstdc%2b%2b", "p-cpe:/a:redhat:enterprise_linux:libstdc%2b%2b-devel", "p-cpe:/a:redhat:enterprise_linux:libstdc%2b%2b-docs", "p-cpe:/a:redhat:enterprise_linux:libstdc%2b%2b-static", "p-cpe:/a:redhat:enterprise_linux:libtsan", "p-cpe:/a:redhat:enterprise_linux:libubsan"], "id": "REDHAT-RHSA-2020-1864.NASL", "href": "https://www.tenable.com/plugins/nessus/136055", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:1864. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(136055);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/05/25\");\n\n script_cve_id(\"CVE-2019-15847\");\n script_xref(name:\"RHSA\", value:\"2020:1864\");\n\n script_name(english:\"RHEL 8 : gcc (RHSA-2020:1864)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 8 host has packages installed that are affected by a vulnerability as referenced in\nthe RHSA-2020:1864 advisory.\n\n - gcc: POWER9 DARN RNG intrinsic produces repeated output (CVE-2019-15847)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-15847\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:1864\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1755523\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-15847\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(331);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/04/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/04/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.4\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:8.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:cpp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gcc-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gcc-gdb-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gcc-gfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gcc-offload-nvptx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:gcc-plugin-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libasan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libatomic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libatomic-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libgcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libgfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libgomp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libgomp-offload-nvptx\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libitm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libitm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:liblsan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libquadmath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libquadmath-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libstdc++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libstdc++-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libstdc++-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libstdc++-static\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libtsan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libubsan\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '8')) audit(AUDIT_OS_NOT, 'Red Hat 8.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.2/x86_64/appstream/debug',\n 'content/aus/rhel8/8.2/x86_64/appstream/os',\n 'content/aus/rhel8/8.2/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.2/x86_64/baseos/debug',\n 'content/aus/rhel8/8.2/x86_64/baseos/os',\n 'content/aus/rhel8/8.2/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.2/ppc64le/appstream/debug',\n 'content/e4s/rhel8/8.2/ppc64le/appstream/os',\n 'content/e4s/rhel8/8.2/ppc64le/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.2/ppc64le/baseos/debug',\n 'content/e4s/rhel8/8.2/ppc64le/baseos/os',\n 'content/e4s/rhel8/8.2/ppc64le/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.2/ppc64le/highavailability/debug',\n 'content/e4s/rhel8/8.2/ppc64le/highavailability/os',\n 'content/e4s/rhel8/8.2/ppc64le/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.2/ppc64le/sap-solutions/debug',\n 'content/e4s/rhel8/8.2/ppc64le/sap-solutions/os',\n 'content/e4s/rhel8/8.2/ppc64le/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.2/ppc64le/sap/debug',\n 'content/e4s/rhel8/8.2/ppc64le/sap/os',\n 'content/e4s/rhel8/8.2/ppc64le/sap/source/SRPMS',\n 'content/e4s/rhel8/8.2/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.2/x86_64/appstream/os',\n 'content/e4s/rhel8/8.2/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.2/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.2/x86_64/baseos/os',\n 'content/e4s/rhel8/8.2/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.2/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.2/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.2/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.2/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.2/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.2/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.2/x86_64/sap/debug',\n 'content/e4s/rhel8/8.2/x86_64/sap/os',\n 'content/e4s/rhel8/8.2/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.2/aarch64/appstream/debug',\n 'content/eus/rhel8/8.2/aarch64/appstream/os',\n 'content/eus/rhel8/8.2/aarch64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.2/aarch64/baseos/debug',\n 'content/eus/rhel8/8.2/aarch64/baseos/os',\n 'content/eus/rhel8/8.2/aarch64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.2/aarch64/codeready-builder/debug',\n 'content/eus/rhel8/8.2/aarch64/codeready-builder/os',\n 'content/eus/rhel8/8.2/aarch64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.2/aarch64/highavailability/debug',\n 'content/eus/rhel8/8.2/aarch64/highavailability/os',\n 'content/eus/rhel8/8.2/aarch64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.2/aarch64/supplementary/debug',\n 'content/eus/rhel8/8.2/aarch64/supplementary/os',\n 'content/eus/rhel8/8.2/aarch64/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.2/ppc64le/appstream/debug',\n 'content/eus/rhel8/8.2/ppc64le/appstream/os',\n 'content/eus/rhel8/8.2/ppc64le/appstream/source/SRPMS',\n 'content/eus/rhel8/8.2/ppc64le/baseos/debug',\n 'content/eus/rhel8/8.2/ppc64le/baseos/os',\n 'content/eus/rhel8/8.2/ppc64le/baseos/source/SRPMS',\n 'content/eus/rhel8/8.2/ppc64le/codeready-builder/debug',\n 'content/eus/rhel8/8.2/ppc64le/codeready-builder/os',\n 'content/eus/rhel8/8.2/ppc64le/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.2/ppc64le/highavailability/debug',\n 'content/eus/rhel8/8.2/ppc64le/highavailability/os',\n 'content/eus/rhel8/8.2/ppc64le/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.2/ppc64le/resilientstorage/debug',\n 'content/eus/rhel8/8.2/ppc64le/resilientstorage/os',\n 'content/eus/rhel8/8.2/ppc64le/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.2/ppc64le/sap-solutions/debug',\n 'content/eus/rhel8/8.2/ppc64le/sap-solutions/os',\n 'content/eus/rhel8/8.2/ppc64le/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.2/ppc64le/sap/debug',\n 'content/eus/rhel8/8.2/ppc64le/sap/os',\n 'content/eus/rhel8/8.2/ppc64le/sap/source/SRPMS',\n 'content/eus/rhel8/8.2/ppc64le/supplementary/debug',\n 'content/eus/rhel8/8.2/ppc64le/supplementary/os',\n 'content/eus/rhel8/8.2/ppc64le/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.2/x86_64/appstream/debug',\n 'content/eus/rhel8/8.2/x86_64/appstream/os',\n 'content/eus/rhel8/8.2/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.2/x86_64/baseos/debug',\n 'content/eus/rhel8/8.2/x86_64/baseos/os',\n 'content/eus/rhel8/8.2/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.2/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.2/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.2/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.2/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.2/x86_64/highavailability/os',\n 'content/eus/rhel8/8.2/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.2/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.2/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.2/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.2/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.2/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.2/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.2/x86_64/sap/debug',\n 'content/eus/rhel8/8.2/x86_64/sap/os',\n 'content/eus/rhel8/8.2/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.2/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.2/x86_64/supplementary/os',\n 'content/eus/rhel8/8.2/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.2/x86_64/appstream/debug',\n 'content/tus/rhel8/8.2/x86_64/appstream/os',\n 'content/tus/rhel8/8.2/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.2/x86_64/baseos/debug',\n 'content/tus/rhel8/8.2/x86_64/baseos/os',\n 'content/tus/rhel8/8.2/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.2/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.2/x86_64/highavailability/os',\n 'content/tus/rhel8/8.2/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.2/x86_64/nfv/debug',\n 'content/tus/rhel8/8.2/x86_64/nfv/os',\n 'content/tus/rhel8/8.2/x86_64/nfv/source/SRPMS',\n 'content/tus/rhel8/8.2/x86_64/rt/debug',\n 'content/tus/rhel8/8.2/x86_64/rt/os',\n 'content/tus/rhel8/8.2/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'cpp-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-c++-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gdb-plugin-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gfortran-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-offload-nvptx-8.3.1-5.el8', 'sp':'2', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-offload-nvptx-8.3.1-5.el8', 'sp':'2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-plugin-devel-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-static-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgcc-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgfortran-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-offload-nvptx-8.3.1-5.el8', 'sp':'2', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-offload-nvptx-8.3.1-5.el8', 'sp':'2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-devel-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'sp':'2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'sp':'2', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'sp':'2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'sp':'2', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'sp':'2', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'sp':'2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'sp':'2', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'sp':'2', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'sp':'2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-devel-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-docs-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-static-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'sp':'2', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'sp':'2', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'sp':'2', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan-8.3.1-5.el8', 'sp':'2', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.4/x86_64/appstream/debug',\n 'content/aus/rhel8/8.4/x86_64/appstream/os',\n 'content/aus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.4/x86_64/baseos/debug',\n 'content/aus/rhel8/8.4/x86_64/baseos/os',\n 'content/aus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.4/ppc64le/appstream/debug',\n 'content/e4s/rhel8/8.4/ppc64le/appstream/os',\n 'content/e4s/rhel8/8.4/ppc64le/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.4/ppc64le/baseos/debug',\n 'content/e4s/rhel8/8.4/ppc64le/baseos/os',\n 'content/e4s/rhel8/8.4/ppc64le/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.4/ppc64le/highavailability/debug',\n 'content/e4s/rhel8/8.4/ppc64le/highavailability/os',\n 'content/e4s/rhel8/8.4/ppc64le/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.4/ppc64le/sap-solutions/debug',\n 'content/e4s/rhel8/8.4/ppc64le/sap-solutions/os',\n 'content/e4s/rhel8/8.4/ppc64le/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.4/ppc64le/sap/debug',\n 'content/e4s/rhel8/8.4/ppc64le/sap/os',\n 'content/e4s/rhel8/8.4/ppc64le/sap/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.4/x86_64/appstream/os',\n 'content/e4s/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.4/x86_64/baseos/os',\n 'content/e4s/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.4/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.4/x86_64/sap/debug',\n 'content/e4s/rhel8/8.4/x86_64/sap/os',\n 'content/e4s/rhel8/8.4/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.4/aarch64/appstream/debug',\n 'content/eus/rhel8/8.4/aarch64/appstream/os',\n 'content/eus/rhel8/8.4/aarch64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.4/aarch64/baseos/debug',\n 'content/eus/rhel8/8.4/aarch64/baseos/os',\n 'content/eus/rhel8/8.4/aarch64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.4/aarch64/codeready-builder/debug',\n 'content/eus/rhel8/8.4/aarch64/codeready-builder/os',\n 'content/eus/rhel8/8.4/aarch64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.4/aarch64/highavailability/debug',\n 'content/eus/rhel8/8.4/aarch64/highavailability/os',\n 'content/eus/rhel8/8.4/aarch64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.4/aarch64/supplementary/debug',\n 'content/eus/rhel8/8.4/aarch64/supplementary/os',\n 'content/eus/rhel8/8.4/aarch64/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.4/ppc64le/appstream/debug',\n 'content/eus/rhel8/8.4/ppc64le/appstream/os',\n 'content/eus/rhel8/8.4/ppc64le/appstream/source/SRPMS',\n 'content/eus/rhel8/8.4/ppc64le/baseos/debug',\n 'content/eus/rhel8/8.4/ppc64le/baseos/os',\n 'content/eus/rhel8/8.4/ppc64le/baseos/source/SRPMS',\n 'content/eus/rhel8/8.4/ppc64le/codeready-builder/debug',\n 'content/eus/rhel8/8.4/ppc64le/codeready-builder/os',\n 'content/eus/rhel8/8.4/ppc64le/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.4/ppc64le/highavailability/debug',\n 'content/eus/rhel8/8.4/ppc64le/highavailability/os',\n 'content/eus/rhel8/8.4/ppc64le/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.4/ppc64le/resilientstorage/debug',\n 'content/eus/rhel8/8.4/ppc64le/resilientstorage/os',\n 'content/eus/rhel8/8.4/ppc64le/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.4/ppc64le/sap-solutions/debug',\n 'content/eus/rhel8/8.4/ppc64le/sap-solutions/os',\n 'content/eus/rhel8/8.4/ppc64le/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.4/ppc64le/sap/debug',\n 'content/eus/rhel8/8.4/ppc64le/sap/os',\n 'content/eus/rhel8/8.4/ppc64le/sap/source/SRPMS',\n 'content/eus/rhel8/8.4/ppc64le/supplementary/debug',\n 'content/eus/rhel8/8.4/ppc64le/supplementary/os',\n 'content/eus/rhel8/8.4/ppc64le/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/appstream/debug',\n 'content/eus/rhel8/8.4/x86_64/appstream/os',\n 'content/eus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/baseos/debug',\n 'content/eus/rhel8/8.4/x86_64/baseos/os',\n 'content/eus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.4/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.4/x86_64/highavailability/os',\n 'content/eus/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.4/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.4/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/sap/debug',\n 'content/eus/rhel8/8.4/x86_64/sap/os',\n 'content/eus/rhel8/8.4/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.4/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.4/x86_64/supplementary/os',\n 'content/eus/rhel8/8.4/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/appstream/debug',\n 'content/tus/rhel8/8.4/x86_64/appstream/os',\n 'content/tus/rhel8/8.4/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/baseos/debug',\n 'content/tus/rhel8/8.4/x86_64/baseos/os',\n 'content/tus/rhel8/8.4/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.4/x86_64/highavailability/os',\n 'content/tus/rhel8/8.4/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/nfv/debug',\n 'content/tus/rhel8/8.4/x86_64/nfv/os',\n 'content/tus/rhel8/8.4/x86_64/nfv/source/SRPMS',\n 'content/tus/rhel8/8.4/x86_64/rt/debug',\n 'content/tus/rhel8/8.4/x86_64/rt/os',\n 'content/tus/rhel8/8.4/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'cpp-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-c++-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gdb-plugin-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gfortran-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-offload-nvptx-8.3.1-5.el8', 'sp':'4', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-offload-nvptx-8.3.1-5.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-plugin-devel-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-static-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgcc-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgfortran-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-offload-nvptx-8.3.1-5.el8', 'sp':'4', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-offload-nvptx-8.3.1-5.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-devel-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'sp':'4', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'sp':'4', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'sp':'4', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'sp':'4', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'sp':'4', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'sp':'4', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-devel-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-docs-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-static-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'sp':'4', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'sp':'4', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'sp':'4', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan-8.3.1-5.el8', 'sp':'4', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/aus/rhel8/8.6/x86_64/appstream/debug',\n 'content/aus/rhel8/8.6/x86_64/appstream/os',\n 'content/aus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/aus/rhel8/8.6/x86_64/baseos/debug',\n 'content/aus/rhel8/8.6/x86_64/baseos/os',\n 'content/aus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/appstream/debug',\n 'content/e4s/rhel8/8.6/ppc64le/appstream/os',\n 'content/e4s/rhel8/8.6/ppc64le/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/baseos/debug',\n 'content/e4s/rhel8/8.6/ppc64le/baseos/os',\n 'content/e4s/rhel8/8.6/ppc64le/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/highavailability/debug',\n 'content/e4s/rhel8/8.6/ppc64le/highavailability/os',\n 'content/e4s/rhel8/8.6/ppc64le/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/sap-solutions/debug',\n 'content/e4s/rhel8/8.6/ppc64le/sap-solutions/os',\n 'content/e4s/rhel8/8.6/ppc64le/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.6/ppc64le/sap/debug',\n 'content/e4s/rhel8/8.6/ppc64le/sap/os',\n 'content/e4s/rhel8/8.6/ppc64le/sap/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/appstream/debug',\n 'content/e4s/rhel8/8.6/x86_64/appstream/os',\n 'content/e4s/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/baseos/debug',\n 'content/e4s/rhel8/8.6/x86_64/baseos/os',\n 'content/e4s/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/debug',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/os',\n 'content/e4s/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/e4s/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/e4s/rhel8/8.6/x86_64/sap/debug',\n 'content/e4s/rhel8/8.6/x86_64/sap/os',\n 'content/e4s/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/appstream/debug',\n 'content/eus/rhel8/8.6/aarch64/appstream/os',\n 'content/eus/rhel8/8.6/aarch64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/baseos/debug',\n 'content/eus/rhel8/8.6/aarch64/baseos/os',\n 'content/eus/rhel8/8.6/aarch64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/codeready-builder/debug',\n 'content/eus/rhel8/8.6/aarch64/codeready-builder/os',\n 'content/eus/rhel8/8.6/aarch64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/highavailability/debug',\n 'content/eus/rhel8/8.6/aarch64/highavailability/os',\n 'content/eus/rhel8/8.6/aarch64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/aarch64/supplementary/debug',\n 'content/eus/rhel8/8.6/aarch64/supplementary/os',\n 'content/eus/rhel8/8.6/aarch64/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/appstream/debug',\n 'content/eus/rhel8/8.6/ppc64le/appstream/os',\n 'content/eus/rhel8/8.6/ppc64le/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/baseos/debug',\n 'content/eus/rhel8/8.6/ppc64le/baseos/os',\n 'content/eus/rhel8/8.6/ppc64le/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/codeready-builder/debug',\n 'content/eus/rhel8/8.6/ppc64le/codeready-builder/os',\n 'content/eus/rhel8/8.6/ppc64le/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/highavailability/debug',\n 'content/eus/rhel8/8.6/ppc64le/highavailability/os',\n 'content/eus/rhel8/8.6/ppc64le/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/resilientstorage/debug',\n 'content/eus/rhel8/8.6/ppc64le/resilientstorage/os',\n 'content/eus/rhel8/8.6/ppc64le/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/sap-solutions/debug',\n 'content/eus/rhel8/8.6/ppc64le/sap-solutions/os',\n 'content/eus/rhel8/8.6/ppc64le/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/sap/debug',\n 'content/eus/rhel8/8.6/ppc64le/sap/os',\n 'content/eus/rhel8/8.6/ppc64le/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/ppc64le/supplementary/debug',\n 'content/eus/rhel8/8.6/ppc64le/supplementary/os',\n 'content/eus/rhel8/8.6/ppc64le/supplementary/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/appstream/debug',\n 'content/eus/rhel8/8.6/x86_64/appstream/os',\n 'content/eus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/baseos/debug',\n 'content/eus/rhel8/8.6/x86_64/baseos/os',\n 'content/eus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/debug',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/os',\n 'content/eus/rhel8/8.6/x86_64/codeready-builder/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/eus/rhel8/8.6/x86_64/highavailability/os',\n 'content/eus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/debug',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/os',\n 'content/eus/rhel8/8.6/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/debug',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/os',\n 'content/eus/rhel8/8.6/x86_64/sap-solutions/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/sap/debug',\n 'content/eus/rhel8/8.6/x86_64/sap/os',\n 'content/eus/rhel8/8.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel8/8.6/x86_64/supplementary/debug',\n 'content/eus/rhel8/8.6/x86_64/supplementary/os',\n 'content/eus/rhel8/8.6/x86_64/supplementary/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/appstream/debug',\n 'content/tus/rhel8/8.6/x86_64/appstream/os',\n 'content/tus/rhel8/8.6/x86_64/appstream/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/baseos/debug',\n 'content/tus/rhel8/8.6/x86_64/baseos/os',\n 'content/tus/rhel8/8.6/x86_64/baseos/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/highavailability/debug',\n 'content/tus/rhel8/8.6/x86_64/highavailability/os',\n 'content/tus/rhel8/8.6/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel8/8.6/x86_64/rt/os',\n 'content/tus/rhel8/8.6/x86_64/rt/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'cpp-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-c++-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gdb-plugin-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gfortran-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-offload-nvptx-8.3.1-5.el8', 'sp':'6', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-offload-nvptx-8.3.1-5.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-plugin-devel-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-static-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgcc-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgfortran-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-offload-nvptx-8.3.1-5.el8', 'sp':'6', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-offload-nvptx-8.3.1-5.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-devel-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'sp':'6', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'sp':'6', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'sp':'6', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'sp':'6', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'sp':'6', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'sp':'6', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-devel-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-docs-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-static-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'sp':'6', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'sp':'6', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'sp':'6', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan-8.3.1-5.el8', 'sp':'6', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/dist/rhel8/8/aarch64/appstream/debug',\n 'content/dist/rhel8/8/aarch64/appstream/os',\n 'content/dist/rhel8/8/aarch64/appstream/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/baseos/debug',\n 'content/dist/rhel8/8/aarch64/baseos/os',\n 'content/dist/rhel8/8/aarch64/baseos/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/codeready-builder/debug',\n 'content/dist/rhel8/8/aarch64/codeready-builder/os',\n 'content/dist/rhel8/8/aarch64/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/highavailability/debug',\n 'content/dist/rhel8/8/aarch64/highavailability/os',\n 'content/dist/rhel8/8/aarch64/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/aarch64/supplementary/debug',\n 'content/dist/rhel8/8/aarch64/supplementary/os',\n 'content/dist/rhel8/8/aarch64/supplementary/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/appstream/debug',\n 'content/dist/rhel8/8/ppc64le/appstream/os',\n 'content/dist/rhel8/8/ppc64le/appstream/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/baseos/debug',\n 'content/dist/rhel8/8/ppc64le/baseos/os',\n 'content/dist/rhel8/8/ppc64le/baseos/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/codeready-builder/debug',\n 'content/dist/rhel8/8/ppc64le/codeready-builder/os',\n 'content/dist/rhel8/8/ppc64le/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/highavailability/debug',\n 'content/dist/rhel8/8/ppc64le/highavailability/os',\n 'content/dist/rhel8/8/ppc64le/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/resilientstorage/debug',\n 'content/dist/rhel8/8/ppc64le/resilientstorage/os',\n 'content/dist/rhel8/8/ppc64le/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/sap-solutions/debug',\n 'content/dist/rhel8/8/ppc64le/sap-solutions/os',\n 'content/dist/rhel8/8/ppc64le/sap-solutions/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/sap/debug',\n 'content/dist/rhel8/8/ppc64le/sap/os',\n 'content/dist/rhel8/8/ppc64le/sap/source/SRPMS',\n 'content/dist/rhel8/8/ppc64le/supplementary/debug',\n 'content/dist/rhel8/8/ppc64le/supplementary/os',\n 'content/dist/rhel8/8/ppc64le/supplementary/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/appstream/debug',\n 'content/dist/rhel8/8/x86_64/appstream/os',\n 'content/dist/rhel8/8/x86_64/appstream/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/baseos/debug',\n 'content/dist/rhel8/8/x86_64/baseos/os',\n 'content/dist/rhel8/8/x86_64/baseos/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/codeready-builder/debug',\n 'content/dist/rhel8/8/x86_64/codeready-builder/os',\n 'content/dist/rhel8/8/x86_64/codeready-builder/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/highavailability/debug',\n 'content/dist/rhel8/8/x86_64/highavailability/os',\n 'content/dist/rhel8/8/x86_64/highavailability/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/nfv/debug',\n 'content/dist/rhel8/8/x86_64/nfv/os',\n 'content/dist/rhel8/8/x86_64/nfv/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/resilientstorage/debug',\n 'content/dist/rhel8/8/x86_64/resilientstorage/os',\n 'content/dist/rhel8/8/x86_64/resilientstorage/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/rt/debug',\n 'content/dist/rhel8/8/x86_64/rt/os',\n 'content/dist/rhel8/8/x86_64/rt/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap-solutions/debug',\n 'content/dist/rhel8/8/x86_64/sap-solutions/os',\n 'content/dist/rhel8/8/x86_64/sap-solutions/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/sap/debug',\n 'content/dist/rhel8/8/x86_64/sap/os',\n 'content/dist/rhel8/8/x86_64/sap/source/SRPMS',\n 'content/dist/rhel8/8/x86_64/supplementary/debug',\n 'content/dist/rhel8/8/x86_64/supplementary/os',\n 'content/dist/rhel8/8/x86_64/supplementary/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'cpp-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-c++-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gdb-plugin-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-gfortran-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-offload-nvptx-8.3.1-5.el8', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-offload-nvptx-8.3.1-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'gcc-plugin-devel-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libatomic-static-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgcc-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgfortran-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-offload-nvptx-8.3.1-5.el8', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libgomp-offload-nvptx-8.3.1-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libitm-devel-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-8.3.1-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'cpu':'i686', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libquadmath-devel-8.3.1-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-devel-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-docs-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libstdc++-static-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'cpu':'ppc64le', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-5.el8', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan-8.3.1-5.el8', 'release':'8', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp']) && !enterprise_linux_flag) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'cpp / gcc / gcc-c++ / gcc-gdb-plugin / gcc-gfortran / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-25T20:38:40", "description": "The remote Redhat Enterprise Linux 6 / 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:0924 advisory.\n\n - gcc: POWER9 DARN RNG intrinsic produces repeated output (CVE-2019-15847)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-01-23T00:00:00", "type": "nessus", "title": "RHEL 6 / 7 : devtoolset-8-gcc (RHSA-2020:0924)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-15847"], "modified": "2023-05-25T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc-gfortran", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc-plugin-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libasan-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libatomic-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libgccjit", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libgccjit-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libgccjit-docs", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libitm-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-liblsan-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libquadmath-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libstdc%2b%2b-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libstdc%2b%2b-docs", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libtsan-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libubsan-devel", "p-cpe:/a:redhat:enterprise_linux:libasan5", "p-cpe:/a:redhat:enterprise_linux:liblsan", "p-cpe:/a:redhat:enterprise_linux:libtsan", "p-cpe:/a:redhat:enterprise_linux:libubsan1", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc-c%2b%2b", "p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc-gdb-plugin"], "id": "REDHAT-RHSA-2020-0924.NASL", "href": "https://www.tenable.com/plugins/nessus/170353", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:0924. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(170353);\n script_version(\"1.1\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/05/25\");\n\n script_cve_id(\"CVE-2019-15847\");\n script_xref(name:\"RHSA\", value:\"2020:0924\");\n\n script_name(english:\"RHEL 6 / 7 : devtoolset-8-gcc (RHSA-2020:0924)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 6 / 7 host has packages installed that are affected by a vulnerability as referenced\nin the RHSA-2020:0924 advisory.\n\n - gcc: POWER9 DARN RNG intrinsic produces repeated output (CVE-2019-15847)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-15847\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:0924\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1755523\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-15847\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(331);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/01/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc-gdb-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc-gfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-gcc-plugin-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libasan-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libatomic-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libgccjit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libgccjit-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libgccjit-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libitm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-liblsan-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libquadmath-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libstdc++-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libstdc++-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libtsan-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-8-libubsan-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libasan5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:liblsan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libtsan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libubsan1\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release_list(operator: 'ge', os_version: os_ver, rhel_versions: ['6','7'])) audit(AUDIT_OS_NOT, 'Red Hat 6.x / 7.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/rhscl/1/debug',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/rhscl/1/os',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/rhscl/1/source/SRPMS',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/rhscl/1/debug',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/rhscl/1/os',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/rhscl/1/source/SRPMS',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/rhscl/1/debug',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/rhscl/1/os',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/rhscl/1/source/SRPMS',\n 'content/dist/rhel/power/7/7Server/ppc64/rhscl/1/debug',\n 'content/dist/rhel/power/7/7Server/ppc64/rhscl/1/os',\n 'content/dist/rhel/power/7/7Server/ppc64/rhscl/1/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/rhscl/1/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/rhscl/1/os',\n 'content/dist/rhel/server/7/7Server/x86_64/rhscl/1/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/rhscl/1/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/rhscl/1/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/rhscl/1/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/rhscl/1/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/rhscl/1/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/rhscl/1/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'devtoolset-8-gcc-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-8.3.1-3.2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-c++-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-c++-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-c++-8.3.1-3.2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-c++-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gdb-plugin-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gdb-plugin-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gdb-plugin-8.3.1-3.2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gdb-plugin-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gfortran-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gfortran-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gfortran-8.3.1-3.2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gfortran-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-plugin-devel-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-plugin-devel-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-plugin-devel-8.3.1-3.2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-plugin-devel-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libasan-devel-8.3.1-3.2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libatomic-devel-8.3.1-3.2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-8.3.1-3.2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-devel-8.3.1-3.2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-docs-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-docs-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-docs-8.3.1-3.2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-docs-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libitm-devel-8.3.1-3.2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-liblsan-devel-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-liblsan-devel-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-liblsan-devel-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libquadmath-devel-8.3.1-3.2.el7', 'cpu':'i686', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libquadmath-devel-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libquadmath-devel-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libquadmath-devel-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libstdc++-devel-8.3.1-3.2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libstdc++-docs-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libstdc++-docs-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libstdc++-docs-8.3.1-3.2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libstdc++-docs-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libtsan-devel-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libtsan-devel-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libtsan-devel-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libubsan-devel-8.3.1-3.2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan5-8.3.1-3.2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-3.2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-3.2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-3.2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan1-8.3.1-3.2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n ]\n },\n {\n 'repo_relative_urls': [\n 'content/dist/rhel/server/6/6Server/x86_64/rhscl/1/debug',\n 'content/dist/rhel/server/6/6Server/x86_64/rhscl/1/os',\n 'content/dist/rhel/server/6/6Server/x86_64/rhscl/1/source/SRPMS',\n 'content/dist/rhel/workstation/6/6Workstation/x86_64/rhscl/1/debug',\n 'content/dist/rhel/workstation/6/6Workstation/x86_64/rhscl/1/os',\n 'content/dist/rhel/workstation/6/6Workstation/x86_64/rhscl/1/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'devtoolset-8-gcc-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-c++-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gdb-plugin-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-gfortran-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-gcc-plugin-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libasan-devel-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libasan-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libatomic-devel-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libatomic-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-devel-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libgccjit-docs-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libitm-devel-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libitm-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-liblsan-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libquadmath-devel-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libquadmath-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libstdc++-devel-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libstdc++-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libstdc++-docs-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libtsan-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libubsan-devel-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-8-libubsan-devel-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan5-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan5-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan1-8.3.1-3.2.el6', 'cpu':'i686', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan1-8.3.1-3.2.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'devtoolset-8-gcc / devtoolset-8-gcc-c++ / devtoolset-8-gcc-gdb-plugin / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-25T20:38:13", "description": "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2020:2274 advisory.\n\n - gcc: POWER9 DARN RNG intrinsic produces repeated output (CVE-2019-15847)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2023-01-23T00:00:00", "type": "nessus", "title": "RHEL 7 : devtoolset-9-gcc (RHSA-2020:2274)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-15847"], "modified": "2023-05-25T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libitm-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-liblsan-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libquadmath-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libstdc%2b%2b-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libstdc%2b%2b-docs", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libtsan-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libubsan-devel", "p-cpe:/a:redhat:enterprise_linux:libasan5", "p-cpe:/a:redhat:enterprise_linux:liblsan", "p-cpe:/a:redhat:enterprise_linux:libtsan", "p-cpe:/a:redhat:enterprise_linux:libubsan1", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc-c%2b%2b", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc-gdb-plugin", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc-gfortran", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc-plugin-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libasan-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libatomic-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libgccjit", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libgccjit-devel", "p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libgccjit-docs"], "id": "REDHAT-RHSA-2020-2274.NASL", "href": "https://www.tenable.com/plugins/nessus/170330", "sourceData": "#%NASL_MIN_LEVEL 80900\n##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:2274. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(170330);\n script_version(\"1.1\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/05/25\");\n\n script_cve_id(\"CVE-2019-15847\");\n script_xref(name:\"RHSA\", value:\"2020:2274\");\n\n script_name(english:\"RHEL 7 : devtoolset-9-gcc (RHSA-2020:2274)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 7 host has packages installed that are affected by a vulnerability as referenced in\nthe RHSA-2020:2274 advisory.\n\n - gcc: POWER9 DARN RNG intrinsic produces repeated output (CVE-2019-15847)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-15847\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:2274\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1755523\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-15847\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(331);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/02\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2023/01/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc-gdb-plugin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc-gfortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-gcc-plugin-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libasan-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libatomic-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libgccjit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libgccjit-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libgccjit-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libitm-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-liblsan-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libquadmath-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libstdc++-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libstdc++-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libtsan-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:devtoolset-9-libubsan-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libasan5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:liblsan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libtsan\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libubsan1\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '7')) audit(AUDIT_OS_NOT, 'Red Hat 7.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu && 'ppc' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar constraints = [\n {\n 'repo_relative_urls': [\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/rhscl/1/debug',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/rhscl/1/os',\n 'content/dist/rhel-alt/server/7/7Server/power9/ppc64le/rhscl/1/source/SRPMS',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/rhscl/1/debug',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/rhscl/1/os',\n 'content/dist/rhel-alt/server/7/7Server/system-z-a/s390x/rhscl/1/source/SRPMS',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/rhscl/1/debug',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/rhscl/1/os',\n 'content/dist/rhel/power-le/7/7Server/ppc64le/rhscl/1/source/SRPMS',\n 'content/dist/rhel/power/7/7Server/ppc64/rhscl/1/debug',\n 'content/dist/rhel/power/7/7Server/ppc64/rhscl/1/os',\n 'content/dist/rhel/power/7/7Server/ppc64/rhscl/1/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/rhscl/1/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/rhscl/1/os',\n 'content/dist/rhel/server/7/7Server/x86_64/rhscl/1/source/SRPMS',\n 'content/dist/rhel/system-z/7/7Server/s390x/rhscl/1/debug',\n 'content/dist/rhel/system-z/7/7Server/s390x/rhscl/1/os',\n 'content/dist/rhel/system-z/7/7Server/s390x/rhscl/1/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/rhscl/1/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/rhscl/1/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/rhscl/1/source/SRPMS'\n ],\n 'pkgs': [\n {'reference':'devtoolset-9-gcc-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-9.3.1-2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-c++-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-c++-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-c++-9.3.1-2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-c++-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-gdb-plugin-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-gdb-plugin-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-gdb-plugin-9.3.1-2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-gdb-plugin-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-gfortran-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-gfortran-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-gfortran-9.3.1-2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-gfortran-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-plugin-devel-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-plugin-devel-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-plugin-devel-9.3.1-2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-gcc-plugin-devel-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libasan-devel-9.3.1-2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libatomic-devel-9.3.1-2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libgccjit-9.3.1-2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libgccjit-devel-9.3.1-2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libgccjit-docs-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libgccjit-docs-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libgccjit-docs-9.3.1-2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libgccjit-docs-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libitm-devel-9.3.1-2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-liblsan-devel-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-liblsan-devel-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-liblsan-devel-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libquadmath-devel-9.3.1-2.el7', 'cpu':'i686', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libquadmath-devel-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libquadmath-devel-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libquadmath-devel-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libstdc++-devel-9.3.1-2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libstdc++-docs-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libstdc++-docs-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libstdc++-docs-9.3.1-2.el7', 'cpu':'s390x', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libstdc++-docs-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libtsan-devel-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libtsan-devel-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libtsan-devel-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'devtoolset-9-libubsan-devel-9.3.1-2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libasan5-9.3.1-2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'liblsan-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-9.3.1-2.el7', 'cpu':'ppc64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-9.3.1-2.el7', 'cpu':'ppc64le', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libtsan-9.3.1-2.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'libubsan1-9.3.1-2.el7', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:constraints);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nforeach var constraint_array ( constraints ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(constraint_array['repo_relative_urls'])) repo_relative_urls = constraint_array['repo_relative_urls'];\n foreach var pkg ( constraint_array['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'devtoolset-9-gcc / devtoolset-9-gcc-c++ / devtoolset-9-gcc-gdb-plugin / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:37:46", "description": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU's local cache and system software's Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\\n\\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory. Virtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor's Memory Management Unit (MMU) uses Paging structure entries to translate program's virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\\n\\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor's TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change.(CVE-2018-12207)", "cvss3": {}, "published": "2019-11-25T00:00:00", "type": "nessus", "title": "Amazon Linux 2 : kernel (ALAS-2019-1366)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207"], "modified": "2019-12-09T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:kernel", "p-cpe:/a:amazon:linux:kernel-debuginfo", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:amazon:linux:kernel-devel", "p-cpe:/a:amazon:linux:kernel-headers", "p-cpe:/a:amazon:linux:kernel-tools", "p-cpe:/a:amazon:linux:kernel-tools-debuginfo", "p-cpe:/a:amazon:linux:kernel-tools-devel", "p-cpe:/a:amazon:linux:perf", "p-cpe:/a:amazon:linux:perf-debuginfo", "p-cpe:/a:amazon:linux:python-perf", "p-cpe:/a:amazon:linux:python-perf-debuginfo", "cpe:/o:amazon:linux:2"], "id": "AL2_ALAS-2019-1366.NASL", "href": "https://www.tenable.com/plugins/nessus/131235", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux 2 Security Advisory ALAS-2019-1366.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131235);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/09\");\n\n script_cve_id(\"CVE-2018-12207\");\n script_xref(name:\"ALAS\", value:\"2019-1366\");\n\n script_name(english:\"Amazon Linux 2 : kernel (ALAS-2019-1366)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux 2 host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the way Intel CPUs handle inconsistency between,\nvirtual to physical memory address translations in CPU's local cache\nand system software's Paging structure entries. A privileged guest\nuser may use this flaw to induce a hardware Machine Check Error on the\nhost processor, resulting in a severe DoS scenario by halting the\nprocessor.\\n\\nSystem software like OS OR Virtual Machine Monitor (VMM)\nuse virtual memory system for storing program instructions and data in\nmemory. Virtual Memory system uses Paging structures like Page Tables\nand Page Directories to manage system memory. The processor's Memory\nManagement Unit (MMU) uses Paging structure entries to translate\nprogram's virtual memory addresses to physical memory addresses. The\nprocessor stores these address translations into its local cache\nbuffer called - Translation Lookaside Buffer (TLB). TLB has two parts,\none for instructions and other for data addresses.\\n\\nSystem software\ncan modify its Paging structure entries to change address mappings OR\ncertain attributes like page size etc. Upon such Paging structure\nalterations in memory, system software must invalidate the\ncorresponding address translations in the processor's TLB cache. But\nbefore this TLB invalidation takes place, a privileged guest user may\ntrigger an instruction fetch operation, which could use an already\ncached, but now invalid, virtual to physical address translation from\nInstruction TLB (ITLB). Thus accessing an invalid physical memory\naddress and resulting in halting the processor due to the Machine\nCheck Error (MCE) on Page Size Change.(CVE-2018-12207)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/AL2/ALAS-2019-1366.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update kernel' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux:2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"2\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux 2\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-debuginfo-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-devel-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"kernel-headers-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-tools-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"kernel-tools-devel-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"perf-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"perf-debuginfo-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"python-perf-4.14.154-128.181.amzn2\")) flag++;\nif (rpm_check(release:\"AL2\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-4.14.154-128.181.amzn2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-debuginfo-common-x86_64 / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:37:46", "description": "The remote OracleVM system is missing necessary patches to address critical security updates :\n\n - BUILDINFO: OVMF commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8\n\n - BUILDINFO: xen commit=a3ec6768f487946b7316364bc9bd17ce4d752af5\n\n - BUILDINFO: QEMU upstream commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff\n\n - BUILDINFO: QEMU traditional commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba\n\n - BUILDINFO: IPXE commit=9a93db3f0947484e30e753bbd61a10b17336e20e\n\n - BUILDINFO: SeaBIOS commit=7d9cbe613694924921ed1a6f8947d711c5832eee\n\n - x86/vtx ept-shatter ... (Andrew Cooper) [Orabug:\n 30522238] (CVE-2018-12207)\n\n - x86: rename public functions in p2m-pt.c (Mukesh Rathor) [Orabug: 30522238]\n\n - Rename 'set_p2m_entry' to 'p2m_set_entry' (Mukesh Rathor) [Orabug: 30522238]\n\n - x86/mm: add information about faulted page's presence to npfec structure (Boris Ostrovsky) [Orabug: 30522238]\n\n - relocate struct npfec definition into common (Tamas K Lengyel) \n\n - EPT: utilize GLA->GPA translation known for certain faults (Jan Beulich) [Orabug: 30522238]\n\n - x86/mem_event: deliver gla fault EPT violation information (Tamas K Lengyel) [Orabug: 30522238]\n\n - x86: consolidate boolean inputs in hvm and p2m into a shared bitmap (Tamas K Lengyel) [Orabug: 30522238]", "cvss3": {}, "published": "2019-11-20T00:00:00", "type": "nessus", "title": "OracleVM 3.4 : xen (OVMSA-2019-0054)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207"], "modified": "2019-12-09T00:00:00", "cpe": ["p-cpe:/a:oracle:vm:xen", "p-cpe:/a:oracle:vm:xen-tools", "cpe:/o:oracle:vm_server:3.4"], "id": "ORACLEVM_OVMSA-2019-0054.NASL", "href": "https://www.tenable.com/plugins/nessus/131150", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2019-0054.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131150);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/09\");\n\n script_cve_id(\"CVE-2018-12207\");\n\n script_name(english:\"OracleVM 3.4 : xen (OVMSA-2019-0054)\");\n script_summary(english:\"Checks the RPM output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote OracleVM host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - BUILDINFO: OVMF\n commit=173bf5c847e3ca8b42c11796ce048d8e2e916ff8\n\n - BUILDINFO: xen\n commit=a3ec6768f487946b7316364bc9bd17ce4d752af5\n\n - BUILDINFO: QEMU upstream\n commit=8bff6989bd0bafcc0ddf859c23ce6a2ff21a80ff\n\n - BUILDINFO: QEMU traditional\n commit=346fdd7edd73f8287d0d0a2bab9c67b71bc6b8ba\n\n - BUILDINFO: IPXE\n commit=9a93db3f0947484e30e753bbd61a10b17336e20e\n\n - BUILDINFO: SeaBIOS\n commit=7d9cbe613694924921ed1a6f8947d711c5832eee\n\n - x86/vtx ept-shatter ... (Andrew Cooper) [Orabug:\n 30522238] (CVE-2018-12207)\n\n - x86: rename public functions in p2m-pt.c (Mukesh Rathor)\n [Orabug: 30522238]\n\n - Rename 'set_p2m_entry' to 'p2m_set_entry' (Mukesh\n Rathor) [Orabug: 30522238]\n\n - x86/mm: add information about faulted page's presence to\n npfec structure (Boris Ostrovsky) [Orabug: 30522238]\n\n - relocate struct npfec definition into common (Tamas K\n Lengyel) \n\n - EPT: utilize GLA->GPA translation known for certain\n faults (Jan Beulich) [Orabug: 30522238]\n\n - x86/mem_event: deliver gla fault EPT violation\n information (Tamas K Lengyel) [Orabug: 30522238]\n\n - x86: consolidate boolean inputs in hvm and p2m into a\n shared bitmap (Tamas K Lengyel) [Orabug: 30522238]\"\n );\n # https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000967.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?94d8eba2\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected xen / xen-tools packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:xen-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"3\\.4\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.4\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_exists(rpm:\"xen-4.4.4-155\", release:\"OVS3.4\") && rpm_check(release:\"OVS3.4\", reference:\"xen-4.4.4-155.0.75.el6\")) flag++;\nif (rpm_exists(rpm:\"xen-tools-4.4.4-155\", release:\"OVS3.4\") && rpm_check(release:\"OVS3.4\", reference:\"xen-tools-4.4.4-155.0.75.el6\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"xen / xen-tools\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:26", "description": "Intel discovered a previously published erratum on some Intel platforms can be exploited by malicious software to potentially cause a denial of service by triggering a machine check that will crash or hang the system.\n\nMalicious guest operating systems may be able to crash the host.", "cvss3": {}, "published": "2019-11-26T00:00:00", "type": "nessus", "title": "FreeBSD : FreeBSD -- Machine Check Exception on Page Size Change (edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207"], "modified": "2019-12-09T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:freebsd", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_EDC0BF7E05A111EA9DFAF8B156AC3FF9.NASL", "href": "https://www.tenable.com/plugins/nessus/131296", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2019 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131296);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/09\");\n\n script_cve_id(\"CVE-2018-12207\");\n script_xref(name:\"FreeBSD\", value:\"SA-19:25.mcepsc\");\n\n script_name(english:\"FreeBSD : FreeBSD -- Machine Check Exception on Page Size Change (edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Intel discovered a previously published erratum on some Intel\nplatforms can be exploited by malicious software to potentially cause\na denial of service by triggering a machine check that will crash or\nhang the system.\n\nMalicious guest operating systems may be able to crash the host.\"\n );\n # https://vuxml.freebsd.org/freebsd/edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?18b9c477\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:FreeBSD\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"FreeBSD>=12.1<12.1_1\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"FreeBSD>=12.0<12.0_12\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"FreeBSD>=11.3<11.3_5\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:pkg_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:40", "description": "A flaw was found in the way Intel CPUs handle inconsistency between, virtual to physical memory address translations in CPU's local cache and system software's Paging structure entries. A privileged guest user may use this flaw to induce a hardware Machine Check Error on the host processor, resulting in a severe DoS scenario by halting the processor.\n\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual memory system for storing program instructions and data in memory.\nVirtual Memory system uses Paging structures like Page Tables and Page Directories to manage system memory. The processor's Memory Management Unit (MMU) uses Paging structure entries to translate program's virtual memory addresses to physical memory addresses. The processor stores these address translations into its local cache buffer called - Translation Lookaside Buffer (TLB). TLB has two parts, one for instructions and other for data addresses.\n\nSystem software can modify its Paging structure entries to change address mappings OR certain attributes like page size etc. Upon such Paging structure alterations in memory, system software must invalidate the corresponding address translations in the processor's TLB cache. But before this TLB invalidation takes place, a privileged guest user may trigger an instruction fetch operation, which could use an already cached, but now invalid, virtual to physical address translation from Instruction TLB (ITLB). Thus accessing an invalid physical memory address and resulting in halting the processor due to the Machine Check Error (MCE) on Page Size Change. (CVE-2018-12207)", "cvss3": {}, "published": "2019-11-25T00:00:00", "type": "nessus", "title": "Amazon Linux AMI : kernel (ALAS-2019-1322)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207"], "modified": "2019-12-09T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:kernel", "p-cpe:/a:amazon:linux:kernel-debuginfo", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686", "p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:amazon:linux:kernel-devel", "p-cpe:/a:amazon:linux:kernel-headers", "p-cpe:/a:amazon:linux:kernel-tools", "p-cpe:/a:amazon:linux:kernel-tools-debuginfo", "p-cpe:/a:amazon:linux:kernel-tools-devel", "p-cpe:/a:amazon:linux:perf", "p-cpe:/a:amazon:linux:perf-debuginfo", "cpe:/o:amazon:linux"], "id": "ALA_ALAS-2019-1322.NASL", "href": "https://www.tenable.com/plugins/nessus/131242", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2019-1322.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131242);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/09\");\n\n script_cve_id(\"CVE-2018-12207\");\n script_xref(name:\"ALAS\", value:\"2019-1322\");\n\n script_name(english:\"Amazon Linux AMI : kernel (ALAS-2019-1322)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A flaw was found in the way Intel CPUs handle inconsistency between,\nvirtual to physical memory address translations in CPU's local cache\nand system software's Paging structure entries. A privileged guest\nuser may use this flaw to induce a hardware Machine Check Error on the\nhost processor, resulting in a severe DoS scenario by halting the\nprocessor.\n\nSystem software like OS OR Virtual Machine Monitor (VMM) use virtual\nmemory system for storing program instructions and data in memory.\nVirtual Memory system uses Paging structures like Page Tables and Page\nDirectories to manage system memory. The processor's Memory Management\nUnit (MMU) uses Paging structure entries to translate program's\nvirtual memory addresses to physical memory addresses. The processor\nstores these address translations into its local cache buffer called -\nTranslation Lookaside Buffer (TLB). TLB has two parts, one for\ninstructions and other for data addresses.\n\nSystem software can modify its Paging structure entries to change\naddress mappings OR certain attributes like page size etc. Upon such\nPaging structure alterations in memory, system software must\ninvalidate the corresponding address translations in the processor's\nTLB cache. But before this TLB invalidation takes place, a privileged\nguest user may trigger an instruction fetch operation, which could use\nan already cached, but now invalid, virtual to physical address\ntranslation from Instruction TLB (ITLB). Thus accessing an invalid\nphysical memory address and resulting in halting the processor due to\nthe Machine Check Error (MCE) on Page Size Change. (CVE-2018-12207)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2019-1322.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update kernel' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-i686\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:kernel-tools-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/25\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"kernel-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-debuginfo-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"i686\", reference:\"kernel-debuginfo-common-i686-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-devel-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-headers-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-debuginfo-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"kernel-tools-devel-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-4.14.154-99.181.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"perf-debuginfo-4.14.154-99.181.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debuginfo / kernel-debuginfo-common-i686 / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-19T14:36:56", "description": "According to its self-reported version number, the Xen hypervisor installed on the remote host is affected by a denial of service vulnerability. An erratum exists across some CPUs whereby an instruction fetch may cause a machine check error if the pagetables have been updated in a specific manner without invalidating the TLB. The x86 architecture explicitly permits modification of the pagetables without TLB invalidation, but in this corner case, the impacted core ceases operating and an unexpected machine check or system reset occurs. This corner case can be triggered by guest kernels.", "cvss3": {}, "published": "2020-03-02T00:00:00", "type": "nessus", "title": "Xen Denial of Service vulnerability (XSA-304)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207"], "modified": "2020-03-03T00:00:00", "cpe": ["cpe:/o:xen:xen"], "id": "XEN_SERVER_XSA-304.NASL", "href": "https://www.tenable.com/plugins/nessus/134172", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(134172);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/03/03\");\n\n script_cve_id(\"CVE-2018-12207\");\n\n script_name(english:\"Xen Denial of Service vulnerability (XSA-304)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Xen hypervisor installation is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the Xen hypervisor installed on the remote host is affected by a denial\nof service vulnerability. An erratum exists across some CPUs whereby an instruction fetch may cause a machine check\nerror if the pagetables have been updated in a specific manner without invalidating the TLB. The x86 architecture\nexplicitly permits modification of the pagetables without TLB invalidation, but in this corner case, the impacted core\nceases operating and an unexpected machine check or system reset occurs. This corner case can be triggered by guest \nkernels.\");\n # https://xenbits.xen.org/xsa/advisory-304.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1d5ba048\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply the appropriate patch according to the vendor advisory.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-12207\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/03/02\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:xen:xen\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"xen_server_detect.nbin\");\n script_require_keys(\"installed_sw/Xen Hypervisor\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('install_func.inc');\ninclude('misc_func.inc');\n\napp_name = 'Xen Hypervisor';\ninstall = get_single_install(app_name:app_name);\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nversion = install['version'];\ndisplay_version = install['display_version'];\npath = install['path'];\nmanaged_status = install['Managed status'];\nchangeset = install['Changeset'];\n\nif (!empty_or_null(changeset))\n display_version += ' (changeset ' + changeset + ')';\n\n# Installations that are vendor-managed are handled by OS-specific local package checks\nif (managed_status == 'managed')\n audit(AUDIT_INST_PATH_NOT_VULN, app_name, display_version, path);\n\nfixes['4.8']['fixed_ver'] = '4.8.5';\nfixes['4.8']['fixed_ver_display'] = '4.8.5 (changeset a260e93)';\nfixes['4.8']['affected_ver_regex'] = '^4\\\\.8\\\\.';\nfixes['4.8']['affected_changesets'] = make_list(\n'ec6c25e', '1486caf', '4c666a7', 'a70ba89', '6082eac', 'fb93a9b', '80e67e4', 'dc62982', 'aca2511', '17c3324',\n'4ffb12e', '929ec99', 'ae9ec06', '6c4efc1', '2867c7e', '611ca5b', '12ac129', 'f1bf612', '422d637', '6699295',\n'10105fa', 'bf78103', '219b64d', 'f03e1b7', '048bbe8', '151406a', 'd02aeba', '960670a', '4ed28df', 'c67210f',\n'd4d3ab3', 'd87211e', 'a9acbcf', '514de95', '48ab64f', '181ed91', 'c3fdb25', '7feb3cc', '343c611', '257048f',\n'491e033', '3683ec2', 'a172d06', '52092fc', 'e0d6cde', 'cc1c9e3', 'f6a4af3', 'ece24c0', '175a698', '48f5cf7',\n'9eb6247', '31cbd18', 'fcf002d', 'ecbf88a', 'd929136', '8099c04', '752fb21', 'a95a103', '3dcb199', '55da36f',\n'160f050', '194b7a2', 'a556287', '2032f86', 'e9d860f', 'a1f8fe0', '5bc841c', '4539dbc', 'dcd6efd', '88fb22b',\n'1c4ab1e', '40ad83f', '51c3b69', '44aba8b', '067ec7d', 'f51d8e5', 'b9b0c46', '908e768');\n\nfixes['4.9']['fixed_ver'] = '4.9.4';\nfixes['4.9']['fixed_ver_display'] = '4.9.4 (changeset 8d1ee9f)';\nfixes['4.9']['affected_ver_regex'] = '^4\\\\.9\\\\.';\nfixes['4.9']['affected_changesets'] = make_list(\n'e60b3a9', '25f5530', '49db55f', 'fa34ed5', '704f7ec', 'a930a74', '8c52ee2', '2e15a19', '70639ac', 'c3b479d',\n'e349eae', '632fb4e', '4608c6d', '7daacca', '859e48e', '5be2dd0', 'b0147bd', 'cadd66a', 'd3c4b60', 'd59f5c4',\n'44303c6', '79538ba', '80c3157', '73f1a55', 'bc20fb1', '754a531', '7b032c2', 'ff4fdf0', '8d2a688', 'b9013d7',\n'bc8e5ec', '34907f5', 'e70bf7e', 'fa0b891', '3a8177c', '04ec835', '8d63ec4', '1ff6b4d', 'f092d86', 'e4b534f',\n'87c49fe', '19becb8', '43775c0', 'f6b0f33', 'a17e75c', '67530e7', 'f804549', '84f81a8', '56aa239', '105db42',\n'd9da3ea', 'ac90240', '3db28b0', '9b6f1c0', '0c4bbad', '917d8d3', '3384ea4', '352421f', '04e9dcb', '1612f15',\n'f952b1d', '63d9330', 'f72414a', 'ac3a5f8', '1ae6b8e', '1dd3dcc', '7390fa1', '7e78dc4', '8fdfb1e', '55d36e2',\n'045f37c', 'dd7e637', '7a40b5b', 'f5acf97');\n\nfixes['4.10']['fixed_ver'] = '4.10.4';\nfixes['4.10']['fixed_ver_display'] = '4.10.4 (changeset 37139f1)';\nfixes['4.10']['affected_ver_regex'] = '^4\\\\.10\\\\.';\nfixes['4.10']['affected_changesets'] = make_list(\n'fde09cb', '804ba02', 'e8c3971', 'a8c4293', 'aa40452', '1da3dab', 'e5632c4', '902e72d', '6a14610', 'ea815b2', '13ad331',\n'61b75d9', 'e70e7bf', 'e966e2e', 'dfa16a1', 'a71e199', 'c98be9e', 'a548e10', 'd3c0e84', '53b1572', '7203f9a', '6d1659d',\n'a782173', '24e90db', '0824bc6', 'e6f3135', '3131bf9');\n\nfixes['4.11']['fixed_ver'] = '4.11.3';\nfixes['4.11']['fixed_ver_display'] = '4.11.3-pre (changeset 9474622)';\nfixes['4.11']['affected_ver_regex'] = '^4\\\\.11\\\\.';\nfixes['4.11']['affected_changesets'] = make_list(\n'f9ea10d', '48a2e5d', '68c8a75', 'b697438', '7152399', '75de893', 'fd40571', '0a79df7', 'b12609b', 'a08fdb8', '0b1e97d',\n'41d85cb', '64d6137', '7450704', '56590ac', 'cc06f60', 'eb60ebb', '0db606d', '006b204', 'a187099', '3697e2a', 'c0f9d1e',\n'7cb2f1d', '56767b7', '952f362', '7c3c7d8', 'ee78046', '05c14f6', '6fed54c', '766edd7', '657dc2d', 'be89e98', '273cf03',\n'd78a967', 'c20ab0c', '5350514', '19bb4f5', 'ca185ab', '0047407', 'aebe055', 'd6d52bc', '317de0a', '1b16093', 'ce7b549',\n'621b2d0', '8502a2c', '7f5f48d', '7824b9f', 'b52bcda', '27ff738', '6d36734', 'e2e653f', '9eac932', 'd4fe232', 'ba287c7',\n'e33ce32', '28ed7a5', '527e324', '91836ce', '6eb3f76', 'cb86f3d', '8bfcd2e', 'fb1db30', 'b5433e7', 'b6ef69d', 'd27973c',\n'ba6f5be', '4c6142e', '6e63afe', '5fcaaae', 'b0d4cec', 'c76e47d', 'a43eb8a', '3342ee9', 'b222046', '37ccdfd', '8bbb3e9',\n'ff5ddf0', '802f994', '10582ea', '4e95d85', 'da235ee', '32bdae2', 'b647da4', '1ec05c2', '9b91bec', 'dc3cd3d', '3311f10',\n'5fd47c5', '6af54f7', 'c250e2d', '08cb4b9', '8efcc0d', '1cf304f', 'c14026b', 'c719519', '93ad919', 'fcc4f5d', '2f7f16c',\n'fddda5d', 'd0dc725', '7ca58e5', 'be800a1');\n\nfixes['4.12']['fixed_ver'] = '4.12.2';\nfixes['4.12']['fixed_ver_display'] = '4.12.2-pre (changeset 3b448cb)';\nfixes['4.12']['affected_ver_regex'] = '^4\\\\.12\\\\.';\nfixes['4.12']['affected_changesets'] = make_list(\n'1d64dc7', 'd1a06c9', '1a69ef0', '18f988a', '88d4e37', '36d2ecb', 'ee37d67', 'ece1cb0', 'f4a82a3', 'cf47a0e', '3334cb1',\n'08fde90', '16f03e0', '58668f1', '0138da1', '12a1ff9', 'a457425', '7f10403', 'b29848b', '278e46a', '7412e27', '58d59b9',\n'16bc9c0', '694fa9c', 'df67757', 'bbcd6c5', '7575728', 'db91ac4', '5698505', '28c209e', '1b1295e', '94ff3cf', '3918f99',\n'81a0e12', '113282b', '828e277', 'f5af2b9', '09513ab', '3dc7b91', '3d83e00', '26b8dd7', '5572ba9', 'bb4c1a8', '81feea0',\n'9f74689', '5f1c9e4', '4b5cc95', 'ab1e6a7', '801acf8', '97b4698', 'e28f7d6', '4fe70a1', 'c288534', '2a8209f', 'bc87a2d',\n'8fbf991', '8382d02', 'e142459', '0d210c0', '89de994', '9187046', '634a4d3', 'b6ee060', '61770e7', '599d6d2', '9d73672',\n'e6ccef1', '2b84ade', 'd2ca39f', '04a2fe9', '3c10d06', '4e145fd', '07ec556', '847fc70', '5ea346e', 'd42fb06', '32443f6',\n'a5fc553', 'b465705', 'd04466f', 'be2cd69', '50b9123', '8b129ba', 'b527557');\n\nfix = NULL;\nforeach ver_branch (keys(fixes))\n{\n if (version =~ fixes[ver_branch]['affected_ver_regex'])\n {\n ret = ver_compare(ver:version, fix:fixes[ver_branch]['fixed_ver']);\n if (ret < 0)\n fix = fixes[ver_branch]['fixed_ver_display'];\n else if (ret == 0)\n {\n if (empty_or_null(changeset))\n fix = fixes[ver_branch]['fixed_ver_display'];\n else\n foreach affected_changeset (fixes[ver_branch]['affected_changesets'])\n if (changeset == affected_changeset)\n fix = fixes[ver_branch]['fixed_ver_display'];\n }\n }\n}\n\nif (empty_or_null(fix))\n audit(AUDIT_INST_PATH_NOT_VULN, app_name, display_version, path);\n\nitems = make_array(\n 'Installed version', display_version,\n 'Fixed version', fix,\n 'Path', path\n);\n\norder = make_list('Path', 'Installed version', 'Fixed version');\nreport = report_items_str(report_items:items, ordered_fields:order) + '\\n';\n\nsecurity_report_v4(port:0, extra:report, severity:SECURITY_WARNING);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-04T15:42:42", "description": "Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. (CVE-2018-12207)\n\nImpact\n\nA privileged guest user may use this flaw to induce a hardware Machine Check Error (MCE) that halts the host processor and resultsin a denial-of-service (DoS) scenario.\n\nThis is a hardware issue and requires kernel updates to remediate.\nThis issue impacts all BIG-IP platforms using the following Intel processor families :\n\nXeon\n\nPentium Gold\n\nCore X-series\n\nCore i\n\nCeleron G\n\nThe following BIG-IP platforms are vulnerable :\n\nBIG-IP 2000s, 2200s, 4000s, 4200v, 5000s, 5050s, 5200v,5250v, 5250v fips, 7000s, 7200v , 7200v FIPS , 7250v series\n\nBIG-IP 10000s, 10050s, 10055s, 10150s NEBS, 10200v, 10200v FIPS, 10200v SSL, 10250v, 10255v, 10350v, 10350v NEBS, 11050 NEBS, 12250vseries\n\nBIG-IP iSeries platforms:i850, i2x00,i4x00, i5x00, i5820-DF, i7x00, i7x00-D2, i7820-DF, i10x00 / i10x00-D2, i11x00, i11x00-DS, i15x00\n\nVIPRION B2100, VIPRION B2150 , VIPRION B2250, VIPRION B4300 , VIPRION B4340N\n\nEnterprise Manager 4000\n\nBIG-IQ 7000\n\nThe following BIG-IP platforms are not vulnerable :\n\nBIG-IP 800, 1600, 3600, 3900, 4200, 4340, 6900 series\n\nBIG-IP 8900, 8950, 1100, 11050, 11050 FIPS series", "cvss3": {}, "published": "2020-07-09T00:00:00", "type": "nessus", "title": "F5 Networks BIG-IP : Intel MCE vulnerability (K17269881)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207"], "modified": "2023-11-03T00:00:00", "cpe": ["cpe:/a:f5:big-ip_access_policy_manager", "cpe:/a:f5:big-ip_advanced_firewall_manager", "cpe:/a:f5:big-ip_application_acceleration_manager", "cpe:/a:f5:big-ip_application_security_manager", "cpe:/a:f5:big-ip_application_visibility_and_reporting", "cpe:/a:f5:big-ip_domain_name_system", "cpe:/a:f5:big-ip_global_traffic_manager", "cpe:/a:f5:big-ip_link_controller", "cpe:/a:f5:big-ip_local_traffic_manager", "cpe:/a:f5:big-ip_policy_enforcement_manager", "cpe:/h:f5:big-ip"], "id": "F5_BIGIP_SOL17269881.NASL", "href": "https://www.tenable.com/plugins/nessus/138230", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from F5 Networks BIG-IP Solution K17269881.\n#\n# The text description of this plugin is (C) F5 Networks.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(138230);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/03\");\n\n script_cve_id(\"CVE-2018-12207\");\n\n script_name(english:\"F5 Networks BIG-IP : Intel MCE vulnerability (K17269881)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote device is missing a vendor-supplied security patch.\");\n script_set_attribute(attribute:\"description\", value:\n\"Improper invalidation for page table updates by a virtual guest\noperating system for multiple Intel(R) Processors may allow an\nauthenticated user to potentially enable denial of service of the host\nsystem via local access. (CVE-2018-12207)\n\nImpact\n\nA privileged guest user may use this flaw to induce a hardware Machine\nCheck Error (MCE) that halts the host processor and resultsin a\ndenial-of-service (DoS) scenario.\n\nThis is a hardware issue and requires kernel updates to remediate.\nThis issue impacts all BIG-IP platforms using the following Intel\nprocessor families :\n\nXeon\n\nPentium Gold\n\nCore X-series\n\nCore i\n\nCeleron G\n\nThe following BIG-IP platforms are vulnerable :\n\nBIG-IP 2000s, 2200s, 4000s, 4200v, 5000s, 5050s, 5200v,5250v, 5250v\nfips, 7000s, 7200v , 7200v FIPS , 7250v series\n\nBIG-IP 10000s, 10050s, 10055s, 10150s NEBS, 10200v, 10200v FIPS,\n10200v SSL, 10250v, 10255v, 10350v, 10350v NEBS, 11050 NEBS,\n12250vseries\n\nBIG-IP iSeries platforms:i850, i2x00,i4x00, i5x00, i5820-DF, i7x00,\ni7x00-D2, i7820-DF, i10x00 / i10x00-D2, i11x00, i11x00-DS, i15x00\n\nVIPRION B2100, VIPRION B2150 , VIPRION B2250, VIPRION B4300 , VIPRION\nB4340N\n\nEnterprise Manager 4000\n\nBIG-IQ 7000\n\nThe following BIG-IP platforms are not vulnerable :\n\nBIG-IP 800, 1600, 3600, 3900, 4200, 4340, 6900 series\n\nBIG-IP 8900, 8950, 1100, 11050, 11050 FIPS series\");\n script_set_attribute(attribute:\"see_also\", value:\"https://my.f5.com/manage/s/article/K17269881\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to one of the non-vulnerable versions listed in the F5 Solution K17269881.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-12207\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/07/09\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_access_policy_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_advanced_firewall_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_acceleration_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_security_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_visibility_and_reporting\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_domain_name_system\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_global_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_link_controller\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_local_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_policy_enforcement_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:f5:big-ip\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"F5 Networks Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"f5_bigip_detect.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/BIG-IP/hotfix\", \"Host/BIG-IP/modules\", \"Host/BIG-IP/version\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\n\ninclude('f5_func.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar version = get_kb_item('Host/BIG-IP/version');\nif ( ! version ) audit(AUDIT_OS_NOT, 'F5 Networks BIG-IP');\nif ( isnull(get_kb_item('Host/BIG-IP/hotfix')) ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/hotfix');\nif ( ! get_kb_item('Host/BIG-IP/modules') ) audit(AUDIT_KB_MISSING, 'Host/BIG-IP/modules');\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nvar sol = 'K17269881';\nvar vmatrix = {\n 'AFM': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n },\n 'AM': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n },\n 'APM': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n },\n 'ASM': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n },\n 'AVR': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n },\n 'DNS': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n },\n 'GTM': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n },\n 'LC': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n },\n 'LTM': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n },\n 'PEM': {\n 'affected': [\n '15.1.0','15.0.0-15.0.1','14.1.0-14.1.2','13.1.0-13.1.3','12.1.0-12.1.5','11.5.2-11.6.5'\n ],\n 'unaffected': [\n '16.0.0','15.1.0.5','15.0.1.4','14.1.2.8','13.1.3.5'\n ],\n }\n};\n\nif (bigip_is_affected(vmatrix:vmatrix, sol:sol))\n{\n var extra = NULL;\n if (report_verbosity > 0) extra = bigip_report_get();\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : extra\n );\n}\nelse\n{\n var tested = bigip_get_tested_modules();\n var audit_extra = 'For BIG-IP module(s) ' + tested + ',';\n if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);\n else audit(AUDIT_HOST_NOT, 'running any of the affected modules');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-24T14:31:17", "description": "This update for gcc7 to r275405 fixes the following issues :\n\nSecurity issues fixed :\n\n - CVE-2019-14250: Fixed an integer overflow in binutils (bsc#1142649).\n\n - CVE-2019-15847: Fixed an optimization in the POWER9 backend of gcc that could reduce the entropy of the random number generator (bsc#1149145).\n\nNon-security issue fixed :\n\n - Move Live Patching technology stack from kGraft to upstream klp (bsc#1071995, fate#323487).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "cvss3": {}, "published": "2019-10-23T00:00:00", "type": "nessus", "title": "openSUSE Security Update : gcc7 (openSUSE-2019-2364)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14250", "CVE-2019-15847"], "modified": "2019-12-18T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:cpp7", "p-cpe:/a:novell:opensuse:cpp7-debuginfo", "p-cpe:/a:novell:opensuse:gcc7", "p-cpe:/a:novell:opensuse:gcc7-32bit", "p-cpe:/a:novell:opensuse:gcc7-ada", "p-cpe:/a:novell:opensuse:gcc7-ada-32bit", "p-cpe:/a:novell:opensuse:gcc7-ada-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-c%2b%2b", "p-cpe:/a:novell:opensuse:gcc7-c%2b%2b-32bit", "p-cpe:/a:novell:opensuse:gcc7-c%2b%2b-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-debugsource", "p-cpe:/a:novell:opensuse:gcc7-fortran", "p-cpe:/a:novell:opensuse:gcc7-fortran-32bit", "p-cpe:/a:novell:opensuse:gcc7-fortran-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-go", "p-cpe:/a:novell:opensuse:gcc7-go-32bit", "p-cpe:/a:novell:opensuse:gcc7-go-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-info", "p-cpe:/a:novell:opensuse:gcc7-locale", "p-cpe:/a:novell:opensuse:gcc7-obj-c%2b%2b", "p-cpe:/a:novell:opensuse:gcc7-obj-c%2b%2b-32bit", "p-cpe:/a:novell:opensuse:gcc7-obj-c%2b%2b-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-objc", "p-cpe:/a:novell:opensuse:gcc7-objc-32bit", "p-cpe:/a:novell:opensuse:gcc7-objc-debuginfo", "p-cpe:/a:novell:opensuse:libada7", "p-cpe:/a:novell:opensuse:libada7-32bit", "p-cpe:/a:novell:opensuse:libada7-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libada7-debuginfo", "p-cpe:/a:novell:opensuse:libasan4", "p-cpe:/a:novell:opensuse:libasan4-32bit", "p-cpe:/a:novell:opensuse:libasan4-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libasan4-debuginfo", "p-cpe:/a:novell:opensuse:libcilkrts5", "p-cpe:/a:novell:opensuse:libcilkrts5-32bit", "p-cpe:/a:novell:opensuse:libcilkrts5-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libcilkrts5-debuginfo", "p-cpe:/a:novell:opensuse:libgfortran4", "p-cpe:/a:novell:opensuse:libgfortran4-32bit", "p-cpe:/a:novell:opensuse:libgfortran4-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libgfortran4-debuginfo", "p-cpe:/a:novell:opensuse:libgo11", "p-cpe:/a:novell:opensuse:libgo11-32bit", "p-cpe:/a:novell:opensuse:libgo11-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libgo11-debuginfo", "p-cpe:/a:novell:opensuse:libobjc4", "p-cpe:/a:novell:opensuse:libobjc4-32bit", "p-cpe:/a:novell:opensuse:libobjc4-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libobjc4-debuginfo", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-devel-gcc7", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-devel-gcc7-32bit", "p-cpe:/a:novell:opensuse:libubsan0", "p-cpe:/a:novell:opensuse:libubsan0-32bit", "p-cpe:/a:novell:opensuse:libubsan0-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libubsan0-debuginfo", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2019-2364.NASL", "href": "https://www.tenable.com/plugins/nessus/130159", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-2364.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130159);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/18\");\n\n script_cve_id(\"CVE-2019-14250\", \"CVE-2019-15847\");\n\n script_name(english:\"openSUSE Security Update : gcc7 (openSUSE-2019-2364)\");\n script_summary(english:\"Check for the openSUSE-2019-2364 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for gcc7 to r275405 fixes the following issues :\n\nSecurity issues fixed :\n\n - CVE-2019-14250: Fixed an integer overflow in binutils\n (bsc#1142649).\n\n - CVE-2019-15847: Fixed an optimization in the POWER9\n backend of gcc that could reduce the entropy of the\n random number generator (bsc#1149145).\n\nNon-security issue fixed :\n\n - Move Live Patching technology stack from kGraft to\n upstream klp (bsc#1071995, fate#323487).\n\nThis update was imported from the SUSE:SLE-15:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1141897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1142649\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1148517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1149145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://features.opensuse.org/323487\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gcc7 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cpp7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cpp7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-ada\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-ada-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-ada-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-c++-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-c++-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-fortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-fortran-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-fortran-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-go\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-go-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-go-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-info\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-obj-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-obj-c++-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-obj-c++-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-objc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-objc-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-objc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada7-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libcilkrts5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libcilkrts5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libcilkrts5-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libcilkrts5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo11-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo11-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libobjc4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libobjc4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libobjc4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libobjc4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-devel-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-devel-gcc7-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan0-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan0-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/10/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"cpp7-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"cpp7-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-ada-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-ada-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-c++-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-c++-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-debugsource-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-fortran-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-fortran-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-go-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-go-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-info-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-locale-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-obj-c++-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-obj-c++-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-objc-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc7-objc-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libada7-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libada7-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libasan4-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libasan4-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libcilkrts5-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libcilkrts5-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgfortran4-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgfortran4-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgo11-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgo11-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libobjc4-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libobjc4-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-devel-gcc7-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libubsan0-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libubsan0-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"gcc7-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"gcc7-ada-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"gcc7-c++-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"gcc7-go-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"gcc7-obj-c++-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"gcc7-objc-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libada7-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libada7-32bit-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libasan4-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libasan4-32bit-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libgo11-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libgo11-32bit-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libobjc4-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libobjc4-32bit-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libubsan0-32bit-7.4.1+r275405-lp151.2.6.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", cpu:\"x86_64\", reference:\"libubsan0-32bit-debuginfo-7.4.1+r275405-lp151.2.6.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cpp7 / cpp7-debuginfo / gcc7-32bit / gcc7 / gcc7-ada-32bit / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-24T14:32:28", "description": "This update includes the GNU Compiler Collection 9.\n\nA full changelog is provided by the GCC team on :\n\nhttps://www.gnu.org/software/gcc/gcc-9/changes.html\n\nThe base system compiler libraries libgcc_s1, libstdc++6 and others are now built by the gcc 9 packages.\n\nTo use it, install 'gcc9' or 'gcc9-c++' or other compiler brands and use CC=gcc-9 / CXX=g++-9 during configuration for using it.\n\nSecurity issues fixed :\n\nCVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)\n\nCVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)\n\nNon-security issues fixed: Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime.\n(bsc#1135254)\n\nFixed miscompilation for vector shift on s390. (bsc#1141897)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-11-26T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : gcc9 (SUSE-SU-2019:3061-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14250", "CVE-2019-15847"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:cpp9", "p-cpe:/a:novell:suse_linux:cpp9-debuginfo", "p-cpe:/a:novell:suse_linux:gcc9", "p-cpe:/a:novell:suse_linux:gcc9-ada", "p-cpe:/a:novell:suse_linux:gcc9-ada-debuginfo", "p-cpe:/a:novell:suse_linux:gcc9-c%2b%2b", "p-cpe:/a:novell:suse_linux:gcc9-c%2b%2b-debuginfo", "p-cpe:/a:novell:suse_linux:gcc9-debuginfo", "p-cpe:/a:novell:suse_linux:gcc9-debugsource", "p-cpe:/a:novell:suse_linux:gcc9-fortran", "p-cpe:/a:novell:suse_linux:gcc9-fortran-debuginfo", "p-cpe:/a:novell:suse_linux:gcc9-go", "p-cpe:/a:novell:suse_linux:gcc9-go-debuginfo", "p-cpe:/a:novell:suse_linux:gcc9-locale", "p-cpe:/a:novell:suse_linux:libada9", "p-cpe:/a:novell:suse_linux:libada9-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libada9-debuginfo", "p-cpe:/a:novell:suse_linux:libasan5", "p-cpe:/a:novell:suse_linux:libasan5-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libasan5-debuginfo", "p-cpe:/a:novell:suse_linux:libatomic1", "p-cpe:/a:novell:suse_linux:libatomic1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libatomic1-debuginfo", "p-cpe:/a:novell:suse_linux:libgcc_s1", "p-cpe:/a:novell:suse_linux:libgcc_s1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgcc_s1-debuginfo", "p-cpe:/a:novell:suse_linux:libgfortran5", "p-cpe:/a:novell:suse_linux:libgfortran5-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgfortran5-debuginfo", "p-cpe:/a:novell:suse_linux:libgo14", "p-cpe:/a:novell:suse_linux:libgo14-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgo14-debuginfo", "p-cpe:/a:novell:suse_linux:libgomp1", "p-cpe:/a:novell:suse_linux:libgomp1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgomp1-debuginfo", "p-cpe:/a:novell:suse_linux:libitm1", "p-cpe:/a:novell:suse_linux:libitm1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libitm1-debuginfo", "p-cpe:/a:novell:suse_linux:liblsan0", "p-cpe:/a:novell:suse_linux:liblsan0-debuginfo", "p-cpe:/a:novell:suse_linux:libquadmath0", "p-cpe:/a:novell:suse_linux:libquadmath0-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libquadmath0-debuginfo", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-debuginfo", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-devel-gcc9", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-locale", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-pp-gcc9", "p-cpe:/a:novell:suse_linux:libtsan0", "p-cpe:/a:novell:suse_linux:libtsan0-debuginfo", "p-cpe:/a:novell:suse_linux:libubsan1", "p-cpe:/a:novell:suse_linux:libubsan1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libubsan1-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-3061-1.NASL", "href": "https://www.tenable.com/plugins/nessus/131311", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:3061-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131311);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-14250\", \"CVE-2019-15847\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : gcc9 (SUSE-SU-2019:3061-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update includes the GNU Compiler Collection 9.\n\nA full changelog is provided by the GCC team on :\n\nhttps://www.gnu.org/software/gcc/gcc-9/changes.html\n\nThe base system compiler libraries libgcc_s1, libstdc++6 and others\nare now built by the gcc 9 packages.\n\nTo use it, install 'gcc9' or 'gcc9-c++' or other compiler brands and\nuse CC=gcc-9 / CXX=g++-9 during configuration for using it.\n\nSecurity issues fixed :\n\nCVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that\noptimized multiple calls of the __builtin_darn intrinsic into a single\ncall. (bsc#1149145)\n\nCVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)\n\nNon-security issues fixed: Split out libstdc++ pretty-printers into a\nseparate package supplementing gdb and the installed runtime.\n(bsc#1135254)\n\nFixed miscompilation for vector shift on s390. (bsc#1141897)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135254\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1141897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1142649\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1142654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1149145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.gnu.org/software/gcc/gcc-9/changes.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-14250/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-15847/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20193061-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?5aad195f\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-3061=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-2019-3061=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP1:zypper in -t\npatch SUSE-SLE-Module-Development-Tools-15-SP1-2019-3061=1\n\nSUSE Linux Enterprise Module for Development Tools 15:zypper in -t\npatch SUSE-SLE-Module-Development-Tools-15-2019-3061=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1:zypper in -t patch\nSUSE-SLE-Module-Basesystem-15-SP1-2019-3061=1\n\nSUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch\nSUSE-SLE-Module-Basesystem-15-2019-3061=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cpp9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cpp9-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-ada\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-ada-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-c++-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-fortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-fortran-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-go\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-go-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libada9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libada9-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libada9-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libasan5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libasan5-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libasan5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libatomic1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libatomic1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libatomic1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgcc_s1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgcc_s1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgcc_s1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgfortran5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgfortran5-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgfortran5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgo14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgo14-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgo14-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgomp1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgomp1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgomp1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libitm1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libitm1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libitm1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:liblsan0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:liblsan0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libquadmath0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libquadmath0-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libquadmath0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-devel-gcc9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-pp-gcc9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libtsan0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libtsan0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libubsan1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libubsan1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libubsan1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/26\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0/1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP0/1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cpp9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cpp9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-ada-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-ada-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-ada-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-c++-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-c++-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-c++-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-debugsource-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-fortran-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-fortran-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-fortran-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-go-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-go-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-go-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc9-locale-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libada9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libada9-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libada9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libada9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libasan5-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libasan5-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libasan5-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libasan5-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libatomic1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libatomic1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libatomic1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libatomic1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgcc_s1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgcc_s1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgcc_s1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgcc_s1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgfortran5-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgfortran5-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgfortran5-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgfortran5-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgo14-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgo14-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgo14-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgo14-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgomp1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgomp1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgomp1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgomp1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libitm1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libitm1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libitm1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libitm1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-devel-gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-devel-gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-locale-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-pp-gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-pp-gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libubsan1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libubsan1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libubsan1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libubsan1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"liblsan0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"liblsan0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libquadmath0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libquadmath0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libtsan0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libtsan0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cpp9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cpp9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-ada-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-ada-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-ada-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-c++-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-c++-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-c++-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-debugsource-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-fortran-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-fortran-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-fortran-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-go-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-go-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-go-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc9-locale-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libada9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libada9-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libada9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libada9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libasan5-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libasan5-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libasan5-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libasan5-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libatomic1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libatomic1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libatomic1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libatomic1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgcc_s1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgcc_s1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgcc_s1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgcc_s1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgfortran5-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgfortran5-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgfortran5-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgfortran5-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgo14-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgo14-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgo14-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgo14-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgomp1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgomp1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgomp1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgomp1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libitm1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libitm1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libitm1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libitm1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-devel-gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-devel-gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-locale-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-pp-gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-pp-gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libubsan1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libubsan1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libubsan1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libubsan1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cpp9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cpp9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-ada-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-ada-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-ada-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-c++-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-c++-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-c++-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-debugsource-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-fortran-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-fortran-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-fortran-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-go-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-go-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-go-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc9-locale-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libada9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libada9-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libada9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libada9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libasan5-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libasan5-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libasan5-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libasan5-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libatomic1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libatomic1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libatomic1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libatomic1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgcc_s1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgcc_s1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgcc_s1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgcc_s1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgfortran5-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgfortran5-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgfortran5-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgfortran5-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgo14-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgo14-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgo14-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgo14-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgomp1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgomp1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgomp1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgomp1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libitm1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libitm1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libitm1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libitm1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-devel-gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-devel-gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-locale-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-pp-gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-pp-gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libubsan1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libubsan1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libubsan1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libubsan1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"liblsan0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"liblsan0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libquadmath0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libquadmath0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libtsan0-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libtsan0-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cpp9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cpp9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-ada-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-ada-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-ada-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-c++-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-c++-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-c++-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-debugsource-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-fortran-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-fortran-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-fortran-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-go-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-go-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-go-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc9-locale-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libada9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libada9-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libada9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libada9-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libasan5-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libasan5-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libasan5-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libasan5-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libatomic1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libatomic1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libatomic1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libatomic1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgcc_s1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgcc_s1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgcc_s1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgcc_s1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgfortran5-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgfortran5-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgfortran5-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgfortran5-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgo14-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgo14-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgo14-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgo14-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgomp1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgomp1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgomp1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgomp1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libitm1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libitm1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libitm1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libitm1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-devel-gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-devel-gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-locale-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-pp-gcc9-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-pp-gcc9-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libubsan1-32bit-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libubsan1-32bit-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libubsan1-9.2.1+r275327-1.3.7\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libubsan1-debuginfo-9.2.1+r275327-1.3.7\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gcc9\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:00:49", "description": "This update includes the GNU Compiler Collection 9.\n\nThis update ships the GCC 9.3 release.\n\nA full changelog is provided by the GCC team on :\n\nhttps://www.gnu.org/software/gcc/gcc-9/changes.html\n\nThe base system compiler libraries libgcc_s1, libstdc++6 and others are now built by the gcc 9 packages.\n\nTo use it, install 'gcc9' or 'gcc9-c++' or other compiler brands and use CC=gcc-9 / CXX=g++-9 during configuration for using it.\n\nSecurity issues fixed :\n\n - CVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the\n __builtin_darn intrinsic into a single call.\n (bsc#1149145)\n\n - CVE-2019-14250: Fixed a heap overflow in the LTO linker.\n (bsc#1142649)\n\nNon-security issues fixed :\n\n - Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime.\n (bsc#1135254)\n\n - Fixed miscompilation for vector shift on s390.\n (bsc#1141897)\n\n - Includes a fix for Internal compiler error when building HepMC (bsc#1167898)\n\n - Includes fix for binutils version parsing\n\n - Add libstdc++6-pp provides and conflicts to avoid file conflicts with same minor version of libstdc++6-pp from gcc10.\n\n - Add gcc9 autodetect -g at lto link (bsc#1149995)\n\n - Install go tool buildid for bootstrapping go", "cvss3": {}, "published": "2020-05-29T00:00:00", "type": "nessus", "title": "openSUSE Security Update : gcc9 (openSUSE-2020-716)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14250", "CVE-2019-15847"], "modified": "2020-06-05T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:cpp9", "p-cpe:/a:novell:opensuse:cpp9-debuginfo", "p-cpe:/a:novell:opensuse:cross-nvptx-gcc9", "p-cpe:/a:novell:opensuse:cross-nvptx-gcc9-debuginfo", "p-cpe:/a:novell:opensuse:cross-nvptx-gcc9-debugsource", "p-cpe:/a:novell:opensuse:cross-nvptx-newlib9-devel", "p-cpe:/a:novell:opensuse:gcc9", "p-cpe:/a:novell:opensuse:gcc9-32bit", "p-cpe:/a:novell:opensuse:gcc9-ada", "p-cpe:/a:novell:opensuse:gcc9-ada-32bit", "p-cpe:/a:novell:opensuse:gcc9-ada-debuginfo", "p-cpe:/a:novell:opensuse:gcc9-c%2b%2b", "p-cpe:/a:novell:opensuse:gcc9-c%2b%2b-32bit", "p-cpe:/a:novell:opensuse:gcc9-c%2b%2b-debuginfo", "p-cpe:/a:novell:opensuse:gcc9-debuginfo", "p-cpe:/a:novell:opensuse:gcc9-debugsource", "p-cpe:/a:novell:opensuse:gcc9-fortran", "p-cpe:/a:novell:opensuse:gcc9-fortran-32bit", "p-cpe:/a:novell:opensuse:gcc9-fortran-debuginfo", "p-cpe:/a:novell:opensuse:gcc9-go", "p-cpe:/a:novell:opensuse:gcc9-go-32bit", "p-cpe:/a:novell:opensuse:gcc9-go-debuginfo", "p-cpe:/a:novell:opensuse:gcc9-info", "p-cpe:/a:novell:opensuse:gcc9-locale", "p-cpe:/a:novell:opensuse:libada9", "p-cpe:/a:novell:opensuse:libada9-32bit", "p-cpe:/a:novell:opensuse:libada9-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libada9-debuginfo", "p-cpe:/a:novell:opensuse:libasan5", "p-cpe:/a:novell:opensuse:libasan5-32bit", "p-cpe:/a:novell:opensuse:libasan5-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libasan5-debuginfo", "p-cpe:/a:novell:opensuse:libatomic1", "p-cpe:/a:novell:opensuse:libatomic1-32bit", "p-cpe:/a:novell:opensuse:libatomic1-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libatomic1-debuginfo", "p-cpe:/a:novell:opensuse:libgcc_s1", "p-cpe:/a:novell:opensuse:libgcc_s1-32bit", "p-cpe:/a:novell:opensuse:libgcc_s1-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libgcc_s1-debuginfo", "p-cpe:/a:novell:opensuse:libgfortran5", "p-cpe:/a:novell:opensuse:libgfortran5-32bit", "p-cpe:/a:novell:opensuse:libgfortran5-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libgfortran5-debuginfo", "p-cpe:/a:novell:opensuse:libgo14", "p-cpe:/a:novell:opensuse:libgo14-32bit", "p-cpe:/a:novell:opensuse:libgo14-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libgo14-debuginfo", "p-cpe:/a:novell:opensuse:libgomp1", "p-cpe:/a:novell:opensuse:libgomp1-32bit", "p-cpe:/a:novell:opensuse:libgomp1-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libgomp1-debuginfo", "p-cpe:/a:novell:opensuse:libitm1", "p-cpe:/a:novell:opensuse:libitm1-32bit", "p-cpe:/a:novell:opensuse:libitm1-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libitm1-debuginfo", "p-cpe:/a:novell:opensuse:liblsan0", "p-cpe:/a:novell:opensuse:liblsan0-debuginfo", "p-cpe:/a:novell:opensuse:libquadmath0", "p-cpe:/a:novell:opensuse:libquadmath0-32bit", "p-cpe:/a:novell:opensuse:libquadmath0-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libquadmath0-debuginfo", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-32bit", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-debuginfo", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-devel-gcc9", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-devel-gcc9-32bit", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-locale", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-pp-gcc9", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-pp-gcc9-32bit", "p-cpe:/a:novell:opensuse:libtsan0", "p-cpe:/a:novell:opensuse:libtsan0-debuginfo", "p-cpe:/a:novell:opensuse:libubsan1", "p-cpe:/a:novell:opensuse:libubsan1-32bit", "p-cpe:/a:novell:opensuse:libubsan1-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libubsan1-debuginfo", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2020-716.NASL", "href": "https://www.tenable.com/plugins/nessus/136959", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-716.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(136959);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/05\");\n\n script_cve_id(\"CVE-2019-14250\", \"CVE-2019-15847\");\n\n script_name(english:\"openSUSE Security Update : gcc9 (openSUSE-2020-716)\");\n script_summary(english:\"Check for the openSUSE-2020-716 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update includes the GNU Compiler Collection 9.\n\nThis update ships the GCC 9.3 release.\n\nA full changelog is provided by the GCC team on :\n\nhttps://www.gnu.org/software/gcc/gcc-9/changes.html\n\nThe base system compiler libraries libgcc_s1, libstdc++6 and others\nare now built by the gcc 9 packages.\n\nTo use it, install 'gcc9' or 'gcc9-c++' or other compiler brands and\nuse CC=gcc-9 / CXX=g++-9 during configuration for using it.\n\nSecurity issues fixed :\n\n - CVE-2019-15847: Fixed a miscompilation in the POWER9\n back end, that optimized multiple calls of the\n __builtin_darn intrinsic into a single call.\n (bsc#1149145)\n\n - CVE-2019-14250: Fixed a heap overflow in the LTO linker.\n (bsc#1142649)\n\nNon-security issues fixed :\n\n - Split out libstdc++ pretty-printers into a separate\n package supplementing gdb and the installed runtime.\n (bsc#1135254)\n\n - Fixed miscompilation for vector shift on s390.\n (bsc#1141897)\n\n - Includes a fix for Internal compiler error when building\n HepMC (bsc#1167898)\n\n - Includes fix for binutils version parsing\n\n - Add libstdc++6-pp provides and conflicts to avoid file\n conflicts with same minor version of libstdc++6-pp from\n gcc10.\n\n - Add gcc9 autodetect -g at lto link (bsc#1149995)\n\n - Install go tool buildid for bootstrapping go\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1135254\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1141897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1142649\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1142654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1148517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1149145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1149995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152590\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167898\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://jira.suse.com/browse/SLE-6533\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://jira.suse.com/browse/SLE-6536\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.gnu.org/software/gcc/gcc-9/changes.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gcc9 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cpp9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cpp9-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cross-nvptx-gcc9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cross-nvptx-gcc9-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cross-nvptx-gcc9-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cross-nvptx-newlib9-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-ada\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-ada-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-ada-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-c++-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-c++-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-fortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-fortran-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-fortran-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-go\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-go-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-go-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-info\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc9-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada9-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada9-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada9-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan5-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libatomic1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libatomic1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libatomic1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libatomic1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgcc_s1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgcc_s1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgcc_s1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgcc_s1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran5-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo14-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo14-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo14-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgomp1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgomp1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgomp1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgomp1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libitm1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libitm1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libitm1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libitm1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:liblsan0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:liblsan0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libquadmath0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libquadmath0-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libquadmath0-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libquadmath0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-devel-gcc9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-devel-gcc9-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-pp-gcc9\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-pp-gcc9-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libtsan0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libtsan0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan1-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"cpp9-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"cpp9-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"cross-nvptx-gcc9-9.3.1+git1296-lp151.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"cross-nvptx-gcc9-debuginfo-9.3.1+git1296-lp151.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"cross-nvptx-gcc9-debugsource-9.3.1+git1296-lp151.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"cross-nvptx-newlib9-devel-9.3.1+git1296-lp151.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-ada-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-ada-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-ada-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-c++-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-c++-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-c++-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-debugsource-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-fortran-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-fortran-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-fortran-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-go-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-go-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-go-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-info-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"gcc9-locale-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libada9-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libada9-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libada9-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libada9-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libasan5-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libasan5-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libasan5-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libasan5-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libatomic1-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libatomic1-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libatomic1-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libatomic1-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgcc_s1-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgcc_s1-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgcc_s1-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgcc_s1-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgfortran5-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgfortran5-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgfortran5-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgfortran5-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgo14-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgo14-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgo14-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgo14-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgomp1-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgomp1-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgomp1-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libgomp1-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libitm1-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libitm1-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libitm1-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libitm1-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"liblsan0-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"liblsan0-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libquadmath0-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libquadmath0-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libquadmath0-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libquadmath0-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-devel-gcc9-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-devel-gcc9-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-locale-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-pp-gcc9-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libstdc++6-pp-gcc9-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libtsan0-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libtsan0-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libubsan1-32bit-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libubsan1-32bit-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libubsan1-9.3.1+git1296-lp151.2.2\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"libubsan1-debuginfo-9.3.1+git1296-lp151.2.2\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cross-nvptx-gcc9 / cross-nvptx-gcc9-debuginfo / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-24T14:30:21", "description": "This update for gcc7 to r275405 fixes the following issues :\n\nSecurity issues fixed :\n\n - CVE-2019-14250: Fixed an integer overflow in binutils (bsc#1142649).\n\n - CVE-2019-15847: Fixed an optimization in the POWER9 backend of gcc that could reduce the entropy of the random number generator (bsc#1149145).\n\nNon-security issue fixed :\n\n - Move Live Patching technology stack from kGraft to upstream klp (bsc#1071995, fate#323487).\n\nThis update was imported from the SUSE:SLE-15:Update update project.", "cvss3": {}, "published": "2019-10-23T00:00:00", "type": "nessus", "title": "openSUSE Security Update : gcc7 (openSUSE-2019-2365)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14250", "CVE-2019-15847"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:cpp7", "p-cpe:/a:novell:opensuse:cpp7-debuginfo", "p-cpe:/a:novell:opensuse:gcc7", "p-cpe:/a:novell:opensuse:gcc7-32bit", "p-cpe:/a:novell:opensuse:gcc7-ada", "p-cpe:/a:novell:opensuse:gcc7-ada-32bit", "p-cpe:/a:novell:opensuse:gcc7-ada-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-c%2b%2b", "p-cpe:/a:novell:opensuse:gcc7-c%2b%2b-32bit", "p-cpe:/a:novell:opensuse:gcc7-c%2b%2b-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-debugsource", "p-cpe:/a:novell:opensuse:gcc7-fortran", "p-cpe:/a:novell:opensuse:gcc7-fortran-32bit", "p-cpe:/a:novell:opensuse:gcc7-fortran-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-go", "p-cpe:/a:novell:opensuse:gcc7-go-32bit", "p-cpe:/a:novell:opensuse:gcc7-go-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-info", "p-cpe:/a:novell:opensuse:gcc7-locale", "p-cpe:/a:novell:opensuse:gcc7-obj-c%2b%2b", "p-cpe:/a:novell:opensuse:gcc7-obj-c%2b%2b-32bit", "p-cpe:/a:novell:opensuse:gcc7-obj-c%2b%2b-debuginfo", "p-cpe:/a:novell:opensuse:gcc7-objc", "p-cpe:/a:novell:opensuse:gcc7-objc-32bit", "p-cpe:/a:novell:opensuse:gcc7-objc-debuginfo", "p-cpe:/a:novell:opensuse:libada7", "p-cpe:/a:novell:opensuse:libada7-32bit", "p-cpe:/a:novell:opensuse:libada7-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libada7-debuginfo", "p-cpe:/a:novell:opensuse:libasan4", "p-cpe:/a:novell:opensuse:libasan4-32bit", "p-cpe:/a:novell:opensuse:libasan4-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libasan4-debuginfo", "p-cpe:/a:novell:opensuse:libcilkrts5", "p-cpe:/a:novell:opensuse:libcilkrts5-32bit", "p-cpe:/a:novell:opensuse:libcilkrts5-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libcilkrts5-debuginfo", "p-cpe:/a:novell:opensuse:libgfortran4", "p-cpe:/a:novell:opensuse:libgfortran4-32bit", "p-cpe:/a:novell:opensuse:libgfortran4-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libgfortran4-debuginfo", "p-cpe:/a:novell:opensuse:libgo11", "p-cpe:/a:novell:opensuse:libgo11-32bit", "p-cpe:/a:novell:opensuse:libgo11-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libgo11-debuginfo", "p-cpe:/a:novell:opensuse:libobjc4", "p-cpe:/a:novell:opensuse:libobjc4-32bit", "p-cpe:/a:novell:opensuse:libobjc4-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libobjc4-debuginfo", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-devel-gcc7", "p-cpe:/a:novell:opensuse:libstdc%2b%2b6-devel-gcc7-32bit", "p-cpe:/a:novell:opensuse:libubsan0", "p-cpe:/a:novell:opensuse:libubsan0-32bit", "p-cpe:/a:novell:opensuse:libubsan0-32bit-debuginfo", "p-cpe:/a:novell:opensuse:libubsan0-debuginfo", "cpe:/o:novell:opensuse:15.0"], "id": "OPENSUSE-2019-2365.NASL", "href": "https://www.tenable.com/plugins/nessus/130160", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-2365.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(130160);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2019-14250\", \"CVE-2019-15847\");\n\n script_name(english:\"openSUSE Security Update : gcc7 (openSUSE-2019-2365)\");\n script_summary(english:\"Check for the openSUSE-2019-2365 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for gcc7 to r275405 fixes the following issues :\n\nSecurity issues fixed :\n\n - CVE-2019-14250: Fixed an integer overflow in binutils\n (bsc#1142649).\n\n - CVE-2019-15847: Fixed an optimization in the POWER9\n backend of gcc that could reduce the entropy of the\n random number generator (bsc#1149145).\n\nNon-security issue fixed :\n\n - Move Live Patching technology stack from kGraft to\n upstream klp (bsc#1071995, fate#323487).\n\nThis update was imported from the SUSE:SLE-15:Update update project.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1141897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1142649\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1148517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1149145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://features.opensuse.org/323487\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected gcc7 packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cpp7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:cpp7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-ada\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-ada-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-ada-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-c++-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-c++-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-fortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-fortran-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-fortran-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-go\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-go-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-go-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-info\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-obj-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-obj-c++-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-obj-c++-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-objc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-objc-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:gcc7-objc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada7-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libada7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libasan4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libcilkrts5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libcilkrts5-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libcilkrts5-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libcilkrts5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgfortran4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo11-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo11-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libgo11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libobjc4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libobjc4-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libobjc4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libobjc4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-devel-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libstdc++6-devel-gcc7-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan0-32bit\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan0-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libubsan0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/10/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/10/23\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(i586|i686|x86_64)$\") audit(AUDIT_ARCH_NOT, \"i586 / i686 / x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"cpp7-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"cpp7-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-ada-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-ada-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-c++-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-c++-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-debugsource-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-fortran-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-fortran-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-go-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-go-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-info-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-locale-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-obj-c++-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-obj-c++-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-objc-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"gcc7-objc-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libada7-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libada7-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libasan4-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libasan4-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libcilkrts5-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libcilkrts5-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libgfortran4-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libgfortran4-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libgo11-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libgo11-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libobjc4-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libobjc4-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libstdc++6-devel-gcc7-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libubsan0-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"libubsan0-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"gcc7-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"gcc7-ada-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"gcc7-c++-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"gcc7-go-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"gcc7-obj-c++-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"gcc7-objc-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libada7-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libada7-32bit-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libasan4-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libasan4-32bit-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libgo11-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libgo11-32bit-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libobjc4-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libobjc4-32bit-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libubsan0-32bit-7.4.1+r275405-lp150.12.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", cpu:\"x86_64\", reference:\"libubsan0-32bit-debuginfo-7.4.1+r275405-lp150.12.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"cpp7 / cpp7-debuginfo / gcc7-32bit / gcc7 / gcc7-ada-32bit / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-24T14:30:17", "description": "This update for gcc7 to r275405 fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-14250: Fixed an integer overflow in binutils (bsc#1142649).\n\nCVE-2019-15847: Fixed an optimization in the POWER9 backend of gcc that could reduce the entropy of the random number generator (bsc#1149145).\n\nNon-security issue fixed: Move Live Patching technology stack from kGraft to upstream klp (bsc#1071995, fate#323487).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-10-17T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : gcc7 (SUSE-SU-2019:2702-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14250", "CVE-2019-15847"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:cpp7", "p-cpe:/a:novell:suse_linux:cpp7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-aarch64-gcc7", "p-cpe:/a:novell:suse_linux:cross-aarch64-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-aarch64-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-aarch64-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-arm-gcc7", "p-cpe:/a:novell:suse_linux:cross-arm-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-arm-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-arm-none-gcc7-bootstrap", "p-cpe:/a:novell:suse_linux:cross-arm-none-gcc7-bootstrap-debuginfo", "p-cpe:/a:novell:suse_linux:cross-arm-none-gcc7-bootstrap-debugsource", "p-cpe:/a:novell:suse_linux:cross-avr-gcc7-bootstrap", "p-cpe:/a:novell:suse_linux:cross-avr-gcc7-bootstrap-debuginfo", "p-cpe:/a:novell:suse_linux:cross-avr-gcc7-bootstrap-debugsource", "p-cpe:/a:novell:suse_linux:cross-epiphany-gcc7-bootstrap", "p-cpe:/a:novell:suse_linux:cross-epiphany-gcc7-bootstrap-debuginfo", "p-cpe:/a:novell:suse_linux:cross-epiphany-gcc7-bootstrap-debugsource", "p-cpe:/a:novell:suse_linux:cross-hppa-gcc7", "p-cpe:/a:novell:suse_linux:cross-hppa-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-hppa-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-hppa-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-i386-gcc7", "p-cpe:/a:novell:suse_linux:cross-i386-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-i386-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-i386-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-m68k-gcc7", "p-cpe:/a:novell:suse_linux:cross-m68k-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-m68k-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-m68k-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-mips-gcc7", "p-cpe:/a:novell:suse_linux:cross-mips-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-mips-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-mips-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-nvptx-gcc7", "p-cpe:/a:novell:suse_linux:cross-nvptx-newlib7-devel", "p-cpe:/a:novell:suse_linux:cross-ppc64-gcc7", "p-cpe:/a:novell:suse_linux:cross-ppc64-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-ppc64-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-ppc64-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-ppc64le-gcc7", "p-cpe:/a:novell:suse_linux:cross-ppc64le-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-ppc64le-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-ppc64le-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-rx-gcc7-bootstrap", "p-cpe:/a:novell:suse_linux:cross-rx-gcc7-bootstrap-debuginfo", "p-cpe:/a:novell:suse_linux:cross-rx-gcc7-bootstrap-debugsource", "p-cpe:/a:novell:suse_linux:cross-s390x-gcc7", "p-cpe:/a:novell:suse_linux:cross-s390x-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-s390x-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-s390x-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-sparc-gcc7", "p-cpe:/a:novell:suse_linux:cross-sparc-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-sparc-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-sparc64-gcc7", "p-cpe:/a:novell:suse_linux:cross-sparc64-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-sparc64-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-sparc64-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-sparcv9-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:cross-x86_64-gcc7", "p-cpe:/a:novell:suse_linux:cross-x86_64-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:cross-x86_64-gcc7-debugsource", "p-cpe:/a:novell:suse_linux:cross-x86_64-gcc7-icecream-backend", "p-cpe:/a:novell:suse_linux:gcc7", "p-cpe:/a:novell:suse_linux:gcc7-ada", "p-cpe:/a:novell:suse_linux:gcc7-ada-debuginfo", "p-cpe:/a:novell:suse_linux:gcc7-c%2b%2b", "p-cpe:/a:novell:suse_linux:gcc7-c%2b%2b-debuginfo", "p-cpe:/a:novell:suse_linux:gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:gcc7-debugsource", "p-cpe:/a:novell:suse_linux:gcc7-fortran", "p-cpe:/a:novell:suse_linux:gcc7-fortran-debuginfo", "p-cpe:/a:novell:suse_linux:gcc7-go", "p-cpe:/a:novell:suse_linux:gcc7-go-debuginfo", "p-cpe:/a:novell:suse_linux:gcc7-locale", "p-cpe:/a:novell:suse_linux:gcc7-obj-c%2b%2b", "p-cpe:/a:novell:suse_linux:gcc7-obj-c%2b%2b-debuginfo", "p-cpe:/a:novell:suse_linux:gcc7-objc", "p-cpe:/a:novell:suse_linux:gcc7-objc-debuginfo", "p-cpe:/a:novell:suse_linux:gcc7-testresults", "p-cpe:/a:novell:suse_linux:libada7", "p-cpe:/a:novell:suse_linux:libada7-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libada7-debuginfo", "p-cpe:/a:novell:suse_linux:libasan4", "p-cpe:/a:novell:suse_linux:libasan4-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libasan4-debuginfo", "p-cpe:/a:novell:suse_linux:libatomic1-gcc7", "p-cpe:/a:novell:suse_linux:libatomic1-gcc7-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libatomic1-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:libcilkrts5", "p-cpe:/a:novell:suse_linux:libcilkrts5-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libcilkrts5-debuginfo", "p-cpe:/a:novell:suse_linux:libgcc_s1-gcc7", "p-cpe:/a:novell:suse_linux:libgcc_s1-gcc7-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgcc_s1-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:libgfortran4", "p-cpe:/a:novell:suse_linux:libgfortran4-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgfortran4-debuginfo", "p-cpe:/a:novell:suse_linux:libgo11", "p-cpe:/a:novell:suse_linux:libgo11-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgo11-debuginfo", "p-cpe:/a:novell:suse_linux:libgomp1-gcc7", "p-cpe:/a:novell:suse_linux:libgomp1-gcc7-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgomp1-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:libitm1-gcc7", "p-cpe:/a:novell:suse_linux:libitm1-gcc7-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libitm1-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:liblsan0-gcc7", "p-cpe:/a:novell:suse_linux:liblsan0-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:libmpx2-gcc7", "p-cpe:/a:novell:suse_linux:libmpx2-gcc7-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libmpx2-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:libmpxwrappers2-gcc7", "p-cpe:/a:novell:suse_linux:libmpxwrappers2-gcc7-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libmpxwrappers2-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:libobjc4", "p-cpe:/a:novell:suse_linux:libobjc4-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libobjc4-debuginfo", "p-cpe:/a:novell:suse_linux:libquadmath0-gcc7", "p-cpe:/a:novell:suse_linux:libquadmath0-gcc7-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libquadmath0-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-devel-gcc7", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-gcc7", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-gcc7-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-gcc7-locale", "p-cpe:/a:novell:suse_linux:libtsan0-gcc7", "p-cpe:/a:novell:suse_linux:libtsan0-gcc7-debuginfo", "p-cpe:/a:novell:suse_linux:libubsan0", "p-cpe:/a:novell:suse_linux:libubsan0-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libubsan0-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-2702-1.NASL", "href": "https://www.tenable.com/plugins/nessus/130002", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:2702-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130002);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-14250\", \"CVE-2019-15847\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : gcc7 (SUSE-SU-2019:2702-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for gcc7 to r275405 fixes the following issues :\n\nSecurity issues fixed :\n\nCVE-2019-14250: Fixed an integer overflow in binutils (bsc#1142649).\n\nCVE-2019-15847: Fixed an optimization in the POWER9 backend of gcc\nthat could reduce the entropy of the random number generator\n(bsc#1149145).\n\nNon-security issue fixed: Move Live Patching technology stack from\nkGraft to upstream klp (bsc#1071995, fate#323487).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1141897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1142649\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1149145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-14250/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-15847/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20192702-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?98ddf222\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15-SP1:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-2702=1\n\nSUSE Linux Enterprise Module for Open Buildservice Development Tools\n15:zypper in -t patch\nSUSE-SLE-Module-Development-Tools-OBS-15-2019-2702=1\n\nSUSE Linux Enterprise Module for Development Tools 15-SP1:zypper in -t\npatch SUSE-SLE-Module-Development-Tools-15-SP1-2019-2702=1\n\nSUSE Linux Enterprise Module for Development Tools 15:zypper in -t\npatch SUSE-SLE-Module-Development-Tools-15-2019-2702=1\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1:zypper in -t patch\nSUSE-SLE-Module-Basesystem-15-SP1-2019-2702=1\n\nSUSE Linux Enterprise Module for Basesystem 15:zypper in -t patch\nSUSE-SLE-Module-Basesystem-15-2019-2702=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cpp7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cpp7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-aarch64-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-aarch64-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-aarch64-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-aarch64-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-arm-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-arm-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-arm-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-arm-none-gcc7-bootstrap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-arm-none-gcc7-bootstrap-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-arm-none-gcc7-bootstrap-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-avr-gcc7-bootstrap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-avr-gcc7-bootstrap-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-avr-gcc7-bootstrap-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-epiphany-gcc7-bootstrap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-epiphany-gcc7-bootstrap-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-epiphany-gcc7-bootstrap-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-hppa-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-hppa-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-hppa-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-hppa-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-i386-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-i386-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-i386-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-i386-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-m68k-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-m68k-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-m68k-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-m68k-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-mips-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-mips-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-mips-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-mips-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-nvptx-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-nvptx-newlib7-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-ppc64-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-ppc64-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-ppc64-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-ppc64-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-ppc64le-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-ppc64le-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-ppc64le-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-ppc64le-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-rx-gcc7-bootstrap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-rx-gcc7-bootstrap-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-rx-gcc7-bootstrap-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-s390x-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-s390x-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-s390x-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-s390x-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-sparc-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-sparc-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-sparc-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-sparc64-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-sparc64-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-sparc64-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-sparc64-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-sparcv9-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-x86_64-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-x86_64-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-x86_64-gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cross-x86_64-gcc7-icecream-backend\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-ada\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-ada-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-c++-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-fortran\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-fortran-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-go\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-go-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-obj-c++\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-obj-c++-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-objc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-objc-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc7-testresults\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libada7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libada7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libada7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libasan4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libasan4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libasan4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libatomic1-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libatomic1-gcc7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libatomic1-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libcilkrts5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libcilkrts5-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libcilkrts5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgcc_s1-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgcc_s1-gcc7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgcc_s1-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgfortran4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgfortran4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgfortran4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgo11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgo11-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgo11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgomp1-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgomp1-gcc7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgomp1-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libitm1-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libitm1-gcc7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libitm1-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:liblsan0-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:liblsan0-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libmpx2-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libmpx2-gcc7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libmpx2-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libmpxwrappers2-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libmpxwrappers2-gcc7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libmpxwrappers2-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libobjc4\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libobjc4-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libobjc4-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libquadmath0-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libquadmath0-gcc7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libquadmath0-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-devel-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-gcc7-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-gcc7-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libtsan0-gcc7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libtsan0-gcc7-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libubsan0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libubsan0-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libubsan0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/10/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/10/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP0/1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP0/1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-nvptx-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-nvptx-newlib7-devel-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-s390x-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-s390x-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-s390x-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-s390x-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gcc7-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libasan4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libasan4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libcilkrts5-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libcilkrts5-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpx2-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpx2-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpx2-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpx2-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpxwrappers2-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpxwrappers2-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpxwrappers2-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpxwrappers2-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libubsan0-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"libubsan0-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"cross-x86_64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"cross-x86_64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"cross-x86_64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"cross-x86_64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"gcc7-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libasan4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libasan4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libgfortran4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libgfortran4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libubsan0-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"s390x\", reference:\"libubsan0-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cpp7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cpp7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-aarch64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-aarch64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-aarch64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-aarch64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-arm-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-arm-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-arm-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-arm-none-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-arm-none-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-arm-none-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-avr-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-avr-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-avr-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-epiphany-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-epiphany-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-epiphany-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-hppa-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-hppa-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-hppa-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-hppa-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-i386-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-i386-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-i386-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-i386-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-m68k-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-m68k-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-m68k-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-m68k-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-mips-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-mips-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-mips-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-mips-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-ppc64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-ppc64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-ppc64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-ppc64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-ppc64le-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-ppc64le-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-ppc64le-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-ppc64le-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-rx-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-rx-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-rx-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-sparc-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-sparc-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-sparc-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-sparc64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-sparc64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-sparc64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-sparc64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"cross-sparcv9-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-ada-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-ada-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-ada-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-c++-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-c++-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-fortran-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-fortran-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-go-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-go-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-go-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-locale-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-obj-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-obj-c++-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-obj-c++-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-objc-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-objc-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-objc-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"gcc7-testresults-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libada7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libada7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libada7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libada7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libasan4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libasan4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libatomic1-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libatomic1-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libatomic1-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libatomic1-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgcc_s1-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgcc_s1-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgcc_s1-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgcc_s1-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgfortran4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgfortran4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgo11-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgo11-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgo11-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgo11-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgomp1-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgomp1-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgomp1-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libgomp1-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libitm1-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libitm1-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libitm1-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libitm1-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libobjc4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libobjc4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libobjc4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libobjc4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-devel-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libstdc++6-gcc7-locale-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libubsan0-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", reference:\"libubsan0-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"cross-nvptx-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"cross-nvptx-newlib7-devel-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"gcc7-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libasan4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libasan4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libcilkrts5-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libcilkrts5-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libubsan0-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"x86_64\", reference:\"libubsan0-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"gcc7-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"libasan4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"libgfortran4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", cpu:\"s390x\", reference:\"libubsan0-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cpp7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cpp7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-arm-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-arm-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-arm-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-arm-none-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-arm-none-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-arm-none-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-avr-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-avr-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-avr-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-epiphany-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-epiphany-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-epiphany-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-hppa-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-hppa-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-hppa-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-hppa-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-i386-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-i386-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-i386-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-i386-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-m68k-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-m68k-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-m68k-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-m68k-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-mips-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-mips-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-mips-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-mips-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-ppc64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-ppc64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-ppc64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-ppc64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-rx-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-rx-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-rx-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-sparc-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-sparc-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-sparc-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-sparc64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-sparc64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-sparc64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-sparc64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"cross-sparcv9-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-ada-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-ada-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-ada-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-c++-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-c++-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-fortran-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-fortran-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-go-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-go-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-go-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-locale-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-obj-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-obj-c++-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-obj-c++-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-objc-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-objc-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-objc-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"gcc7-testresults-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libada7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libada7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libada7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libasan4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libasan4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgfortran4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgfortran4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgo11-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgo11-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libgo11-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libobjc4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libobjc4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libobjc4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libstdc++6-devel-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libubsan0-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"0\", reference:\"libubsan0-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-nvptx-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-nvptx-newlib7-devel-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-s390x-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-s390x-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-s390x-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"cross-s390x-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"gcc7-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libasan4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libasan4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libcilkrts5-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libcilkrts5-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpx2-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpx2-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpx2-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpx2-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpxwrappers2-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpxwrappers2-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpxwrappers2-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libmpxwrappers2-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libubsan0-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"libubsan0-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"cross-x86_64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"cross-x86_64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"cross-x86_64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"cross-x86_64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"gcc7-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libasan4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libasan4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libgfortran4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libgfortran4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libubsan0-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"s390x\", reference:\"libubsan0-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cpp7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cpp7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-aarch64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-aarch64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-aarch64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-aarch64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-arm-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-arm-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-arm-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-arm-none-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-arm-none-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-arm-none-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-avr-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-avr-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-avr-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-epiphany-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-epiphany-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-epiphany-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-hppa-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-hppa-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-hppa-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-hppa-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-i386-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-i386-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-i386-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-i386-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-m68k-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-m68k-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-m68k-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-m68k-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-mips-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-mips-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-mips-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-mips-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-ppc64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-ppc64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-ppc64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-ppc64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-ppc64le-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-ppc64le-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-ppc64le-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-ppc64le-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-rx-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-rx-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-rx-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-sparc-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-sparc-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-sparc-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-sparc64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-sparc64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-sparc64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-sparc64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"cross-sparcv9-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-ada-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-ada-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-ada-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-c++-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-c++-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-fortran-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-fortran-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-go-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-go-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-go-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-locale-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-obj-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-obj-c++-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-obj-c++-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-objc-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-objc-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-objc-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"gcc7-testresults-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libada7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libada7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libada7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libada7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libasan4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libasan4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libatomic1-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libatomic1-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libatomic1-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libatomic1-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgcc_s1-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgcc_s1-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgcc_s1-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgcc_s1-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgfortran4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgfortran4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgo11-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgo11-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgo11-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgo11-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgomp1-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgomp1-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgomp1-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libgomp1-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libitm1-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libitm1-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libitm1-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libitm1-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libobjc4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libobjc4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libobjc4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libobjc4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-devel-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-gcc7-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libstdc++6-gcc7-locale-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libubsan0-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", reference:\"libubsan0-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"cross-nvptx-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"cross-nvptx-newlib7-devel-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"gcc7-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libasan4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libasan4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libcilkrts5-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libcilkrts5-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libcilkrts5-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libgfortran4-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libubsan0-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"x86_64\", reference:\"libubsan0-32bit-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"gcc7-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"gcc7-fortran-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"libasan4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"libgfortran4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"libstdc++6-devel-gcc7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", cpu:\"s390x\", reference:\"libubsan0-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cpp7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cpp7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-arm-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-arm-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-arm-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-arm-none-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-arm-none-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-arm-none-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-avr-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-avr-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-avr-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-epiphany-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-epiphany-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-epiphany-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-hppa-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-hppa-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-hppa-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-hppa-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-i386-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-i386-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-i386-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-i386-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-m68k-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-m68k-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-m68k-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-m68k-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-mips-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-mips-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-mips-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-mips-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-ppc64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-ppc64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-ppc64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-ppc64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-rx-gcc7-bootstrap-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-rx-gcc7-bootstrap-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-rx-gcc7-bootstrap-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-sparc-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-sparc-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-sparc-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-sparc64-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-sparc64-gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-sparc64-gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-sparc64-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"cross-sparcv9-gcc7-icecream-backend-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-ada-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-ada-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-ada-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-c++-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-c++-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-debugsource-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-fortran-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-fortran-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-go-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-go-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-go-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-locale-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-obj-c++-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-obj-c++-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-obj-c++-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-objc-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-objc-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-objc-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"gcc7-testresults-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libada7-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libada7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libada7-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libasan4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libasan4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgfortran4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgfortran4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgo11-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgo11-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libgo11-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libobjc4-32bit-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libobjc4-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libobjc4-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libstdc++6-devel-gcc7-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libubsan0-7.4.1+r275405-4.9.2\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"0\", reference:\"libubsan0-debuginfo-7.4.1+r275405-4.9.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gcc7\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:56:16", "description": "This update for gcc9 fixes the following issues :\n\nThe GNU Compiler Collection is shipped in version 9.\n\nA detailed changelog on what changed in GCC 9 is available at https://gcc.gnu.org/gcc-9/changes.html\n\nThe compilers have been added to the SUSE Linux Enterprise Toolchain Module.\n\nTo use these compilers, install e.g. gcc9, gcc9-c++ and build with CC=gcc-9 CXX=g++-9 set.\n\nFor SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and other compiler libraries have been switched from their gcc8 variants to their gcc9 variants.\n\nSecurity issues fixed :\n\nCVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that optimized multiple calls of the __builtin_darn intrinsic into a single call. (bsc#1149145)\n\nCVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)\n\nNon-security issues fixed: Split out libstdc++ pretty-printers into a separate package supplementing gdb and the installed runtime.\n(bsc#1135254)\n\nFixed miscompilation for vector shift on s390. (bsc#1141897)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-02-19T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : gcc9 (SUSE-SU-2020:0394-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-14250", "CVE-2019-15847"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:gcc9-debuginfo", "p-cpe:/a:novell:suse_linux:gcc9-debugsource", "p-cpe:/a:novell:suse_linux:libasan5", "p-cpe:/a:novell:suse_linux:libasan5-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libasan5-debuginfo", "p-cpe:/a:novell:suse_linux:libatomic1", "p-cpe:/a:novell:suse_linux:libatomic1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libatomic1-debuginfo", "p-cpe:/a:novell:suse_linux:libgcc_s1", "p-cpe:/a:novell:suse_linux:libgcc_s1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgcc_s1-debuginfo", "p-cpe:/a:novell:suse_linux:libgfortran5", "p-cpe:/a:novell:suse_linux:libgfortran5-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgfortran5-debuginfo", "p-cpe:/a:novell:suse_linux:libgo14", "p-cpe:/a:novell:suse_linux:libgo14-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgo14-debuginfo", "p-cpe:/a:novell:suse_linux:libgomp1", "p-cpe:/a:novell:suse_linux:libgomp1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libgomp1-debuginfo", "p-cpe:/a:novell:suse_linux:libitm1", "p-cpe:/a:novell:suse_linux:libitm1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libitm1-debuginfo", "p-cpe:/a:novell:suse_linux:liblsan0", "p-cpe:/a:novell:suse_linux:liblsan0-debuginfo", "p-cpe:/a:novell:suse_linux:libquadmath0", "p-cpe:/a:novell:suse_linux:libquadmath0-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libquadmath0-debuginfo", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-debuginfo", "p-cpe:/a:novell:suse_linux:libstdc%2b%2b6-locale", "p-cpe:/a:novell:suse_linux:libtsan0", "p-cpe:/a:novell:suse_linux:libtsan0-debuginfo", "p-cpe:/a:novell:suse_linux:libubsan1", "p-cpe:/a:novell:suse_linux:libubsan1-32bit-debuginfo", "p-cpe:/a:novell:suse_linux:libubsan1-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-0394-1.NASL", "href": "https://www.tenable.com/plugins/nessus/133791", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:0394-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(133791);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-14250\", \"CVE-2019-15847\");\n\n script_name(english:\"SUSE SLES12 Security Update : gcc9 (SUSE-SU-2020:0394-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for gcc9 fixes the following issues :\n\nThe GNU Compiler Collection is shipped in version 9.\n\nA detailed changelog on what changed in GCC 9 is available at\nhttps://gcc.gnu.org/gcc-9/changes.html\n\nThe compilers have been added to the SUSE Linux Enterprise Toolchain\nModule.\n\nTo use these compilers, install e.g. gcc9, gcc9-c++ and build with\nCC=gcc-9 CXX=g++-9 set.\n\nFor SUSE Linux Enterprise base products, the libstdc++6, libgcc_s1 and\nother compiler libraries have been switched from their gcc8 variants\nto their gcc9 variants.\n\nSecurity issues fixed :\n\nCVE-2019-15847: Fixed a miscompilation in the POWER9 back end, that\noptimized multiple calls of the __builtin_darn intrinsic into a single\ncall. (bsc#1149145)\n\nCVE-2019-14250: Fixed a heap overflow in the LTO linker. (bsc#1142649)\n\nNon-security issues fixed: Split out libstdc++ pretty-printers into a\nseparate package supplementing gdb and the installed runtime.\n(bsc#1135254)\n\nFixed miscompilation for vector shift on s390. (bsc#1141897)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1135254\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1141897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1142649\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1142654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1148517\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1149145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://gcc.gnu.org/gcc-9/changes.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-14250/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-15847/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20200394-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?71f44a68\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 8:zypper in -t patch\nSUSE-OpenStack-Cloud-Crowbar-8-2020-394=1\n\nSUSE OpenStack Cloud 8:zypper in -t patch\nSUSE-OpenStack-Cloud-8-2020-394=1\n\nSUSE OpenStack Cloud 7:zypper in -t patch\nSUSE-OpenStack-Cloud-7-2020-394=1\n\nSUSE Linux Enterprise Server for SAP 12-SP3:zypper in -t patch\nSUSE-SLE-SAP-12-SP3-2020-394=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2:zypper in -t patch\nSUSE-SLE-SAP-12-SP2-2020-394=1\n\nSUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch\nSUSE-SLE-SAP-12-SP1-2020-394=1\n\nSUSE Linux Enterprise Server 12-SP5:zypper in -t patch\nSUSE-SLE-SERVER-12-SP5-2020-394=1\n\nSUSE Linux Enterprise Server 12-SP4:zypper in -t patch\nSUSE-SLE-SERVER-12-SP4-2020-394=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP3-2020-394=1\n\nSUSE Linux Enterprise Server 12-SP3-BCL:zypper in -t patch\nSUSE-SLE-SERVER-12-SP3-BCL-2020-394=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2020-394=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-BCL-2020-394=1\n\nSUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP1-2020-394=1\n\nSUSE Linux Enterprise Module for Toolchain 12:zypper in -t patch\nSUSE-SLE-Module-Toolchain-12-2020-394=1\n\nSUSE Enterprise Storage 5:zypper in -t patch SUSE-Storage-5-2020-394=1\n\nHPE Helion Openstack 8:zypper in -t patch\nHPE-Helion-OpenStack-8-2020-394=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gcc9-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libasan5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libasan5-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libasan5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libatomic1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libatomic1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libatomic1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgcc_s1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgcc_s1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgcc_s1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgfortran5\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgfortran5-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgfortran5-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgo14\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgo14-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgo14-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgomp1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgomp1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libgomp1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libitm1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libitm1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libitm1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:liblsan0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:liblsan0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libquadmath0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libquadmath0-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libquadmath0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libstdc++6-locale\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libtsan0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libtsan0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libubsan1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libubsan1-32bit-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:libubsan1-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/02/18\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/02/19\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(1|2|3|4|5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP1/2/3/4/5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"liblsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"libquadmath0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"libtsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"gcc9-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"gcc9-debugsource-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libasan5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libasan5-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libasan5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libasan5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libatomic1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libatomic1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libatomic1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libatomic1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgcc_s1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgcc_s1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgcc_s1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgcc_s1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgfortran5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgfortran5-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgfortran5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgfortran5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgo14-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgo14-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgo14-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgo14-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgomp1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgomp1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgomp1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libgomp1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libitm1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libitm1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libitm1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libitm1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libstdc++6-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libstdc++6-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libstdc++6-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libstdc++6-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libstdc++6-locale-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libubsan1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libubsan1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libubsan1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", reference:\"libubsan1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"liblsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"liblsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"libquadmath0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"libquadmath0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"libtsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"libtsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"gcc9-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"gcc9-debugsource-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libasan5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libasan5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libasan5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libatomic1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libatomic1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libatomic1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgcc_s1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgcc_s1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgcc_s1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgfortran5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgfortran5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgfortran5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgo14-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgo14-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgo14-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgomp1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgomp1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libgomp1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libitm1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libitm1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libitm1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libstdc++6-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libstdc++6-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libstdc++6-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libstdc++6-locale-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libubsan1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libubsan1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"libubsan1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"liblsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"liblsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"libquadmath0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"libquadmath0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"libtsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"libtsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"gcc9-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"gcc9-debugsource-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libasan5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libasan5-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libasan5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libasan5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libatomic1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libatomic1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libatomic1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libatomic1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgcc_s1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgcc_s1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgcc_s1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgcc_s1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgfortran5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgfortran5-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgfortran5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgfortran5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgo14-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgo14-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgo14-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgo14-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgomp1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgomp1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgomp1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libgomp1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libitm1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libitm1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libitm1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libitm1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libstdc++6-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libstdc++6-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libstdc++6-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libstdc++6-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libstdc++6-locale-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libubsan1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libubsan1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libubsan1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"libubsan1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"liblsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"liblsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libquadmath0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libquadmath0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libtsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"libtsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"libasan5-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"gcc9-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"gcc9-debugsource-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libasan5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libasan5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libasan5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libatomic1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libatomic1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libatomic1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgcc_s1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgcc_s1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgcc_s1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgfortran5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgfortran5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgfortran5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgo14-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgo14-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgo14-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgomp1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgomp1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libgomp1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libitm1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libitm1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libitm1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libstdc++6-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libstdc++6-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libstdc++6-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libstdc++6-locale-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libubsan1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libubsan1-32bit-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libubsan1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"libubsan1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"liblsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"liblsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"libquadmath0-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"libquadmath0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"libquadmath0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"libtsan0-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"libtsan0-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"gcc9-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"gcc9-debugsource-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libasan5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libasan5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libasan5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libatomic1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libatomic1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libatomic1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgcc_s1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgcc_s1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgcc_s1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgfortran5-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgfortran5-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgfortran5-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgo14-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgo14-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgo14-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgomp1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgomp1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libgomp1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libitm1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libitm1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libitm1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libstdc++6-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libstdc++6-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libstdc++6-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libstdc++6-locale-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libubsan1-32bit-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libubsan1-9.2.1+r275327-1.3.9\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"libubsan1-debuginfo-9.2.1+r275327-1.3.9\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"gcc9\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:39:52", "description": "This update for spectre-meltdown-checker fixes the following issues :\n\n - feat: implement TAA detection (CVE-2019-11135 bsc#1139073)\n\n - feat: implement MCEPSC / iTLB Multihit detection (CVE-2018-12207 bsc#1117665)\n\n - feat: taa: add TSX_CTRL MSR detection in hardware info\n\n - feat: fwdb: use both Intel GitHub repo and MCEdb to build our firmware version database\n\n - feat: use --live with --kernel/--config/--map to override file detection in live mode\n\n - enh: rework the vuln logic of MDS with --paranoid (fixes #307)\n\n - enh: explain that Enhanced IBRS is better for performance than classic IBRS\n\n - enh: kernel: autodetect customized arch kernels from cmdline\n\n - enh: kernel decompression: better tolerance against missing tools\n\n - enh: mock: implement reading from /proc/cmdline\n\n - fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a\n\n - fix: lockdown: detect Red Hat locked down kernels (impacts MSR writes)\n\n - fix: lockdown: detect locked down mode in vanilla 5.4+ kernels\n\n - fix: sgx: on locked down kernels, fallback to CPUID bit for detection\n\n - fix: fwdb: builtin version takes precedence if the local cached version is older\n\n - fix: pteinv: don't check kernel image if not available\n\n - fix: silence useless error from grep (fixes #322)\n\n - fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316)\n\n - fix: mocking value for read_msr\n\n - chore: rename mcedb cmdline parameters to fwdb, and change db version scheme\n\n - chore: fwdb: update to v130.20191104+i20191027\n\n - chore: add GitHub check workflow\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-12-20T00:00:00", "type": "nessus", "title": "SUSE SLED15 / SLES15 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3348-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2019-12-24T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:spectre-meltdown-checker", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2019-3348-1.NASL", "href": "https://www.tenable.com/plugins/nessus/132337", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:3348-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(132337);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/24\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n\n script_name(english:\"SUSE SLED15 / SLES15 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3348-1)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for spectre-meltdown-checker fixes the following issues :\n\n - feat: implement TAA detection (CVE-2019-11135\n bsc#1139073)\n\n - feat: implement MCEPSC / iTLB Multihit detection\n (CVE-2018-12207 bsc#1117665)\n\n - feat: taa: add TSX_CTRL MSR detection in hardware info\n\n - feat: fwdb: use both Intel GitHub repo and MCEdb to\n build our firmware version database\n\n - feat: use --live with --kernel/--config/--map to\n override file detection in live mode\n\n - enh: rework the vuln logic of MDS with --paranoid (fixes\n #307)\n\n - enh: explain that Enhanced IBRS is better for\n performance than classic IBRS\n\n - enh: kernel: autodetect customized arch kernels from\n cmdline\n\n - enh: kernel decompression: better tolerance against\n missing tools\n\n - enh: mock: implement reading from /proc/cmdline\n\n - fix: variant3a: Silvermont CPUs are not vulnerable to\n variant 3a\n\n - fix: lockdown: detect Red Hat locked down kernels\n (impacts MSR writes)\n\n - fix: lockdown: detect locked down mode in vanilla 5.4+\n kernels\n\n - fix: sgx: on locked down kernels, fallback to CPUID bit\n for detection\n\n - fix: fwdb: builtin version takes precedence if the local\n cached version is older\n\n - fix: pteinv: don't check kernel image if not available\n\n - fix: silence useless error from grep (fixes #322)\n\n - fix: msr: fix msr module detection under Ubuntu 19.10\n (fixes #316)\n\n - fix: mocking value for read_msr\n\n - chore: rename mcedb cmdline parameters to fwdb, and\n change db version scheme\n\n - chore: fwdb: update to v130.20191104+i20191027\n\n - chore: add GitHub check workflow\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117665\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-12207/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-11135/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20193348-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?07f816e1\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Basesystem 15-SP1:zypper in -t patch\nSUSE-SLE-Module-Basesystem-15-SP1-2019-3348=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:spectre-meltdown-checker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED15|SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED15 / SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"spectre-meltdown-checker-0.43-3.3.1\")) flag++;\nif (rpm_check(release:\"SLED15\", sp:\"1\", cpu:\"x86_64\", reference:\"spectre-meltdown-checker-0.43-3.3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"spectre-meltdown-checker\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:25", "description": "An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {}, "published": "2019-11-13T00:00:00", "type": "nessus", "title": "RHEL 6 : kernel (RHSA-2019:3842)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "cpe:/o:redhat:enterprise_linux:6.6"], "id": "REDHAT-RHSA-2019-3842.NASL", "href": "https://www.tenable.com/plugins/nessus/130934", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:3842. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130934);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2019:3842\");\n\n script_name(english:\"RHEL 6 : kernel (RHSA-2019:3842)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kernel is now available for Red Hat Enterprise Linux 6.6\nAdvanced Update Support.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ifu-page-mce\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/tsx-asynchronousabort\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:3842\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-11135\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6\\.6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.6\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2018-12207\", \"CVE-2019-11135\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2019:3842\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:3842\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"kernel-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", reference:\"kernel-abi-whitelists-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", reference:\"kernel-doc-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", reference:\"kernel-firmware-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"perf-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"perf-debuginfo-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"python-perf-2.6.32-504.81.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"6\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-2.6.32-504.81.3.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-18T15:24:44", "description": "An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {}, "published": "2019-11-13T00:00:00", "type": "nessus", "title": "RHEL 6 : kernel (RHSA-2019:3843)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "cpe:/o:redhat:enterprise_linux:6.5"], "id": "REDHAT-RHSA-2019-3843.NASL", "href": "https://www.tenable.com/plugins/nessus/130935", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:3843. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130935);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2019:3843\");\n\n script_name(english:\"RHEL 6 : kernel (RHSA-2019:3843)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kernel is now available for Red Hat Enterprise Linux 6.5\nAdvanced Update Support.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ifu-page-mce\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/tsx-asynchronousabort\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:3843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-11135\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6\\.5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.5\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2018-12207\", \"CVE-2019-11135\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2019:3843\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:3843\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", reference:\"kernel-abi-whitelists-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debuginfo-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", reference:\"kernel-doc-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", reference:\"kernel-firmware-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"perf-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"perf-debuginfo-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"python-perf-2.6.32-431.96.3.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"5\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-2.6.32-431.96.3.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:25", "description": "The remote OracleVM system is missing necessary patches to address critical security updates :\n\n - x86/tsx: Add config options to set tsx=on|off|auto (Michal Hocko) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/speculation/taa: Add documentation for TSX Async Abort (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/tsx: Add 'auto' option to the tsx= cmdline parameter (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - kvm/x86: Export MDS_NO=0 to guests when TSX is enabled (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/speculation/taa: Add sysfs reporting for TSX Async Abort (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/speculation/taa: Add mitigation for TSX Async Abort (Kanth Ghatraju) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/cpu: Add a 'tsx=' cmdline option with TSX disabled by default (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/cpu: Add a helper function x86_read_arch_cap_msr (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/msr: Add the IA32_TSX_CTRL MSR (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - kvm: x86: mmu: Recovery of shattered NX large pages (Junaid Shahid) [Orabug: 29967631] (CVE-2018-12207)\n\n - kvm: Add helper function for creating VM worker threads (Junaid Shahid) [Orabug: 29967631] (CVE-2018-12207)\n\n - kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: remove now unneeded hugepage gfn adjustment (Paolo Bonzini) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: make FNAME(fetch) and __direct_map more similar (Paolo Bonzini) [Orabug: 29967631] (CVE-2018-12207)\n\n - kvm: x86: Do not release the page inside mmu_set_spte (Junaid Shahid) [Orabug: 29967631] (CVE-2018-12207)\n\n - x86/cpu: Add Tremont to the cpu vulnerability whitelist (Pawan Gupta) [Orabug: 29967631] (CVE-2018-12207)\n\n - x86: Add ITLB_MULTIHIT bug infrastructure (Pawan Gupta) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Move mapping_level_dirty_bitmap call in mapping_level (Takuya Yoshikawa) [Orabug: 29967631] (CVE-2018-12207)\n\n - Revert 'KVM: x86: use the fast way to invalidate all pages' (Sean Christopherson) [Orabug: 29967631] (CVE-2018-12207)\n\n - kvm: Convert kvm_lock to a mutex (Junaid Shahid) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Simplify force_pt_level calculation code in FNAME(page_fault) (Takuya Yoshikawa) [Orabug:\n 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Make force_pt_level bool (Takuya Yoshikawa) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Remove unused parameter parent_pte from kvm_mmu_get_page (Takuya Yoshikawa) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: extend usage of RET_MMIO_PF_* constants (Paolo Bonzini) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Make mmu_set_spte return emulate value (Takuya Yoshikawa) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Move parent_pte handling from kvm_mmu_get_page to link_shadow_page (Takuya Yoshikawa) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Move initialization of parent_ptes out from kvm_mmu_alloc_page (Takuya Yoshikawa) [Orabug:\n 29967631] (CVE-2018-12207)", "cvss3": {}, "published": "2019-11-13T00:00:00", "type": "nessus", "title": "OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0052)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:oracle:vm:kernel-uek", "p-cpe:/a:oracle:vm:kernel-uek-firmware", "cpe:/o:oracle:vm_server:3.4"], "id": "ORACLEVM_OVMSA-2019-0052.NASL", "href": "https://www.tenable.com/plugins/nessus/130923", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2019-0052.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130923);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n\n script_name(english:\"OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0052)\");\n script_summary(english:\"Checks the RPM output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote OracleVM host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - x86/tsx: Add config options to set tsx=on|off|auto\n (Michal Hocko) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/speculation/taa: Add documentation for TSX Async\n Abort (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/tsx: Add 'auto' option to the tsx= cmdline parameter\n (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - kvm/x86: Export MDS_NO=0 to guests when TSX is enabled\n (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/speculation/taa: Add sysfs reporting for TSX Async\n Abort (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/speculation/taa: Add mitigation for TSX Async Abort\n (Kanth Ghatraju) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/cpu: Add a 'tsx=' cmdline option with TSX disabled\n by default (Pawan Gupta) [Orabug: 30419233]\n (CVE-2019-11135)\n\n - x86/cpu: Add a helper function x86_read_arch_cap_msr\n (Pawan Gupta) [Orabug: 30419233] (CVE-2019-11135)\n\n - x86/msr: Add the IA32_TSX_CTRL MSR (Pawan Gupta)\n [Orabug: 30419233] (CVE-2019-11135)\n\n - kvm: x86: mmu: Recovery of shattered NX large pages\n (Junaid Shahid) [Orabug: 29967631] (CVE-2018-12207)\n\n - kvm: Add helper function for creating VM worker threads\n (Junaid Shahid) [Orabug: 29967631] (CVE-2018-12207)\n\n - kvm: mmu: ITLB_MULTIHIT mitigation (Paolo Bonzini)\n [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: remove now unneeded hugepage gfn adjustment\n (Paolo Bonzini) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: make FNAME(fetch) and __direct_map more\n similar (Paolo Bonzini) [Orabug: 29967631]\n (CVE-2018-12207)\n\n - kvm: x86: Do not release the page inside mmu_set_spte\n (Junaid Shahid) [Orabug: 29967631] (CVE-2018-12207)\n\n - x86/cpu: Add Tremont to the cpu vulnerability whitelist\n (Pawan Gupta) [Orabug: 29967631] (CVE-2018-12207)\n\n - x86: Add ITLB_MULTIHIT bug infrastructure (Pawan Gupta)\n [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Move mapping_level_dirty_bitmap call in\n mapping_level (Takuya Yoshikawa) [Orabug: 29967631]\n (CVE-2018-12207)\n\n - Revert 'KVM: x86: use the fast way to invalidate all\n pages' (Sean Christopherson) [Orabug: 29967631]\n (CVE-2018-12207)\n\n - kvm: Convert kvm_lock to a mutex (Junaid Shahid)\n [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Simplify force_pt_level calculation code\n in FNAME(page_fault) (Takuya Yoshikawa) [Orabug:\n 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Make force_pt_level bool (Takuya\n Yoshikawa) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Remove unused parameter parent_pte from\n kvm_mmu_get_page (Takuya Yoshikawa) [Orabug: 29967631]\n (CVE-2018-12207)\n\n - KVM: x86: extend usage of RET_MMIO_PF_* constants (Paolo\n Bonzini) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Make mmu_set_spte return emulate value\n (Takuya Yoshikawa) [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Move parent_pte handling from\n kvm_mmu_get_page to link_shadow_page (Takuya Yoshikawa)\n [Orabug: 29967631] (CVE-2018-12207)\n\n - KVM: x86: MMU: Move initialization of parent_ptes out\n from kvm_mmu_alloc_page (Takuya Yoshikawa) [Orabug:\n 29967631] (CVE-2018-12207)\"\n );\n # https://oss.oracle.com/pipermail/oraclevm-errata/2019-November/000966.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?7baad653\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected kernel-uek / kernel-uek-firmware packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"3\\.4\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.4\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS3.4\", reference:\"kernel-uek-4.1.12-124.32.3.2.el6uek\")) flag++;\nif (rpm_check(release:\"OVS3.4\", reference:\"kernel-uek-firmware-4.1.12-124.32.3.2.el6uek\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-uek / kernel-uek-firmware\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:39:01", "description": "This update for spectre-meltdown-checker fixes the following issues :\n\n - feat: implement TAA detection (CVE-2019-11135 bsc#1139073)\n\n - feat: implement MCEPSC / iTLB Multihit detection (CVE-2018-12207 bsc#1117665)\n\n - feat: taa: add TSX_CTRL MSR detection in hardware info\n\n - feat: fwdb: use both Intel GitHub repo and MCEdb to build our firmware version database\n\n - feat: use --live with --kernel/--config/--map to override file detection in live mode\n\n - enh: rework the vuln logic of MDS with --paranoid (fixes #307)\n\n - enh: explain that Enhanced IBRS is better for performance than classic IBRS\n\n - enh: kernel: autodetect customized arch kernels from cmdline\n\n - enh: kernel decompression: better tolerance against missing tools\n\n - enh: mock: implement reading from /proc/cmdline\n\n - fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a\n\n - fix: lockdown: detect Red Hat locked down kernels (impacts MSR writes)\n\n - fix: lockdown: detect locked down mode in vanilla 5.4+ kernels\n\n - fix: sgx: on locked down kernels, fallback to CPUID bit for detection\n\n - fix: fwdb: builtin version takes precedence if the local cached version is older\n\n - fix: pteinv: don't check kernel image if not available\n\n - fix: silence useless error from grep (fixes #322)\n\n - fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316)\n\n - fix: mocking value for read_msr\n\n - chore: rename mcedb cmdline parameters to fwdb, and change db version scheme\n\n - chore: fwdb: update to v130.20191104+i20191027\n\n - chore: add GitHub check workflow\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update project.", "cvss3": {}, "published": "2019-12-31T00:00:00", "type": "nessus", "title": "openSUSE Security Update : spectre-meltdown-checker (openSUSE-2019-2710)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2020-01-02T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:spectre-meltdown-checker", "cpe:/o:novell:opensuse:15.1"], "id": "OPENSUSE-2019-2710.NASL", "href": "https://www.tenable.com/plugins/nessus/132516", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-2710.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(132516);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/01/02\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n\n script_name(english:\"openSUSE Security Update : spectre-meltdown-checker (openSUSE-2019-2710)\");\n script_summary(english:\"Check for the openSUSE-2019-2710 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for spectre-meltdown-checker fixes the following issues :\n\n - feat: implement TAA detection (CVE-2019-11135\n bsc#1139073)\n\n - feat: implement MCEPSC / iTLB Multihit detection\n (CVE-2018-12207 bsc#1117665)\n\n - feat: taa: add TSX_CTRL MSR detection in hardware info\n\n - feat: fwdb: use both Intel GitHub repo and MCEdb to\n build our firmware version database\n\n - feat: use --live with --kernel/--config/--map to\n override file detection in live mode\n\n - enh: rework the vuln logic of MDS with --paranoid (fixes\n #307)\n\n - enh: explain that Enhanced IBRS is better for\n performance than classic IBRS\n\n - enh: kernel: autodetect customized arch kernels from\n cmdline\n\n - enh: kernel decompression: better tolerance against\n missing tools\n\n - enh: mock: implement reading from /proc/cmdline\n\n - fix: variant3a: Silvermont CPUs are not vulnerable to\n variant 3a\n\n - fix: lockdown: detect Red Hat locked down kernels\n (impacts MSR writes)\n\n - fix: lockdown: detect locked down mode in vanilla 5.4+\n kernels\n\n - fix: sgx: on locked down kernels, fallback to CPUID bit\n for detection\n\n - fix: fwdb: builtin version takes precedence if the local\n cached version is older\n\n - fix: pteinv: don't check kernel image if not available\n\n - fix: silence useless error from grep (fixes #322)\n\n - fix: msr: fix msr module detection under Ubuntu 19.10\n (fixes #316)\n\n - fix: mocking value for read_msr\n\n - chore: rename mcedb cmdline parameters to fwdb, and\n change db version scheme\n\n - chore: fwdb: update to v130.20191104+i20191027\n\n - chore: add GitHub check workflow\n\nThis update was imported from the SUSE:SLE-15-SP1:Update update\nproject.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1117665\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1139073\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected spectre-meltdown-checker package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:spectre-meltdown-checker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/31\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"spectre-meltdown-checker-0.43-lp151.3.3.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"spectre-meltdown-checker\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T14:41:56", "description": "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:0026 advisory.\n\n - hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n - hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-01-07T00:00:00", "type": "nessus", "title": "RHEL 7 : kpatch-patch (RHSA-2020:0026)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2023-01-23T00:00:00", "cpe": ["cpe:/o:redhat:rhel_aus:7.6", "cpe:/o:redhat:rhel_e4s:7.6", "cpe:/o:redhat:rhel_eus:7.6", "cpe:/o:redhat:rhel_tus:7.6", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-957_35_1", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-957_35_2", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-957_38_1"], "id": "REDHAT-RHSA-2020-0026.NASL", "href": "https://www.tenable.com/plugins/nessus/132685", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:0026. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(132685);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/23\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2020:0026\");\n\n script_name(english:\"RHEL 7 : kpatch-patch (RHSA-2020:0026)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2020:0026 advisory.\n\n - hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n - hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2018-12207\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-11135\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:0026\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1646768\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1753062\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kpatch-patch-3_10_0-957_35_1, kpatch-patch-3_10_0-957_35_2 and / or kpatch-patch-3_10_0-957_38_1\npackages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(203, 226, 385);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-957_35_1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-957_35_2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-957_38_1\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'eq', os_version: os_ver, rhel_version: '7.6')) audit(AUDIT_OS_NOT, 'Red Hat 7.6', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar uname_r = get_kb_item(\"Host/uname-r\");\nif (empty_or_null(uname_r)) audit(AUDIT_UNKNOWN_APP_VER, \"kernel\");\n\nvar kernel_live_checks = [\n {\n 'repo_relative_urls': [\n 'content/aus/rhel/server/7/7.6/x86_64/debug',\n 'content/aus/rhel/server/7/7.6/x86_64/optional/debug',\n 'content/aus/rhel/server/7/7.6/x86_64/optional/os',\n 'content/aus/rhel/server/7/7.6/x86_64/optional/source/SRPMS',\n 'content/aus/rhel/server/7/7.6/x86_64/os',\n 'content/aus/rhel/server/7/7.6/x86_64/source/SRPMS',\n 'content/e4s/rhel/server/7/7.6/x86_64/debug',\n 'content/e4s/rhel/server/7/7.6/x86_64/highavailability/debug',\n 'content/e4s/rhel/server/7/7.6/x86_64/highavailability/os',\n 'content/e4s/rhel/server/7/7.6/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel/server/7/7.6/x86_64/optional/debug',\n 'content/e4s/rhel/server/7/7.6/x86_64/optional/os',\n 'content/e4s/rhel/server/7/7.6/x86_64/optional/source/SRPMS',\n 'content/e4s/rhel/server/7/7.6/x86_64/os',\n 'content/e4s/rhel/server/7/7.6/x86_64/sap-hana/debug',\n 'content/e4s/rhel/server/7/7.6/x86_64/sap-hana/os',\n 'content/e4s/rhel/server/7/7.6/x86_64/sap-hana/source/SRPMS',\n 'content/e4s/rhel/server/7/7.6/x86_64/sap/debug',\n 'content/e4s/rhel/server/7/7.6/x86_64/sap/os',\n 'content/e4s/rhel/server/7/7.6/x86_64/sap/source/SRPMS',\n 'content/e4s/rhel/server/7/7.6/x86_64/source/SRPMS',\n 'content/eus/rhel/computenode/7/7.6/x86_64/debug',\n 'content/eus/rhel/computenode/7/7.6/x86_64/optional/debug',\n 'content/eus/rhel/computenode/7/7.6/x86_64/optional/os',\n 'content/eus/rhel/computenode/7/7.6/x86_64/optional/source/SRPMS',\n 'content/eus/rhel/computenode/7/7.6/x86_64/os',\n 'content/eus/rhel/computenode/7/7.6/x86_64/source/SRPMS',\n 'content/eus/rhel/server/7/7.6/x86_64/debug',\n 'content/eus/rhel/server/7/7.6/x86_64/highavailability/debug',\n 'content/eus/rhel/server/7/7.6/x86_64/highavailability/os',\n 'content/eus/rhel/server/7/7.6/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel/server/7/7.6/x86_64/optional/debug',\n 'content/eus/rhel/server/7/7.6/x86_64/optional/os',\n 'content/eus/rhel/server/7/7.6/x86_64/optional/source/SRPMS',\n 'content/eus/rhel/server/7/7.6/x86_64/os',\n 'content/eus/rhel/server/7/7.6/x86_64/resilientstorage/debug',\n 'content/eus/rhel/server/7/7.6/x86_64/resilientstorage/os',\n 'content/eus/rhel/server/7/7.6/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel/server/7/7.6/x86_64/sap-hana/debug',\n 'content/eus/rhel/server/7/7.6/x86_64/sap-hana/os',\n 'content/eus/rhel/server/7/7.6/x86_64/sap-hana/source/SRPMS',\n 'content/eus/rhel/server/7/7.6/x86_64/sap/debug',\n 'content/eus/rhel/server/7/7.6/x86_64/sap/os',\n 'content/eus/rhel/server/7/7.6/x86_64/sap/source/SRPMS',\n 'content/eus/rhel/server/7/7.6/x86_64/source/SRPMS',\n 'content/tus/rhel/server/7/7.6/x86_64/debug',\n 'content/tus/rhel/server/7/7.6/x86_64/highavailability/debug',\n 'content/tus/rhel/server/7/7.6/x86_64/highavailability/os',\n 'content/tus/rhel/server/7/7.6/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel/server/7/7.6/x86_64/optional/debug',\n 'content/tus/rhel/server/7/7.6/x86_64/optional/os',\n 'content/tus/rhel/server/7/7.6/x86_64/optional/source/SRPMS',\n 'content/tus/rhel/server/7/7.6/x86_64/os',\n 'content/tus/rhel/server/7/7.6/x86_64/source/SRPMS'\n ],\n 'kernels': {\n '3.10.0-957.35.1.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-957_35_1-1-5.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n ]\n },\n '3.10.0-957.35.2.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-957_35_2-1-4.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n ]\n },\n '3.10.0-957.38.1.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-957_38_1-1-3.el7', 'sp':'6', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n }\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:kernel_live_checks);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nvar kernel_affected = FALSE;\nforeach var kernel_array ( kernel_live_checks ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(kernel_array['repo_relative_urls'])) repo_relative_urls = kernel_array['repo_relative_urls'];\n var kpatch_details = kernel_array['kernels'][uname_r];\n if (empty_or_null(kpatch_details)) continue;\n kernel_affected = TRUE;\n foreach var pkg ( kpatch_details['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp'])) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n# No kpatch details found for the running kernel version\nif (!kernel_affected) audit(AUDIT_INST_VER_NOT_VULN, 'kernel', uname_r);\n\nif (flag)\n{\n var subscription_caveat = '\\n' +\n 'NOTE: This vulnerability check contains fixes that apply to\\n' +\n 'packages only available in the Red Hat Enterprise Linux\\n' +\n 'Advanced Update Support, Extended Update Support, Telco Extended Update Support or Update Services for SAP Solutions repositories.\\n' +\n 'Access to these repositories requires a paid RHEL subscription.\\n';\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = subscription_caveat + rpm_report_get() + redhat_report_repo_caveat();\n else extra = subscription_caveat + rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kpatch-patch-3_10_0-957_35_1 / kpatch-patch-3_10_0-957_35_2 / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:39:36", "description": "This update for spectre-meltdown-checker fixes the following issues :\n\nversion 0.43\n\n - feat: implement TAA detection (CVE-2019-11135 bsc#1139073)\n\n - feat: implement MCEPSC / iTLB Multihit detection (CVE-2018-12207 bsc#1117665)\n\n - feat: taa: add TSX_CTRL MSR detection in hardware info\n\n - feat: fwdb: use both Intel GitHub repo and MCEdb to build our firmware version database\n\n - feat: use --live with --kernel/--config/--map to override file detection in live mode\n\n - enh: rework the vuln logic of MDS with --paranoid (fixes #307)\n\n - enh: explain that Enhanced IBRS is better for performance than classic IBRS\n\n - enh: kernel: autodetect customized arch kernels from cmdline\n\n - enh: kernel decompression: better tolerance against missing tools\n\n - enh: mock: implement reading from /proc/cmdline\n\n - fix: variant3a: Silvermont CPUs are not vulnerable to variant 3a\n\n - fix: lockdown: detect Red Hat locked down kernels (impacts MSR writes)\n\n - fix: lockdown: detect locked down mode in vanilla 5.4+ kernels\n\n - fix: sgx: on locked down kernels, fallback to CPUID bit for detection\n\n - fix: fwdb: builtin version takes precedence if the local cached version is older\n\n - fix: pteinv: don't check kernel image if not available\n\n - fix: silence useless error from grep (fixes #322)\n\n - fix: msr: fix msr module detection under Ubuntu 19.10 (fixes #316)\n\n - fix: mocking value for read_msr\n\n - chore: rename mcedb cmdline parameters to fwdb, and change db version scheme\n\n - chore: fwdb: update to v130.20191104+i20191027\n\n - chore: add GitHub check workflow\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-12-20T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3340-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2019-12-24T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:spectre-meltdown-checker", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2019-3340-1.NASL", "href": "https://www.tenable.com/plugins/nessus/132334", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:3340-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(132334);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2019/12/24\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n\n script_name(english:\"SUSE SLES12 Security Update : spectre-meltdown-checker (SUSE-SU-2019:3340-1)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This update for spectre-meltdown-checker fixes the following issues :\n\nversion 0.43\n\n - feat: implement TAA detection (CVE-2019-11135\n bsc#1139073)\n\n - feat: implement MCEPSC / iTLB Multihit detection\n (CVE-2018-12207 bsc#1117665)\n\n - feat: taa: add TSX_CTRL MSR detection in hardware info\n\n - feat: fwdb: use both Intel GitHub repo and MCEdb to\n build our firmware version database\n\n - feat: use --live with --kernel/--config/--map to\n override file detection in live mode\n\n - enh: rework the vuln logic of MDS with --paranoid (fixes\n #307)\n\n - enh: explain that Enhanced IBRS is better for\n performance than classic IBRS\n\n - enh: kernel: autodetect customized arch kernels from\n cmdline\n\n - enh: kernel decompression: better tolerance against\n missing tools\n\n - enh: mock: implement reading from /proc/cmdline\n\n - fix: variant3a: Silvermont CPUs are not vulnerable to\n variant 3a\n\n - fix: lockdown: detect Red Hat locked down kernels\n (impacts MSR writes)\n\n - fix: lockdown: detect locked down mode in vanilla 5.4+\n kernels\n\n - fix: sgx: on locked down kernels, fallback to CPUID bit\n for detection\n\n - fix: fwdb: builtin version takes precedence if the local\n cached version is older\n\n - fix: pteinv: don't check kernel image if not available\n\n - fix: silence useless error from grep (fixes #322)\n\n - fix: msr: fix msr module detection under Ubuntu 19.10\n (fixes #316)\n\n - fix: mocking value for read_msr\n\n - chore: rename mcedb cmdline parameters to fwdb, and\n change db version scheme\n\n - chore: fwdb: update to v130.20191104+i20191027\n\n - chore: add GitHub check workflow\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117665\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1139073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-12207/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-11135/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-20193340-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?174220c0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP5:zypper in -t patch\nSUSE-SLE-SERVER-12-SP5-2019-3340=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:spectre-meltdown-checker\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/20\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"spectre-meltdown-checker-0.43-3.3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"spectre-meltdown-checker\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T14:41:57", "description": "The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2020:0028 advisory.\n\n - hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n - hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-01-07T00:00:00", "type": "nessus", "title": "RHEL 7 : kpatch-patch (RHSA-2020:0028)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2023-01-23T00:00:00", "cpe": ["cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:rhel_aus:7.7", "cpe:/o:redhat:rhel_e4s:7.7", "cpe:/o:redhat:rhel_eus:7.7", "cpe:/o:redhat:rhel_tus:7.7", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-1062", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-1062_1_1", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-1062_1_2", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-1062_4_1"], "id": "REDHAT-RHSA-2020-0028.NASL", "href": "https://www.tenable.com/plugins/nessus/132687", "sourceData": "##\n# (C) Tenable, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2020:0028. The text\n# itself is copyright (C) Red Hat, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(132687);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/23\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2020:0028\");\n\n script_name(english:\"RHEL 7 : kpatch-patch (RHSA-2020:0028)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Red Hat host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Redhat Enterprise Linux 7 host has packages installed that are affected by multiple vulnerabilities as\nreferenced in the RHSA-2020:0028 advisory.\n\n - hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n - hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2018-12207\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/security/cve/CVE-2019-11135\");\n script_set_attribute(attribute:\"see_also\", value:\"https://access.redhat.com/errata/RHSA-2020:0028\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1646768\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.redhat.com/1753062\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n script_cwe_id(203, 226, 385);\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/01/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/07\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_aus:7.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_e4s:7.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_eus:7.7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:rhel_tus:7.7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-1062\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-1062_1_1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-1062_1_2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-3_10_0-1062_4_1\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"redhat_repos.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude('rpm.inc');\ninclude('rhel.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/RedHat/release');\nif (isnull(os_release) || 'Red Hat' >!< os_release) audit(AUDIT_OS_NOT, 'Red Hat');\nvar os_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:os_release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Red Hat');\nos_ver = os_ver[1];\nif (!rhel_check_release(operator: 'ge', os_version: os_ver, rhel_version: '7')) audit(AUDIT_OS_NOT, 'Red Hat 7.x', 'Red Hat ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Red Hat', cpu);\n\nvar uname_r = get_kb_item(\"Host/uname-r\");\nif (empty_or_null(uname_r)) audit(AUDIT_UNKNOWN_APP_VER, \"kernel\");\n\nvar kernel_live_checks = [\n {\n 'repo_relative_urls': [\n 'content/aus/rhel/server/7/7.7/x86_64/debug',\n 'content/aus/rhel/server/7/7.7/x86_64/optional/debug',\n 'content/aus/rhel/server/7/7.7/x86_64/optional/os',\n 'content/aus/rhel/server/7/7.7/x86_64/optional/source/SRPMS',\n 'content/aus/rhel/server/7/7.7/x86_64/os',\n 'content/aus/rhel/server/7/7.7/x86_64/source/SRPMS',\n 'content/e4s/rhel/server/7/7.7/x86_64/debug',\n 'content/e4s/rhel/server/7/7.7/x86_64/highavailability/debug',\n 'content/e4s/rhel/server/7/7.7/x86_64/highavailability/os',\n 'content/e4s/rhel/server/7/7.7/x86_64/highavailability/source/SRPMS',\n 'content/e4s/rhel/server/7/7.7/x86_64/optional/debug',\n 'content/e4s/rhel/server/7/7.7/x86_64/optional/os',\n 'content/e4s/rhel/server/7/7.7/x86_64/optional/source/SRPMS',\n 'content/e4s/rhel/server/7/7.7/x86_64/os',\n 'content/e4s/rhel/server/7/7.7/x86_64/sap-hana/debug',\n 'content/e4s/rhel/server/7/7.7/x86_64/sap-hana/os',\n 'content/e4s/rhel/server/7/7.7/x86_64/sap-hana/source/SRPMS',\n 'content/e4s/rhel/server/7/7.7/x86_64/sap/debug',\n 'content/e4s/rhel/server/7/7.7/x86_64/sap/os',\n 'content/e4s/rhel/server/7/7.7/x86_64/sap/source/SRPMS',\n 'content/e4s/rhel/server/7/7.7/x86_64/source/SRPMS',\n 'content/eus/rhel/computenode/7/7.7/x86_64/debug',\n 'content/eus/rhel/computenode/7/7.7/x86_64/optional/debug',\n 'content/eus/rhel/computenode/7/7.7/x86_64/optional/os',\n 'content/eus/rhel/computenode/7/7.7/x86_64/optional/source/SRPMS',\n 'content/eus/rhel/computenode/7/7.7/x86_64/os',\n 'content/eus/rhel/computenode/7/7.7/x86_64/source/SRPMS',\n 'content/eus/rhel/server/7/7.7/x86_64/debug',\n 'content/eus/rhel/server/7/7.7/x86_64/highavailability/debug',\n 'content/eus/rhel/server/7/7.7/x86_64/highavailability/os',\n 'content/eus/rhel/server/7/7.7/x86_64/highavailability/source/SRPMS',\n 'content/eus/rhel/server/7/7.7/x86_64/optional/debug',\n 'content/eus/rhel/server/7/7.7/x86_64/optional/os',\n 'content/eus/rhel/server/7/7.7/x86_64/optional/source/SRPMS',\n 'content/eus/rhel/server/7/7.7/x86_64/os',\n 'content/eus/rhel/server/7/7.7/x86_64/resilientstorage/debug',\n 'content/eus/rhel/server/7/7.7/x86_64/resilientstorage/os',\n 'content/eus/rhel/server/7/7.7/x86_64/resilientstorage/source/SRPMS',\n 'content/eus/rhel/server/7/7.7/x86_64/sap-hana/debug',\n 'content/eus/rhel/server/7/7.7/x86_64/sap-hana/os',\n 'content/eus/rhel/server/7/7.7/x86_64/sap-hana/source/SRPMS',\n 'content/eus/rhel/server/7/7.7/x86_64/sap/debug',\n 'content/eus/rhel/server/7/7.7/x86_64/sap/os',\n 'content/eus/rhel/server/7/7.7/x86_64/sap/source/SRPMS',\n 'content/eus/rhel/server/7/7.7/x86_64/source/SRPMS',\n 'content/tus/rhel/server/7/7.7/x86_64/debug',\n 'content/tus/rhel/server/7/7.7/x86_64/highavailability/debug',\n 'content/tus/rhel/server/7/7.7/x86_64/highavailability/os',\n 'content/tus/rhel/server/7/7.7/x86_64/highavailability/source/SRPMS',\n 'content/tus/rhel/server/7/7.7/x86_64/optional/debug',\n 'content/tus/rhel/server/7/7.7/x86_64/optional/os',\n 'content/tus/rhel/server/7/7.7/x86_64/optional/source/SRPMS',\n 'content/tus/rhel/server/7/7.7/x86_64/os',\n 'content/tus/rhel/server/7/7.7/x86_64/source/SRPMS'\n ],\n 'kernels': {\n '3.10.0-1062.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-1062-1-9.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n ]\n },\n '3.10.0-1062.1.1.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-1062_1_1-1-8.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n ]\n },\n '3.10.0-1062.1.2.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-1062_1_2-1-7.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n ]\n },\n '3.10.0-1062.4.1.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-1062_4_1-1-4.el7', 'sp':'7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n }\n },\n {\n 'repo_relative_urls': [\n 'content/dist/rhel/client/7/7Client/x86_64/debug',\n 'content/dist/rhel/client/7/7Client/x86_64/optional/debug',\n 'content/dist/rhel/client/7/7Client/x86_64/optional/os',\n 'content/dist/rhel/client/7/7Client/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/client/7/7Client/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/client/7/7Client/x86_64/os',\n 'content/dist/rhel/client/7/7Client/x86_64/source/SRPMS',\n 'content/dist/rhel/client/7/7Client/x86_64/supplementary/debug',\n 'content/dist/rhel/client/7/7Client/x86_64/supplementary/os',\n 'content/dist/rhel/client/7/7Client/x86_64/supplementary/source/SRPMS',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/debug',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/optional/debug',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/optional/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/source/SRPMS',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/supplementary/debug',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/supplementary/os',\n 'content/dist/rhel/computenode/7/7ComputeNode/x86_64/supplementary/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/highavailability/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/highavailability/os',\n 'content/dist/rhel/server/7/7Server/x86_64/highavailability/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/nfv/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/nfv/os',\n 'content/dist/rhel/server/7/7Server/x86_64/nfv/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/optional/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/optional/os',\n 'content/dist/rhel/server/7/7Server/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/server/7/7Server/x86_64/os',\n 'content/dist/rhel/server/7/7Server/x86_64/resilientstorage/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/resilientstorage/os',\n 'content/dist/rhel/server/7/7Server/x86_64/resilientstorage/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/rt/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/rt/os',\n 'content/dist/rhel/server/7/7Server/x86_64/rt/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/sap-hana/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/sap-hana/os',\n 'content/dist/rhel/server/7/7Server/x86_64/sap-hana/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/sap/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/sap/os',\n 'content/dist/rhel/server/7/7Server/x86_64/sap/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/source/SRPMS',\n 'content/dist/rhel/server/7/7Server/x86_64/supplementary/debug',\n 'content/dist/rhel/server/7/7Server/x86_64/supplementary/os',\n 'content/dist/rhel/server/7/7Server/x86_64/supplementary/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/optional/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/optional/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/optional/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/oracle-java-rm/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/source/SRPMS',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/supplementary/debug',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/supplementary/os',\n 'content/dist/rhel/workstation/7/7Workstation/x86_64/supplementary/source/SRPMS',\n 'content/fastrack/rhel/client/7/x86_64/debug',\n 'content/fastrack/rhel/client/7/x86_64/optional/debug',\n 'content/fastrack/rhel/client/7/x86_64/optional/os',\n 'content/fastrack/rhel/client/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/client/7/x86_64/os',\n 'content/fastrack/rhel/client/7/x86_64/source/SRPMS',\n 'content/fastrack/rhel/computenode/7/x86_64/debug',\n 'content/fastrack/rhel/computenode/7/x86_64/optional/debug',\n 'content/fastrack/rhel/computenode/7/x86_64/optional/os',\n 'content/fastrack/rhel/computenode/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/computenode/7/x86_64/os',\n 'content/fastrack/rhel/computenode/7/x86_64/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/debug',\n 'content/fastrack/rhel/server/7/x86_64/highavailability/debug',\n 'content/fastrack/rhel/server/7/x86_64/highavailability/os',\n 'content/fastrack/rhel/server/7/x86_64/highavailability/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/optional/debug',\n 'content/fastrack/rhel/server/7/x86_64/optional/os',\n 'content/fastrack/rhel/server/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/os',\n 'content/fastrack/rhel/server/7/x86_64/resilientstorage/debug',\n 'content/fastrack/rhel/server/7/x86_64/resilientstorage/os',\n 'content/fastrack/rhel/server/7/x86_64/resilientstorage/source/SRPMS',\n 'content/fastrack/rhel/server/7/x86_64/source/SRPMS',\n 'content/fastrack/rhel/workstation/7/x86_64/debug',\n 'content/fastrack/rhel/workstation/7/x86_64/optional/debug',\n 'content/fastrack/rhel/workstation/7/x86_64/optional/os',\n 'content/fastrack/rhel/workstation/7/x86_64/optional/source/SRPMS',\n 'content/fastrack/rhel/workstation/7/x86_64/os',\n 'content/fastrack/rhel/workstation/7/x86_64/source/SRPMS'\n ],\n 'kernels': {\n '3.10.0-1062.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-1062-1-9.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n ]\n },\n '3.10.0-1062.1.1.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-1062_1_1-1-8.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n ]\n },\n '3.10.0-1062.1.2.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-1062_1_2-1-7.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n ]\n },\n '3.10.0-1062.4.1.el7.x86_64': {\n 'pkgs': [\n {'reference':'kpatch-patch-3_10_0-1062_4_1-1-4.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n ]\n }\n }\n }\n];\n\nvar applicable_repo_urls = rhel_determine_applicable_repository_urls(constraints:kernel_live_checks);\nif(applicable_repo_urls == RHEL_REPOS_NO_OVERLAP_MESSAGE) exit(0, RHEL_REPO_NOT_ENABLED);\n\nvar flag = 0;\nvar kernel_affected = FALSE;\nforeach var kernel_array ( kernel_live_checks ) {\n var repo_relative_urls = NULL;\n if (!empty_or_null(kernel_array['repo_relative_urls'])) repo_relative_urls = kernel_array['repo_relative_urls'];\n var enterprise_linux_flag = rhel_repo_urls_has_content_dist_rhel(repo_urls:repo_relative_urls);\n var kpatch_details = kernel_array['kernels'][uname_r];\n if (empty_or_null(kpatch_details)) continue;\n kernel_affected = TRUE;\n foreach var pkg ( kpatch_details['pkgs'] ) {\n var reference = NULL;\n var _release = NULL;\n var sp = NULL;\n var _cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(pkg['reference'])) reference = pkg['reference'];\n if (!empty_or_null(pkg['release'])) _release = 'RHEL' + pkg['release'];\n if (!empty_or_null(pkg['sp']) && !enterprise_linux_flag) sp = pkg['sp'];\n if (!empty_or_null(pkg['cpu'])) _cpu = pkg['cpu'];\n if (!empty_or_null(pkg['el_string'])) el_string = pkg['el_string'];\n if (!empty_or_null(pkg['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = pkg['rpm_spec_vers_cmp'];\n if (!empty_or_null(pkg['epoch'])) epoch = pkg['epoch'];\n if (!empty_or_null(pkg['allowmaj'])) allowmaj = pkg['allowmaj'];\n if (!empty_or_null(pkg['exists_check'])) exists_check = pkg['exists_check'];\n if (reference &&\n _release &&\n rhel_decide_repo_relative_url_check(required_repo_url_list:repo_relative_urls) &&\n (applicable_repo_urls || (!exists_check || rpm_exists(release:_release, rpm:exists_check))) &&\n rpm_check(release:_release, sp:sp, cpu:_cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n}\n# No kpatch details found for the running kernel version\nif (!kernel_affected) audit(AUDIT_INST_VER_NOT_VULN, 'kernel', uname_r);\n\nif (flag)\n{\n var extra = NULL;\n if (empty_or_null(applicable_repo_urls)) extra = rpm_report_get() + redhat_report_repo_caveat();\n else extra = rpm_report_get() + redhat_report_package_caveat();\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : extra\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kpatch-patch-3_10_0-1062 / kpatch-patch-3_10_0-1062_1_1 / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:42", "description": "An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization 4.2 for Red Hat Enterprise Linux 7.6 EUS.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor.\nRed Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.\n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {}, "published": "2019-11-14T00:00:00", "type": "nessus", "title": "RHEL 7 : Virtualization Manager (RHSA-2019:3860)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:redhat-release-virtualization-host", "p-cpe:/a:redhat:enterprise_linux:redhat-virtualization-host-image-update", "p-cpe:/a:redhat:enterprise_linux:redhat-virtualization-host-image-update-placeholder", "cpe:/o:redhat:enterprise_linux:7"], "id": "REDHAT-RHSA-2019-3860.NASL", "href": "https://www.tenable.com/plugins/nessus/130999", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:3860. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130999);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2019:3860\");\n\n script_name(english:\"RHEL 7 : Virtualization Manager (RHSA-2019:3860)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for redhat-release-virtualization-host and\nredhat-virtualization-host is now available for Red Hat Virtualization\n4 for Red Hat Enterprise Linux 7 and Red Hat Virtualization 4.2 for\nRed Hat Enterprise Linux 7.6 EUS.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe redhat-virtualization-host packages provide the Red Hat\nVirtualization Host. These packages include\nredhat-release-virtualization-host, ovirt-node, and rhev-hypervisor.\nRed Hat Virtualization Hosts (RHVH) are installed using a special\nbuild of Red Hat Enterprise Linux with only the packages required to\nhost virtual machines. RHVH features a Cockpit user interface for\nmonitoring the host's resources and performing administrative tasks.\n\nThe ovirt-node-ng packages provide the Red Hat Virtualization Host.\nThese packages include redhat-release-virtualization-host, ovirt-node,\nand rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed\nusing a special build of Red Hat Enterprise Linux with only the\npackages required to host virtual machines. RHVH features a Cockpit\nuser interface for monitoring the host's resources and performing\nadministrative tasks.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, and other related information, refer to the CVE page(s)\nlisted in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ifu-page-mce\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/tsx-asynchronousabort\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:3860\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-11135\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected redhat-release-virtualization-host,\nredhat-virtualization-host-image-update and / or\nredhat-virtualization-host-image-update-placeholder packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-release-virtualization-host\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-virtualization-host-image-update\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:redhat-virtualization-host-image-update-placeholder\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:3860\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"redhat-release-virtualization-host-4.3.6-5.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"redhat-virtualization-host-image-update-4.3.6-20191108.0.el7_7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"redhat-virtualization-host-image-update-placeholder-4.3.6-5.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"redhat-release-virtualization-host / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-25T14:32:30", "description": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThis is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix :\n\n* kpatch: hw: incomplete fix for CVE-2018-12207 (CVE-2019-19339)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {}, "published": "2019-12-18T00:00:00", "type": "nessus", "title": "RHEL 8 : kpatch-patch (RHSA-2019:4245)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-19339"], "modified": "2020-01-31T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147-debugsource", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:8.1"], "id": "REDHAT-RHSA-2019-4245.NASL", "href": "https://www.tenable.com/plugins/nessus/132230", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:4245. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(132230);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2020/01/31\");\n\n script_cve_id(\"CVE-2019-19339\");\n script_xref(name:\"RHSA\", value:\"2019:4245\");\n\n script_name(english:\"RHEL 8 : kpatch-patch (RHSA-2019:4245)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kpatch-patch is now available for Red Hat Enterprise\nLinux 8.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThis is a kernel live patch module which is automatically loaded by\nthe RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix :\n\n* kpatch: hw: incomplete fix for CVE-2018-12207 (CVE-2019-19339)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ifu-page-mce\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:4245\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-19339\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected kpatch-patch-4_18_0-147,\nkpatch-patch-4_18_0-147-debuginfo and / or\nkpatch-patch-4_18_0-147-debugsource packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-19339\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/01/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 8.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:4245\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kpatch-patch-4_18_0-147-1-4.el8\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kpatch-patch-4_18_0-147-debuginfo-1-4.el8\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kpatch-patch-4_18_0-147-debugsource-1-4.el8\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kpatch-patch-4_18_0-147 / kpatch-patch-4_18_0-147-debuginfo / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:27", "description": "The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2019-4837 advisory.\n\n - Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. (CVE-2018-12207)\n\n - TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11135)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2019-11-14T00:00:00", "type": "nessus", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4837)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2021-09-08T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-firmware"], "id": "ORACLELINUX_ELSA-2019-4837.NASL", "href": "https://www.tenable.com/plugins/nessus/130995", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2019-4837.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(130995);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/09/08\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n script_xref(name:\"IAVA\", value:\"2020-A-0325-S\");\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4837)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2019-4837 advisory.\n\n - Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R)\n Processors may allow an authenticated user to potentially enable denial of service of the host system via\n local access. (CVE-2018-12207)\n\n - TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated\n user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11135)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2019-4837.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 6 / 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\nif ('x86_64' >!< cpu) audit(AUDIT_ARCH_NOT, 'x86_64', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.1.12-124.32.3.2.el6uek', '4.1.12-124.32.3.2.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2019-4837');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.1';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.1.12-124.32.3.2.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.32.3.2.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.32.3.2.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.32.3.2.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.32.3.2.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.32.3.2.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'},\n {'reference':'kernel-uek-4.1.12-124.32.3.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.32.3.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.32.3.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.32.3.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.32.3.2.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.32.3.2.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-18T15:24:45", "description": "An update for kpatch-patch is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThis is a kernel live patch module which is automatically loaded by the RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)", "cvss3": {}, "published": "2019-11-21T00:00:00", "type": "nessus", "title": "RHEL 8 : kpatch-patch (RHSA-2019:3936)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147-debugsource", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:8.1"], "id": "REDHAT-RHSA-2019-3936.NASL", "href": "https://www.tenable.com/plugins/nessus/131177", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:3936. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131177);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2019:3936\");\n\n script_name(english:\"RHEL 8 : kpatch-patch (RHSA-2019:3936)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kpatch-patch is now available for Red Hat Enterprise\nLinux 8.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThis is a kernel live patch module which is automatically loaded by\nthe RPM post-install script to modify the code of a running kernel.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ifu-page-mce\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/tsx-asynchronousabort\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:3936\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-11135\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected kpatch-patch-4_18_0-147,\nkpatch-patch-4_18_0-147-debuginfo and / or\nkpatch-patch-4_18_0-147-debugsource packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kpatch-patch-4_18_0-147-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 8.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:3936\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kpatch-patch-4_18_0-147-1-3.el8_1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kpatch-patch-4_18_0-147-debuginfo-1-3.el8_1\")) flag++;\n\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kpatch-patch-4_18_0-147-debugsource-1-3.el8_1\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kpatch-patch-4_18_0-147 / kpatch-patch-4_18_0-147-debuginfo / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-18T15:24:45", "description": "a. Hypervisor-Specific Mitigations for Machine Check Error on Page Size Change (MCEPSC) Denial-of-Service vulnerability - CVE-2018-12207\n\nVMware ESXi, Workstation, and Fusion patches include Hypervisor-Specific Mitigations for Machine Check Error on Page Size Change (MCEPSC).\n\nA malicious actor with local access to execute code in a virtual machine may be able to trigger a purple diagnostic screen or immediate reboot of the Hypervisor hosting the virtual machine, resulting in a denial-of-service condition.\n Because the mitigations for CVE-2018-12207 may have a performance impact they are not enabled by default. After applying patches, the mitigation can be enabled by following the instructions found in the article at https://kb.vmware.com/s/article/59139 . Performance impact data found in KB76050 should be reviewed prior to enabling this mitigation.\n\nb. Hypervisor-Specific Mitigations for TSX Asynchronous Abort (TAA) Speculative-Execution vulnerability - CVE-2019-11135\n\nVMware ESXi, Workstation, and Fusion patches include Hypervisor-Specific Mitigations for TSX Asynchronous Abort (TAA).\n\nA malicious actor with local access to execute code in a virtual machine may be able to infer data otherwise protected by architectural mechanisms from another virtual machine or the hypervisor itself. This vulnerability is only applicable to Hypervisors utilizing 2nd Generation Intel Xeon Scalable Processors (formerly known as Cascade Lake) microarchitecture.", "cvss3": {}, "published": "2019-11-14T00:00:00", "type": "nessus", "title": "VMSA-2019-0020 : Hypervisor-Specific Mitigations for Denial-of-Service and Speculative-Execution Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["cpe:/o:vmware:esxi:6.0", "cpe:/o:vmware:esxi:6.5", "cpe:/o:vmware:esxi:6.7"], "id": "VMWARE_VMSA-2019-0020.NASL", "href": "https://www.tenable.com/plugins/nessus/131018", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from VMware Security Advisory 2019-0020. \n# The text itself is copyright (C) VMware Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(131018);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-11135\");\n script_xref(name:\"VMSA\", value:\"2019-0020\");\n\n script_name(english:\"VMSA-2019-0020 : Hypervisor-Specific Mitigations for Denial-of-Service and Speculative-Execution Vulnerabilities\");\n script_summary(english:\"Checks esxupdate output for the patches\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote VMware ESXi host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"a. Hypervisor-Specific Mitigations for Machine Check Error on Page Size Change (MCEPSC) Denial-of-Service vulnerability - CVE-2018-12207\n\nVMware ESXi, Workstation, and Fusion patches include Hypervisor-Specific Mitigations for Machine Check Error on Page Size Change (MCEPSC).\n\nA malicious actor with local access to execute code in a virtual machine may be able to trigger a purple diagnostic screen or immediate reboot of the Hypervisor hosting the virtual machine, resulting in a denial-of-service condition.\n \nBecause the mitigations for CVE-2018-12207 may have a performance impact they are not enabled by default. After applying patches, the mitigation can be enabled by following the instructions found in the article at https://kb.vmware.com/s/article/59139 . Performance impact data found in KB76050 should be reviewed prior to enabling this mitigation.\n\nb. Hypervisor-Specific Mitigations for TSX Asynchronous Abort (TAA) Speculative-Execution vulnerability - CVE-2019-11135\n\nVMware ESXi, Workstation, and Fusion patches include Hypervisor-Specific Mitigations for TSX Asynchronous Abort (TAA).\n\nA malicious actor with local access to execute code in a virtual machine may be able to infer data otherwise protected by architectural mechanisms from another virtual machine or the hypervisor itself. This vulnerability is only applicable to Hypervisors utilizing 2nd Generation Intel Xeon Scalable Processors (formerly known as Cascade Lake) microarchitecture.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://lists.vmware.com/pipermail/security-announce/2019/000477.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Apply the missing patches.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esxi:6.0\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esxi:6.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:esxi:6.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"VMware ESX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/VMware/release\", \"Host/VMware/version\");\n script_require_ports(\"Host/VMware/esxupdate\", \"Host/VMware/esxcli_software_vibs\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"vmware_esx_packages.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/VMware/release\")) audit(AUDIT_OS_NOT, \"VMware ESX / ESXi\");\nif (\n !get_kb_item(\"Host/VMware/esxcli_software_vibs\") &&\n !get_kb_item(\"Host/VMware/esxupdate\")\n) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ninit_esx_check(date:\"2019-11-12\");\nflag = 0;\n\n\nif (esx_check(ver:\"ESXi 6.0\", vib:\"VMware:cpu-microcode:6.0.0-3.135.15018929\")) flag++;\nif (esx_check(ver:\"ESXi 6.0\", vib:\"VMware:esx-base:6.0.0-3.135.15018929\")) flag++;\nif (esx_check(ver:\"ESXi 6.0\", vib:\"VMware:vsan:6.0.0-3.135.14676868\")) flag++;\nif (esx_check(ver:\"ESXi 6.0\", vib:\"VMware:vsanhealth:6.0.0-3000000.3.0.3.135.14676869\")) flag++;\n\nif (esx_check(ver:\"ESXi 6.5\", vib:\"VMware:cpu-microcode:6.5.0-3.108.14990892\")) flag++;\nif (esx_check(ver:\"ESXi 6.5\", vib:\"VMware:esx-base:6.5.0-3.108.14990892\")) flag++;\nif (esx_check(ver:\"ESXi 6.5\", vib:\"VMware:esx-tboot:6.5.0-3.108.14990892\")) flag++;\nif (esx_check(ver:\"ESXi 6.5\", vib:\"VMware:vsan:6.5.0-3.108.14833668\")) flag++;\nif (esx_check(ver:\"ESXi 6.5\", vib:\"VMware:vsanhealth:6.5.0-3.108.14833669\")) flag++;\n\nif (esx_check(ver:\"ESXi 6.7\", vib:\"VMware:cpu-microcode:6.7.0-3.77.15018017\")) flag++;\nif (esx_check(ver:\"ESXi 6.7\", vib:\"VMware:esx-base:6.7.0-3.77.15018017\")) flag++;\nif (esx_check(ver:\"ESXi 6.7\", vib:\"VMware:esx-update:6.7.0-3.77.15018017\")) flag++;\nif (esx_check(ver:\"ESXi 6.7\", vib:\"VMware:vsan:6.7.0-3.77.14914424\")) flag++;\nif (esx_check(ver:\"ESXi 6.7\", vib:\"VMware:vsanhealth:6.7.0-3.77.14914425\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:esx_report_get());\n else security_note(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:41", "description": "An update for kernel is now available for Red Hat Enterprise Linux 7.5 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {}, "published": "2019-11-13T00:00:00", "type": "nessus", "title": "RHEL 7 : kernel (RHSA-2019:3838)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-0154", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "cpe:/o:redhat:enterprise_linux:7.5"], "id": "REDHAT-RHSA-2019-3838.NASL", "href": "https://www.tenable.com/plugins/nessus/130930", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:3838. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130930);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2019:3838\");\n\n script_name(english:\"RHEL 7 : kernel (RHSA-2019:3838)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kernel is now available for Red Hat Enterprise Linux 7.5\nExtended Update Support.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power\nstate (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ifu-page-mce\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/tsx-asynchronousabort\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/i915-graphics\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:3838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-0154\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-11135\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7\\.5([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.5\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-11135\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2019:3838\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:3838\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", reference:\"kernel-abi-whitelists-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debug-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debug-devel-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-devel-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", reference:\"kernel-doc-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-headers-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-kdump-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-kdump-devel-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"perf-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"perf-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"perf-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"perf-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"python-perf-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"s390x\", reference:\"python-perf-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"5\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-3.10.0-862.43.2.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-abi-whitelists / kernel-debug / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:25", "description": "An update for kernel-rt is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {}, "published": "2019-11-13T00:00:00", "type": "nessus", "title": "RHEL 8 : kernel-rt (RHSA-2019:3833)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-0154", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-rt", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-core", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra", "cpe:/o:redhat:enterprise_linux:8"], "id": "REDHAT-RHSA-2019-3833.NASL", "href": "https://www.tenable.com/plugins/nessus/130925", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:3833. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130925);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2019:3833\");\n\n script_name(english:\"RHEL 8 : kernel-rt (RHSA-2019:3833)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kernel-rt is now available for Red Hat Enterprise Linux\n8.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which\nenables fine-tuning for systems with extremely high determinism\nrequirements.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power\nstate (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ifu-page-mce\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/tsx-asynchronousabort\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/i915-graphics\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:3833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-0154\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-11135\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-modules-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:8\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^8([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 8.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-11135\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2019:3833\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:3833\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-core-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debug-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debug-core-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debug-debuginfo-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debug-devel-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debug-kvm-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debug-kvm-debuginfo-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debug-modules-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debug-modules-extra-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debuginfo-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-debuginfo-common-x86_64-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-devel-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-kvm-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-kvm-debuginfo-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-modules-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n if (rpm_check(release:\"RHEL8\", cpu:\"x86_64\", reference:\"kernel-rt-modules-extra-4.18.0-147.0.2.rt24.94.el8_1\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-rt / kernel-rt-core / kernel-rt-debug / kernel-rt-debug-core / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:04", "description": "An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {}, "published": "2019-11-13T00:00:00", "type": "nessus", "title": "RHEL 7 : kernel (RHSA-2019:3834)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-0154", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:bpftool", "p-cpe:/a:redhat:enterprise_linux:bpftool-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:7.7", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-tools", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs"], "id": "REDHAT-RHSA-2019-3834.NASL", "href": "https://www.tenable.com/plugins/nessus/130926", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:3834. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130926);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2019:3834\");\n\n script_name(english:\"RHEL 7 : kernel (RHSA-2019:3834)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kernel is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power\nstate (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ifu-page-mce\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/tsx-asynchronousabort\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/i915-graphics\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:3834\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-0154\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-11135\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bpftool\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:bpftool-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-11135\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2019:3834\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:3834\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"bpftool-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"bpftool-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"bpftool-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"bpftool-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"kernel-abi-whitelists-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debug-devel-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debug-devel-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-debuginfo-common-s390x-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-devel-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-devel-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"kernel-doc-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-headers-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-headers-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"kernel-kdump-devel-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-tools-libs-devel-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"perf-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"perf-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"perf-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"perf-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"python-perf-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-perf-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"python-perf-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-3.10.0-1062.4.2.el7\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bpftool / bpftool-debuginfo / kernel / kernel-abi-whitelists / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:26", "description": "An update for kernel-rt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {}, "published": "2019-11-13T00:00:00", "type": "nessus", "title": "RHEL 7 : kernel-rt (RHSA-2019:3835)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-0154", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:kernel-rt", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm", "p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm-debuginfo", "cpe:/o:redhat:enterprise_linux:7"], "id": "REDHAT-RHSA-2019-3835.NASL", "href": "https://www.tenable.com/plugins/nessus/130927", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:3835. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(130927);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2019/12/13\");\n\n script_cve_id(\"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-11135\");\n script_xref(name:\"RHSA\", value:\"2019:3835\");\n\n script_name(english:\"RHEL 7 : kernel-rt (RHSA-2019:3835)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kernel-rt is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel-rt packages provide the Real Time Linux Kernel, which\nenables fine-tuning for systems with extremely high determinism\nrequirements.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power\nstate (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ifu-page-mce\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/tsx-asynchronousabort\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/solutions/i915-graphics\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:3835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-12207\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-0154\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-11135\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-11135\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/14\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/11/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/11/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2018-12207\", \"CVE-2019-0154\", \"CVE-2019-11135\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2019:3835\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:3835\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-debug-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-debug-debuginfo-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-debug-devel-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-debug-kvm-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-debug-kvm-debuginfo-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-debuginfo-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-debuginfo-common-x86_64-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-devel-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", reference:\"kernel-rt-doc-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-kvm-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-kvm-debuginfo-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-trace-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-trace-debuginfo-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-trace-devel-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-trace-kvm-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"kernel-rt-trace-kvm-debuginfo-3.10.0-1062.4.2.rt56.1028.el7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-rt / kernel-rt-debug / kernel-rt-debug-debuginfo / etc\");\n }\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-15T15:38:26", "description": "An update for kernel is now available for Red Hat Enterprise Linux 7.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es) :\n\n* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207)\n\n* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135)\n\n* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "cvss3": {}, "published": "2019-11-13T00:00:00", "type": "nessus", "title": "RHEL 7 : kernel (RHSA-2019:3837)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-12207", "CVE-2019-0154", "CVE-2019-11135"], "modified": "2019-12-13T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:bpftool", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:kernel-abi-whitelists", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-s390x", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-doc", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-kdump", "p-cpe:/a:redhat:enterprise_linux:kernel-kd