{"nessus": [{"lastseen": "2023-05-23T14:18:56", "description": "The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2020-5845 advisory.\n\n - A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after- free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2018-16884)\n\n - An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the vhost_net kernel thread, resulting in a DoS scenario. (CVE-2019-3900)\n\n - The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after- free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests. (CVE-2019-11487)\n\n - In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (CVE-2019-10638)\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable. (CVE-2019-3874)\n\n - The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.\n (CVE-2019-14898)\n\n - In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a long SSID IE, leading to a Buffer Overflow. (CVE-2019-17133)\n\n - An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow. (CVE-2019-16746)\n\n - The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to have a dependency on an address associated with a network namespace. (CVE-2019-10639)\n\n - Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10. (CVE-2019-19073)\n\n - A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.\n (CVE-2019-19074)\n\n - kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words, although this slice expiration would typically be seen with benign workloads, it is possible that an attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray requests. An attack does not affect the stability of the kernel; it only causes mismanagement of application execution.) (CVE-2019-19922)\n\n - A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. (CVE-2020-10767)\n\n - In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042. (CVE-2019-19535)\n\n - An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067. (CVE-2019-20812)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15. (CVE-2019-18885)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered. (CVE-2020-24394)\n\n - A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. (CVE-2020-10781)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\n - An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c. (CVE-2018-14613)\n\n - A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service. (CVE-2020-10769)\n\n - A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a denial of service (panic) by corrupting a mountpoint reference counter. (CVE-2020-12114)\n\n - A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing. (CVE-2020-10751)\n\n - An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability. (CVE-2019-5108)\n\n - An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable.\n This could allow an attacker to trigger a Denial of Service, exploitable if this driver is used on an architecture for which this stack/DMA interaction has security relevance. (CVE-2019-17075)\n\n - An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver. (CVE-2019-15218)\n\n - A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486. (CVE-2019-19052)\n\n - Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113. (CVE-2019-19063)\n\n - A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd. (CVE-2019-19066)\n\n - A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-b8d17e7d93d2. (CVE-2019-19078)\n\n - An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails. (CVE-2020-12771)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-09-11T00:00:00", "type": "nessus", "title": "Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5845)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-14613", "CVE-2018-16884", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11487", "CVE-2019-11599", "CVE-2019-14898", "CVE-2019-15218", "CVE-2019-16746", "CVE-2019-17075", "CVE-2019-17133", "CVE-2019-18885", "CVE-2019-19052", "CVE-2019-19063", "CVE-2019-19066", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19078", "CVE-2019-19535", "CVE-2019-19922", "CVE-2019-20812", "CVE-2019-3874", "CVE-2019-3900", "CVE-2019-5108", "CVE-2020-10751", "CVE-2020-10767", "CVE-2020-10769", "CVE-2020-10781", "CVE-2020-12114", "CVE-2020-12771", "CVE-2020-14331", "CVE-2020-16166", "CVE-2020-24394"], "modified": "2022-12-05T00:00:00", "cpe": ["cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-headers", "p-cpe:/a:oracle:linux:kernel-uek-tools", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs-devel", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2020-5845.NASL", "href": "https://www.tenable.com/plugins/nessus/140499", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-5845.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140499);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/05\");\n\n script_cve_id(\n \"CVE-2018-14613\",\n \"CVE-2018-16884\",\n \"CVE-2019-3874\",\n \"CVE-2019-3900\",\n \"CVE-2019-5108\",\n \"CVE-2019-10638\",\n \"CVE-2019-10639\",\n \"CVE-2019-11487\",\n \"CVE-2019-14898\",\n \"CVE-2019-15218\",\n \"CVE-2019-16746\",\n \"CVE-2019-17075\",\n \"CVE-2019-17133\",\n \"CVE-2019-18885\",\n \"CVE-2019-19052\",\n \"CVE-2019-19063\",\n \"CVE-2019-19066\",\n \"CVE-2019-19073\",\n \"CVE-2019-19074\",\n \"CVE-2019-19078\",\n \"CVE-2019-19535\",\n \"CVE-2019-19922\",\n \"CVE-2019-20812\",\n \"CVE-2020-10751\",\n \"CVE-2020-10767\",\n \"CVE-2020-10769\",\n \"CVE-2020-10781\",\n \"CVE-2020-12114\",\n \"CVE-2020-12771\",\n \"CVE-2020-14331\",\n \"CVE-2020-16166\",\n \"CVE-2020-24394\"\n );\n script_bugtraq_id(\n 104917,\n 106253,\n 107488,\n 108054,\n 108076,\n 109092\n );\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0025\");\n\n script_name(english:\"Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5845)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nELSA-2020-5845 advisory.\n\n - A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network\n namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-\n free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system\n panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2018-16884)\n\n - An infinite loop issue was found in the vhost_net kernel module in Linux Kernel up to and including\n v5.1-rc6, while handling incoming packets in handle_rx(). It could occur if one end sends packets faster\n than the other end can process them. A guest user, maybe remote one, could use this flaw to stall the\n vhost_net kernel thread, resulting in a DoS scenario. (CVE-2019-3900)\n\n - The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-\n free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c,\n include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can\n occur with FUSE requests. (CVE-2019-11487)\n\n - In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel\n produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple\n destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and\n thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page\n that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses. (CVE-2019-10638)\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An\n attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are\n believed to be vulnerable. (CVE-2019-3874)\n\n - The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could\n use this flaw to obtain sensitive information, cause a denial of service, or possibly have other\n unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.\n (CVE-2019-14898)\n\n - In the Linux kernel through 5.3.2, cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c does not reject a\n long SSID IE, leading to a Buffer Overflow. (CVE-2019-17133)\n\n - An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check\n the length of variable elements in a beacon head, leading to a buffer overflow. (CVE-2019-16746)\n\n - The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel\n address disclosure), leading to a KASLR bypass. Specifically, it is possible to extract the KASLR kernel\n image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and\n ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash\n collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This\n key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via\n enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the\n attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled\n IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic\n is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the\n attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP\n addresses. NOTE: this attack against KASLR became viable in 4.1 because IP ID generation was changed to\n have a dependency on an address associated with a network namespace. (CVE-2019-10639)\n\n - Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow\n attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout()\n failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the\n htc_connect_service() function, aka CID-853acf7caf10. (CVE-2019-19073)\n\n - A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.\n (CVE-2019-19074)\n\n - kernel/sched/fair.c in the Linux kernel before 5.3.9, when cpu.cfs_quota_us is used (e.g., with\n Kubernetes), allows attackers to cause a denial of service against non-cpu-bound applications by\n generating a workload that triggers unwanted slice expiration, aka CID-de53fd7aedb1. (In other words,\n although this slice expiration would typically be seen with benign workloads, it is possible that an\n attacker could calculate how many stray requests are required to force an entire Kubernetes cluster into a\n low-performance state caused by slice expiration, and ensure that a DDoS attack sent that number of stray\n requests. An attack does not affect the stability of the kernel; it only causes mismanagement of\n application execution.) (CVE-2019-19922)\n\n - A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect\n Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the\n Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to\n perform a Spectre V2 style attack when this configuration is active. The highest threat from this\n vulnerability is to confidentiality. (CVE-2020-10767)\n\n - In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device\n in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042. (CVE-2019-19535)\n\n - An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain\n failure case involving TPACKET_V3, aka CID-b43d1f9f7067. (CVE-2019-20812)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a\n local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds\n write to occur. This flaw allows a local user with access to the VGA console to crash the system,\n potentially escalating their privileges on the system. The highest threat from this vulnerability is to\n data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer\n dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka\n CID-09ba3bc9dd15. (CVE-2019-18885)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new\n filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the\n current umask is not considered. (CVE-2020-24394)\n\n - A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local\n account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in\n the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the\n creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large\n amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random\n userspace processes, possibly making the system inoperable. (CVE-2020-10781)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive\n information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\n - An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in\n io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item\n validation in check_leaf_item in fs/btrfs/tree-checker.c. (CVE-2018-14613)\n\n - A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in\n crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4\n bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat,\n leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of\n service. (CVE-2020-10769)\n\n - A pivot_root race condition in fs/namespace.c in the Linux kernel 4.4.x before 4.4.221, 4.9.x before\n 4.9.221, 4.14.x before 4.14.178, 4.19.x before 4.19.119, and 5.x before 5.3 allows local users to cause a\n denial of service (panic) by corrupting a mountpoint reference counter. (CVE-2020-12114)\n\n - A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it\n incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly\n only validate the first netlink message in the skb and allow or deny the rest of the messages within the\n skb with the granted permission without further processing. (CVE-2020-10751)\n\n - An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An\n attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations\n before the required authentication process has completed. This could lead to different denial-of-service\n scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already\n existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge\n Authentication and Association Request packets to trigger this vulnerability. (CVE-2019-5108)\n\n - An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel\n through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable.\n This could allow an attacker to trigger a Denial of Service, exploitable if this driver is used on an\n architecture for which this stack/DMA interaction has security relevance. (CVE-2019-17075)\n\n - An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a\n malicious USB device in the drivers/media/usb/siano/smsusb.c driver. (CVE-2019-15218)\n\n - A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before\n 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb()\n failures, aka CID-fb5be6a7b486. (CVE-2019-19052)\n\n - Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the\n Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka\n CID-3f9361695113. (CVE-2019-19063)\n\n - A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering\n bfa_port_get_stats() failures, aka CID-0e62395da2bd. (CVE-2019-19066)\n\n - A memory leak in the ath10k_usb_hif_tx_sg() function in drivers/net/wireless/ath/ath10k/usb.c in the Linux\n kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering\n usb_submit_urb() failures, aka CID-b8d17e7d93d2. (CVE-2019-19078)\n\n - An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c\n has a deadlock if a coalescing operation fails. (CVE-2020-12771)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2020-5845.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-17133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/07/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.14.35-1902.306.2.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2020-5845');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.14';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.14.35'},\n {'reference':'kernel-uek-4.14.35-1902.306.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.14.35'},\n {'reference':'kernel-uek-debug-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.14.35'},\n {'reference':'kernel-uek-debug-4.14.35-1902.306.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.14.35'},\n {'reference':'kernel-uek-debug-devel-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.14.35'},\n {'reference':'kernel-uek-debug-devel-4.14.35-1902.306.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.14.35'},\n {'reference':'kernel-uek-devel-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.14.35'},\n {'reference':'kernel-uek-devel-4.14.35-1902.306.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.14.35'},\n {'reference':'kernel-uek-doc-4.14.35-1902.306.2.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.14.35'},\n {'reference':'kernel-uek-headers-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-headers-4.14.35'},\n {'reference':'kernel-uek-tools-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-4.14.35'},\n {'reference':'kernel-uek-tools-4.14.35-1902.306.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-4.14.35'},\n {'reference':'kernel-uek-tools-libs-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-4.14.35'},\n {'reference':'kernel-uek-tools-libs-devel-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-devel-4.14.35'},\n {'reference':'perf-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python-perf-4.14.35-1902.306.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:07:28", "description": "The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2020-5844 advisory.\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable. (CVE-2019-3874)\n\n - A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. (CVE-2020-10767)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15. (CVE-2019-18885)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered. (CVE-2020-24394)\n\n - A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. (CVE-2020-10781)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-09-11T00:00:00", "type": "nessus", "title": "Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5844)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-18885", "CVE-2019-3874", "CVE-2020-10767", "CVE-2020-10781", "CVE-2020-14331", "CVE-2020-16166", "CVE-2020-24394"], "modified": "2022-05-12T00:00:00", "cpe": ["cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-headers", "p-cpe:/a:oracle:linux:kernel-uek-tools", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs-devel", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2020-5844.NASL", "href": "https://www.tenable.com/plugins/nessus/140500", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-5844.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140500);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\n \"CVE-2019-3874\",\n \"CVE-2019-18885\",\n \"CVE-2020-10767\",\n \"CVE-2020-10781\",\n \"CVE-2020-14331\",\n \"CVE-2020-16166\",\n \"CVE-2020-24394\"\n );\n script_bugtraq_id(107488);\n\n script_name(english:\"Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5844)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nELSA-2020-5844 advisory.\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An\n attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are\n believed to be vulnerable. (CVE-2019-3874)\n\n - A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect\n Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the\n Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to\n perform a Spectre V2 style attack when this configuration is active. The highest threat from this\n vulnerability is to confidentiality. (CVE-2020-10767)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a\n local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds\n write to occur. This flaw allows a local user with access to the VGA console to crash the system,\n potentially escalating their privileges on the system. The highest threat from this vulnerability is to\n data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer\n dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka\n CID-09ba3bc9dd15. (CVE-2019-18885)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new\n filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the\n current umask is not considered. (CVE-2020-24394)\n\n - A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local\n account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in\n the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the\n creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large\n amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random\n userspace processes, possibly making the system inoperable. (CVE-2020-10781)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive\n information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2020-5844.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14331\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-24394\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.14.35-2025.400.9.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2020-5844');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.14';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.14.35'},\n {'reference':'kernel-uek-4.14.35-2025.400.9.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.14.35'},\n {'reference':'kernel-uek-debug-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.14.35'},\n {'reference':'kernel-uek-debug-4.14.35-2025.400.9.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.14.35'},\n {'reference':'kernel-uek-debug-devel-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.14.35'},\n {'reference':'kernel-uek-debug-devel-4.14.35-2025.400.9.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.14.35'},\n {'reference':'kernel-uek-devel-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.14.35'},\n {'reference':'kernel-uek-devel-4.14.35-2025.400.9.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.14.35'},\n {'reference':'kernel-uek-doc-4.14.35-2025.400.9.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.14.35'},\n {'reference':'kernel-uek-headers-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-headers-4.14.35'},\n {'reference':'kernel-uek-tools-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-4.14.35'},\n {'reference':'kernel-uek-tools-4.14.35-2025.400.9.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-4.14.35'},\n {'reference':'kernel-uek-tools-libs-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-4.14.35'},\n {'reference':'kernel-uek-tools-libs-devel-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-devel-4.14.35'},\n {'reference':'perf-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python-perf-4.14.35-2025.400.9.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:07:25", "description": "The remote Oracle Linux 7 / 8 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2020-5848 advisory.\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered. (CVE-2020-24394)\n\n - A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. (CVE-2020-10781)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\n - A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing. (CVE-2020-10751)\n\n - An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails. (CVE-2020-12771)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-09-15T00:00:00", "type": "nessus", "title": "Oracle Linux 7 / 8 : Unbreakable Enterprise kernel (ELSA-2020-5848)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-10751", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-14331", "CVE-2020-16166", "CVE-2020-24394"], "modified": "2022-05-12T00:00:00", "cpe": ["cpe:/o:oracle:linux:7", "cpe:/o:oracle:linux:8", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-tools", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2020-5848.NASL", "href": "https://www.tenable.com/plugins/nessus/140588", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-5848.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140588);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\n \"CVE-2020-10751\",\n \"CVE-2020-10781\",\n \"CVE-2020-12771\",\n \"CVE-2020-14331\",\n \"CVE-2020-16166\",\n \"CVE-2020-24394\"\n );\n\n script_name(english:\"Oracle Linux 7 / 8 : Unbreakable Enterprise kernel (ELSA-2020-5848)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 7 / 8 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2020-5848 advisory.\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a\n local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds\n write to occur. This flaw allows a local user with access to the VGA console to crash the system,\n potentially escalating their privileges on the system. The highest threat from this vulnerability is to\n data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new\n filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the\n current umask is not considered. (CVE-2020-24394)\n\n - A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local\n account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in\n the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the\n creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large\n amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random\n userspace processes, possibly making the system inoperable. (CVE-2020-10781)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive\n information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\n - A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it\n incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly\n only validate the first netlink message in the skb and allow or deny the rest of the messages within the\n skb with the granted permission without further processing. (CVE-2020-10751)\n\n - An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c\n has a deadlock if a coalescing operation fails. (CVE-2020-12771)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2020-5848.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14331\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-24394\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(7|8)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 7 / 8', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['5.4.17-2011.6.2.el7uek', '5.4.17-2011.6.2.el8uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2020-5848');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '5.4';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-5.4.17-2011.6.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-5.4.17'},\n {'reference':'kernel-uek-5.4.17-2011.6.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-5.4.17'},\n {'reference':'kernel-uek-debug-5.4.17-2011.6.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-5.4.17'},\n {'reference':'kernel-uek-debug-5.4.17-2011.6.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-5.4.17'},\n {'reference':'kernel-uek-debug-devel-5.4.17-2011.6.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-5.4.17'},\n {'reference':'kernel-uek-debug-devel-5.4.17-2011.6.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-5.4.17'},\n {'reference':'kernel-uek-devel-5.4.17-2011.6.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-5.4.17'},\n {'reference':'kernel-uek-devel-5.4.17-2011.6.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-5.4.17'},\n {'reference':'kernel-uek-doc-5.4.17-2011.6.2.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-5.4.17'},\n {'reference':'kernel-uek-tools-5.4.17-2011.6.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-5.4.17'},\n {'reference':'kernel-uek-tools-5.4.17-2011.6.2.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-5.4.17'},\n {'reference':'kernel-uek-tools-libs-5.4.17-2011.6.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-5.4.17'},\n {'reference':'perf-5.4.17-2011.6.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python-perf-5.4.17-2011.6.2.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-uek-5.4.17-2011.6.2.el8uek', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-5.4.17'},\n {'reference':'kernel-uek-5.4.17-2011.6.2.el8uek', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-5.4.17'},\n {'reference':'kernel-uek-debug-5.4.17-2011.6.2.el8uek', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-5.4.17'},\n {'reference':'kernel-uek-debug-5.4.17-2011.6.2.el8uek', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-5.4.17'},\n {'reference':'kernel-uek-debug-devel-5.4.17-2011.6.2.el8uek', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-5.4.17'},\n {'reference':'kernel-uek-debug-devel-5.4.17-2011.6.2.el8uek', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-5.4.17'},\n {'reference':'kernel-uek-devel-5.4.17-2011.6.2.el8uek', 'cpu':'aarch64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-5.4.17'},\n {'reference':'kernel-uek-devel-5.4.17-2011.6.2.el8uek', 'cpu':'x86_64', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-5.4.17'},\n {'reference':'kernel-uek-doc-5.4.17-2011.6.2.el8uek', 'release':'8', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-5.4.17'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:08:56", "description": "The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2020-5841 advisory.\n\n - A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after- free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2018-16884)\n\n - An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067. (CVE-2019-20812)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-09-11T00:00:00", "type": "nessus", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2020-5841)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-16884", "CVE-2019-20812", "CVE-2020-14331"], "modified": "2022-05-12T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-118.49.1.el6uek", "p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-118.49.1.el7uek", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-firmware"], "id": "ORACLELINUX_ELSA-2020-5841.NASL", "href": "https://www.tenable.com/plugins/nessus/140496", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-5841.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(140496);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/12\");\n\n script_cve_id(\"CVE-2018-16884\", \"CVE-2019-20812\", \"CVE-2020-14331\");\n script_bugtraq_id(106253);\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2020-5841)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2020-5841 advisory.\n\n - A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network\n namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-\n free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system\n panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2018-16884)\n\n - An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain\n failure case involving TPACKET_V3, aka CID-b43d1f9f7067. (CVE-2019-20812)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a\n local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds\n write to occur. This flaw allows a local user with access to the VGA console to crash the system,\n potentially escalating their privileges on the system. The highest threat from this vulnerability is to\n data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2020-5841.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14331\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2018-16884\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/12/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-118.49.1.el6uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:dtrace-modules-3.8.13-118.49.1.el7uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 6 / 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\nif ('x86_64' >!< cpu) audit(AUDIT_ARCH_NOT, 'x86_64', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['3.8.13-118.49.1.el6uek', '3.8.13-118.49.1.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2020-5841');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '3.8';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'dtrace-modules-3.8.13-118.49.1.el6uek-0.4.5-3.el6', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-uek-3.8.13-118.49.1.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-3.8.13'},\n {'reference':'kernel-uek-debug-3.8.13-118.49.1.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-3.8.13'},\n {'reference':'kernel-uek-debug-devel-3.8.13-118.49.1.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-3.8.13'},\n {'reference':'kernel-uek-devel-3.8.13-118.49.1.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-3.8.13'},\n {'reference':'kernel-uek-doc-3.8.13-118.49.1.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-3.8.13'},\n {'reference':'kernel-uek-firmware-3.8.13-118.49.1.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-3.8.13'},\n {'reference':'dtrace-modules-3.8.13-118.49.1.el7uek-0.4.5-3.el7', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'kernel-uek-3.8.13-118.49.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-3.8.13'},\n {'reference':'kernel-uek-debug-3.8.13-118.49.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-3.8.13'},\n {'reference':'kernel-uek-debug-devel-3.8.13-118.49.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-3.8.13'},\n {'reference':'kernel-uek-devel-3.8.13-118.49.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-3.8.13'},\n {'reference':'kernel-uek-doc-3.8.13-118.49.1.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-3.8.13'},\n {'reference':'kernel-uek-firmware-3.8.13-118.49.1.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-3.8.13'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'dtrace-modules-3.8.13-118.49.1.el6uek / dtrace-modules-3.8.13-118.49.1.el7uek / kernel-uek / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:55:06", "description": "An update of the linux package has been released.", "cvss3": {}, "published": "2020-01-18T00:00:00", "type": "nessus", "title": "Photon OS 3.0: Linux PHSA-2019-3.0-0046", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-19062", "CVE-2019-19066", "CVE-2019-19072", "CVE-2019-19073", "CVE-2019-19074", "CVE-2019-19078"], "modified": "2020-01-20T00:00:00", "cpe": ["p-cpe:/a:vmware:photonos:linux", "cpe:/o:vmware:photonos:3.0"], "id": "PHOTONOS_PHSA-2019-3_0-0046_LINUX.NASL", "href": "https://www.tenable.com/plugins/nessus/133061", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from VMware Security Advisory PHSA-2019-3.0-0046. The text\n# itself is copyright (C) VMware, Inc.\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(133061);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/01/20\");\n\n script_cve_id(\n \"CVE-2019-19062\",\n \"CVE-2019-19066\",\n \"CVE-2019-19072\",\n \"CVE-2019-19073\",\n \"CVE-2019-19074\",\n \"CVE-2019-19078\"\n );\n\n script_name(english:\"Photon OS 3.0: Linux PHSA-2019-3.0-0046\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote PhotonOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"An update of the linux package has been released.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/vmware/photon/wiki/Security-Updates-3.0-46.md\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected Linux packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-19078\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/11/18\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/01/18\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:vmware:photonos:linux\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:vmware:photonos:3.0\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"PhotonOS Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/PhotonOS/release\", \"Host/PhotonOS/rpm-list\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/PhotonOS/release\");\nif (isnull(release) || release !~ \"^VMware Photon\") audit(AUDIT_OS_NOT, \"PhotonOS\");\nif (release !~ \"^VMware Photon (?:Linux|OS) 3\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"PhotonOS 3.0\");\n\nif (!get_kb_item(\"Host/PhotonOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"PhotonOS\", cpu);\n\nflag = 0;\n\nif (rpm_exists(rpm:\"linux-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"src\", reference:\"linux-4.19.87-1.ph3.src\")) flag++;\nif (rpm_exists(rpm:\"linux-api-headers-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", reference:\"linux-api-headers-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-api-headers-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"src\", reference:\"linux-api-headers-4.19.87-1.ph3.src\")) flag++;\nif (rpm_exists(rpm:\"linux-aws-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-aws-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"src\", reference:\"linux-aws-4.19.87-1.ph3.src\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-debuginfo-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-devel-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-docs-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-drivers-gpu-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-hmacgen-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-oprofile-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-aws-sound-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-debuginfo-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-debuginfo-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-debuginfo-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-debuginfo-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-devel-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-devel-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-devel-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-devel-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-docs-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-docs-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-docs-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-docs-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-drivers-gpu-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-drivers-gpu-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-drivers-gpu-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-drivers-gpu-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-drivers-sound-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-drivers-sound-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-drivers-sound-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-drivers-sound-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-dtb-ls1012afrwy-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-dtb-rpi3-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-esx-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-esx-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"src\", reference:\"linux-esx-4.19.87-1.ph3.src\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-debuginfo-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-devel-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-docs-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-esx-hmacgen-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-hmacgen-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-hmacgen-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-hmacgen-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-hmacgen-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-oprofile-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-secure-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-secure-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"src\", reference:\"linux-secure-4.19.87-1.ph3.src\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-debuginfo-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-devel-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-docs-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-hmacgen-4.19.87-1.ph3\")) flag++;\nif (rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-secure-lkcm-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-tools-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"aarch64\", reference:\"linux-tools-4.19.87-1.ph3\")) flag++;\nif (rpm_exists(rpm:\"linux-tools-4.19\", release:\"PhotonOS-3.0\") && rpm_check(release:\"PhotonOS-3.0\", cpu:\"x86_64\", reference:\"linux-tools-4.19.87-1.ph3\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-29T14:24:50", "description": "The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2020-5885 advisory.\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable. (CVE-2019-3874)\n\n - A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. (CVE-2020-10767)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15. (CVE-2019-18885)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered. (CVE-2020-24394)\n\n - A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. (CVE-2020-10781)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\n - An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. (CVE-2018-20669)\n\n - A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root privileges from unprivileged processes. The highest threat from this vulnerability is to data confidentiality and integrity. (CVE-2020-14386)\n\n - A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14314)\n\n - A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452. (CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812. (CVE-2020-25285)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-10-12T00:00:00", "type": "nessus", "title": "Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5885)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-20669", "CVE-2019-18885", "CVE-2019-3874", "CVE-2020-10767", "CVE-2020-10781", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14386", "CVE-2020-16166", "CVE-2020-24394", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285"], "modified": "2021-09-08T00:00:00", "cpe": ["cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-headers", "p-cpe:/a:oracle:linux:kernel-uek-tools", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs", "p-cpe:/a:oracle:linux:kernel-uek-tools-libs-devel", "p-cpe:/a:oracle:linux:perf", "p-cpe:/a:oracle:linux:python-perf"], "id": "ORACLELINUX_ELSA-2020-5885.NASL", "href": "https://www.tenable.com/plugins/nessus/141396", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-5885.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(141396);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/09/08\");\n\n script_cve_id(\n \"CVE-2018-20669\",\n \"CVE-2019-3874\",\n \"CVE-2019-18885\",\n \"CVE-2020-10767\",\n \"CVE-2020-10781\",\n \"CVE-2020-14314\",\n \"CVE-2020-14331\",\n \"CVE-2020-14386\",\n \"CVE-2020-16166\",\n \"CVE-2020-24394\",\n \"CVE-2020-25212\",\n \"CVE-2020-25284\",\n \"CVE-2020-25285\"\n );\n script_bugtraq_id(106748, 107488);\n\n script_name(english:\"Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2020-5885)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the\nELSA-2020-5885 advisory.\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An\n attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are\n believed to be vulnerable. (CVE-2019-3874)\n\n - A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect\n Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the\n Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to\n perform a Spectre V2 style attack when this configuration is active. The highest threat from this\n vulnerability is to confidentiality. (CVE-2020-10767)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a\n local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds\n write to occur. This flaw allows a local user with access to the VGA console to crash the system,\n potentially escalating their privileges on the system. The highest threat from this vulnerability is to\n data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer\n dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka\n CID-09ba3bc9dd15. (CVE-2019-18885)\n\n - In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new\n filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the\n current umask is not considered. (CVE-2020-24394)\n\n - A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local\n account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in\n the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the\n creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large\n amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random\n userspace processes, possibly making the system inoperable. (CVE-2020-10781)\n\n - The Linux kernel through 5.7.11 allows remote attackers to make observations that help to obtain sensitive\n information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c. (CVE-2020-16166)\n\n - An issue where a provided address with access_ok() is not checked was discovered in\n i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through\n 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory,\n resulting in a Denial of Service or privilege escalation. (CVE-2018-20669)\n\n - A flaw was found in the Linux kernel before 5.9-rc4. Memory corruption can be exploited to gain root\n privileges from unprivileged processes. The highest threat from this vulnerability is to data\n confidentiality and integrity. (CVE-2020-14386)\n\n - A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file\n system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash\n the system if the directory exists. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14314)\n\n - A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers\n to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c\n instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452. (CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete\n permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap\n rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be\n used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified\n other impact, aka CID-17743798d812. (CVE-2020-25285)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2020-5885.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-14386\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/01/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/10/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:python-perf\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.14.35-2025.401.4.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2020-5885');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.14';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.14.35'},\n {'reference':'kernel-uek-4.14.35-2025.401.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.14.35'},\n {'reference':'kernel-uek-debug-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.14.35'},\n {'reference':'kernel-uek-debug-4.14.35-2025.401.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.14.35'},\n {'reference':'kernel-uek-debug-devel-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.14.35'},\n {'reference':'kernel-uek-debug-devel-4.14.35-2025.401.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.14.35'},\n {'reference':'kernel-uek-devel-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.14.35'},\n {'reference':'kernel-uek-devel-4.14.35-2025.401.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.14.35'},\n {'reference':'kernel-uek-doc-4.14.35-2025.401.4.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.14.35'},\n {'reference':'kernel-uek-headers-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-headers-4.14.35'},\n {'reference':'kernel-uek-tools-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-4.14.35'},\n {'reference':'kernel-uek-tools-4.14.35-2025.401.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-4.14.35'},\n {'reference':'kernel-uek-tools-libs-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-4.14.35'},\n {'reference':'kernel-uek-tools-libs-devel-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-tools-libs-devel-4.14.35'},\n {'reference':'perf-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE},\n {'reference':'python-perf-4.14.35-2025.401.4.el7uek', 'cpu':'aarch64', 'release':'7', 'rpm_spec_vers_cmp':TRUE}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-08-17T15:58:29", "description": "The remote OracleVM system is missing necessary patches to address critical security updates : please see Oracle VM Security Advisory OVMSA-2020-0044 for details.", "cvss3": {}, "published": "2020-10-12T00:00:00", "type": "nessus", "title": "OracleVM 3.4 : Unbreakable / etc (OVMSA-2020-0044)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10905", "CVE-2016-10906", "CVE-2017-16528", "CVE-2017-16644", "CVE-2017-8924", "CVE-2017-8925", "CVE-2018-16884", "CVE-2018-20856", "CVE-2018-9415", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11487", "CVE-2019-14898", "CVE-2019-15218", "CVE-2019-15505", "CVE-2019-15927", "CVE-2019-16746", "CVE-2019-17075", "CVE-2019-18885", "CVE-2019-19049", "CVE-2019-19052", "CVE-2019-19062", "CVE-2019-19073", "CVE-2019-19535", "CVE-2019-19768", "CVE-2019-19965", "CVE-2019-20054", "CVE-2019-20096", "CVE-2019-20811", "CVE-2019-20812", "CVE-2019-3846", "CVE-2019-3874", "CVE-2019-5108", "CVE-2019-6974", "CVE-2019-7221", "CVE-2019-7222", "CVE-2020-10720", "CVE-2020-10732", "CVE-2020-10751", "CVE-2020-10769", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-1749", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285"], "modified": "2020-10-15T00:00:00", "cpe": ["p-cpe:/a:oracle:vm:kernel-uek", "p-cpe:/a:oracle:vm:kernel-uek-firmware", "cpe:/o:oracle:vm_server:3.4"], "id": "ORACLEVM_OVMSA-2020-0044.NASL", "href": "https://www.tenable.com/plugins/nessus/141374", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2020-0044.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(141374);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/10/15\");\n\n script_cve_id(\"CVE-2016-10905\", \"CVE-2016-10906\", \"CVE-2017-16528\", \"CVE-2017-16644\", \"CVE-2017-8924\", \"CVE-2017-8925\", \"CVE-2018-16884\", \"CVE-2018-20856\", \"CVE-2018-9415\", \"CVE-2019-10638\", \"CVE-2019-10639\", \"CVE-2019-11487\", \"CVE-2019-14898\", \"CVE-2019-15218\", \"CVE-2019-15505\", \"CVE-2019-15927\", \"CVE-2019-16746\", \"CVE-2019-17075\", \"CVE-2019-18885\", \"CVE-2019-19049\", \"CVE-2019-19052\", \"CVE-2019-19062\", \"CVE-2019-19073\", \"CVE-2019-19535\", \"CVE-2019-19768\", \"CVE-2019-19965\", \"CVE-2019-20054\", \"CVE-2019-20096\", \"CVE-2019-20811\", \"CVE-2019-20812\", \"CVE-2019-3846\", \"CVE-2019-3874\", \"CVE-2019-5108\", \"CVE-2019-6974\", \"CVE-2019-7221\", \"CVE-2019-7222\", \"CVE-2020-10720\", \"CVE-2020-10732\", \"CVE-2020-10751\", \"CVE-2020-10769\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-1749\", \"CVE-2020-25212\", \"CVE-2020-25284\", \"CVE-2020-25285\");\n\n script_name(english:\"OracleVM 3.4 : Unbreakable / etc (OVMSA-2020-0044)\");\n script_summary(english:\"Checks the RPM output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote OracleVM host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates : please see Oracle VM Security Advisory\nOVMSA-2020-0044 for details.\"\n );\n # https://oss.oracle.com/pipermail/oraclevm-errata/2020-October/001000.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?ea0c3926\"\n );\n # https://oss.oracle.com/pipermail/oraclevm-errata/2020-October/001002.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?d3070470\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel-uek / kernel-uek-firmware packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/10/12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"3\\.4\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.4\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS3.4\", reference:\"kernel-uek-4.1.12-124.43.4.el6uek\")) flag++;\nif (rpm_check(release:\"OVS3.4\", reference:\"kernel-uek-firmware-4.1.12-124.43.4.el6uek\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-uek / kernel-uek-firmware\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-11-29T19:36:43", "description": "The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2021-9473 advisory.\n\n - In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931. (CVE-2018-9517)\n\n - A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs.\n As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it is possible for the specified target task to perform an execve() syscall with setuid execution before perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged execve() calls. This issue affects kernel versions before 4.8. (CVE-2019-3901)\n\n - A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.\n (CVE-2019-19074)\n\n - Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113. (CVE-2019-19063)\n\n - A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd. (CVE-2019-19066)\n\n - An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails. (CVE-2020-12771)\n\n - Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory entry lists. (CVE-2019-10220)\n\n - In fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of service (NULL pointer dereference and BUG) because a required mutex is not used. (CVE-2017-18216)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-10-08T00:00:00", "type": "nessus", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2021-9473)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-18216", "CVE-2018-9517", "CVE-2019-10220", "CVE-2019-19063", "CVE-2019-19066", "CVE-2019-19074", "CVE-2019-3901", "CVE-2020-12771"], "modified": "2023-11-28T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-firmware"], "id": "ORACLELINUX_ELSA-2021-9473.NASL", "href": "https://www.tenable.com/plugins/nessus/153964", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2021-9473.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(153964);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/11/28\");\n\n script_cve_id(\n \"CVE-2017-18216\",\n \"CVE-2018-9517\",\n \"CVE-2019-3901\",\n \"CVE-2019-10220\",\n \"CVE-2019-19063\",\n \"CVE-2019-19066\",\n \"CVE-2019-19074\",\n \"CVE-2020-12771\"\n );\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2021-9473)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2021-9473 advisory.\n\n - In pppol2tp_connect, there is possible memory corruption due to a use after free. This could lead to local\n escalation of privilege with System execution privileges needed. User interaction is not needed for\n exploitation. Product: Android. Versions: Android kernel. Android ID: A-38159931. (CVE-2018-9517)\n\n - A race condition in perf_event_open() allows local attackers to leak sensitive data from setuid programs.\n As no relevant locks (in particular the cred_guard_mutex) are held during the ptrace_may_access() call, it\n is possible for the specified target task to perform an execve() syscall with setuid execution before\n perf_event_alloc() actually attaches to it, allowing an attacker to bypass the ptrace_may_access() check\n and the perf_event_exit_task(current) call that is performed in install_exec_creds() during privileged\n execve() calls. This issue affects kernel versions before 4.8. (CVE-2019-3901)\n\n - A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4.\n (CVE-2019-19074)\n\n - Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the\n Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka\n CID-3f9361695113. (CVE-2019-19063)\n\n - A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel\n through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering\n bfa_port_get_stats() failures, aka CID-0e62395da2bd. (CVE-2019-19066)\n\n - An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c\n has a deadlock if a coalescing operation fails. (CVE-2020-12771)\n\n - Linux kernel CIFS implementation, version 4.9.0 is vulnerable to a relative paths injection in directory\n entry lists. (CVE-2019-10220)\n\n - In fs/ocfs2/cluster/nodemanager.c in the Linux kernel before 4.15, local users can cause a denial of\n service (NULL pointer dereference and BUG) because a required mutex is not used. (CVE-2017-18216)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2021-9473.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-10220\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/04/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/10/08\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/10/08\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 6 / 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\nif ('x86_64' >!< cpu) audit(AUDIT_ARCH_NOT, 'x86_64', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.1.12-124.56.1.el6uek', '4.1.12-124.56.1.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2021-9473');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.1';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.1.12-124.56.1.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.56.1.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.56.1.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.56.1.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.56.1.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.56.1.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'},\n {'reference':'kernel-uek-4.1.12-124.56.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.56.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.56.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.56.1.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.56.1.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.56.1.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-08-17T15:54:57", "description": "The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2020-5866 advisory.\n\n - In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free. (CVE-2019-6974)\n\n - The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free. (CVE-2019-7221)\n\n - The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak. (CVE-2019-7222)\n\n - A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after- free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2018-16884)\n\n - A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network. (CVE-2019-3846)\n\n - The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after- free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests. (CVE-2019-11487)\n\n - An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an\n __blk_drain_queue() use-after-free because a certain error case is mishandled. (CVE-2018-20856)\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable. (CVE-2019-3874)\n\n - The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could use this flaw to obtain sensitive information, cause a denial of service, or possibly have other unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.\n (CVE-2019-14898)\n\n - In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e. (CVE-2019-20054)\n\n - An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow. (CVE-2019-16746)\n\n - In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub- buffer). (CVE-2019-19768)\n\n - In the Linux kernel through 5.4.6, there is a NULL pointer dereference in drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related to a PHY down race condition, aka CID-f70267f379b5. (CVE-2019-19965)\n\n - In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which may cause denial of service, aka CID-1d3ff0950e2b. (CVE-2019-20096)\n\n - A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this vulnerability is to data confidentiality. (CVE-2020-1749)\n\n - Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10. (CVE-2019-19073)\n\n - drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via crafted USB device traffic (which may be remote via usbip or usbredir). (CVE-2019-15505)\n\n - An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain failure case involving TPACKET_V3, aka CID-b43d1f9f7067. (CVE-2019-20812)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka CID-09ba3bc9dd15. (CVE-2019-18885)\n\n - A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of service. (CVE-2020-10769)\n\n - A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing. (CVE-2020-10751)\n\n - An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations before the required authentication process has completed. This could lead to different denial-of-service scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge Authentication and Association Request packets to trigger this vulnerability. (CVE-2019-5108)\n\n - An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable.\n This could allow an attacker to trigger a Denial of Service, exploitable if this driver is used on an architecture for which this stack/DMA interaction has security relevance. (CVE-2019-17075)\n\n - An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the drivers/media/usb/siano/smsusb.c driver. (CVE-2019-15218)\n\n - A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-fb5be6a7b486. (CVE-2019-19052)\n\n - An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by the functions gfs2_clear_rgrpd and read_rindex_entry. (CVE-2016-10905)\n\n - An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use- after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.\n (CVE-2016-10906)\n\n - The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling.\n (CVE-2017-8925)\n\n - A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash the system if the directory exists. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14314)\n\n - sound/core/seq_device.c in the Linux kernel before 4.13.4 allows local users to cause a denial of service (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a crafted USB device. (CVE-2017-16528)\n\n - The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer underflow. (CVE-2017-8924)\n\n - In driver_override_store and driver_override_show of bus.c, there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android ID: A-69129004 References: Upstream kernel. (CVE-2018-9415)\n\n - An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c. (CVE-2019-15927)\n\n - A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an attacker with local access to crash the system. (CVE-2020-10720)\n\n - A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452. (CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified other impact, aka CID-17743798d812. (CVE-2020-25285)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2020-10-06T00:00:00", "type": "nessus", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2020-5866)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2016-10905", "CVE-2016-10906", "CVE-2017-16528", "CVE-2017-8924", "CVE-2017-8925", "CVE-2018-16884", "CVE-2018-20856", "CVE-2018-9415", "CVE-2019-11487", "CVE-2019-11599", "CVE-2019-14898", "CVE-2019-15218", "CVE-2019-15505", "CVE-2019-15927", "CVE-2019-16746", "CVE-2019-17075", "CVE-2019-18885", "CVE-2019-19052", "CVE-2019-19073", "CVE-2019-19768", "CVE-2019-19965", "CVE-2019-20054", "CVE-2019-20096", "CVE-2019-20812", "CVE-2019-3846", "CVE-2019-3874", "CVE-2019-5108", "CVE-2019-6974", "CVE-2019-7221", "CVE-2019-7222", "CVE-2020-10720", "CVE-2020-10751", "CVE-2020-10769", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-1749", "CVE-2020-25212", "CVE-2020-25284", "CVE-2020-25285"], "modified": "2021-09-08T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-firmware"], "id": "ORACLELINUX_ELSA-2020-5866.NASL", "href": "https://www.tenable.com/plugins/nessus/141207", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2020-5866.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(141207);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/09/08\");\n\n script_cve_id(\n \"CVE-2016-10905\",\n \"CVE-2016-10906\",\n \"CVE-2017-8924\",\n \"CVE-2017-8925\",\n \"CVE-2017-16528\",\n \"CVE-2018-9415\",\n \"CVE-2018-16884\",\n \"CVE-2018-20856\",\n \"CVE-2019-3846\",\n \"CVE-2019-3874\",\n \"CVE-2019-5108\",\n \"CVE-2019-6974\",\n \"CVE-2019-7221\",\n \"CVE-2019-7222\",\n \"CVE-2019-11487\",\n \"CVE-2019-14898\",\n \"CVE-2019-15218\",\n \"CVE-2019-15505\",\n \"CVE-2019-15927\",\n \"CVE-2019-16746\",\n \"CVE-2019-17075\",\n \"CVE-2019-18885\",\n \"CVE-2019-19052\",\n \"CVE-2019-19073\",\n \"CVE-2019-19768\",\n \"CVE-2019-19965\",\n \"CVE-2019-20054\",\n \"CVE-2019-20096\",\n \"CVE-2019-20812\",\n \"CVE-2020-1749\",\n \"CVE-2020-10720\",\n \"CVE-2020-10751\",\n \"CVE-2020-10769\",\n \"CVE-2020-14314\",\n \"CVE-2020-14331\",\n \"CVE-2020-25212\",\n \"CVE-2020-25284\",\n \"CVE-2020-25285\"\n );\n script_bugtraq_id(\n 98451,\n 98462,\n 106253,\n 106963,\n 107127,\n 107294,\n 107488,\n 108054,\n 108521\n );\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2020-5866)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2020-5866 advisory.\n\n - In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference\n counting because of a race condition, leading to a use-after-free. (CVE-2019-6974)\n\n - The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free. (CVE-2019-7221)\n\n - The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak. (CVE-2019-7222)\n\n - A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network\n namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-\n free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system\n panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2018-16884)\n\n - A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the\n mwifiex kernel module while connecting to a malicious wireless network. (CVE-2019-3846)\n\n - The Linux kernel before 5.1-rc5 allows page->_refcount reference count overflow, with resultant use-after-\n free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c,\n include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can\n occur with FUSE requests. (CVE-2019-11487)\n\n - An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an\n __blk_drain_queue() use-after-free because a certain error case is mishandled. (CVE-2018-20856)\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An\n attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are\n believed to be vulnerable. (CVE-2019-3874)\n\n - The fix for CVE-2019-11599, affecting the Linux kernel before 5.0.10 was not complete. A local user could\n use this flaw to obtain sensitive information, cause a denial of service, or possibly have other\n unspecified impacts by triggering a race condition with mmget_not_zero or get_task_mm calls.\n (CVE-2019-14898)\n\n - In the Linux kernel before 5.0.6, there is a NULL pointer dereference in drop_sysctl_table() in\n fs/proc/proc_sysctl.c, related to put_links, aka CID-23da9588037e. (CVE-2019-20054)\n\n - An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check\n the length of variable elements in a beacon head, leading to a buffer overflow. (CVE-2019-16746)\n\n - In the Linux kernel 5.4.0-rc2, there is a use-after-free (read) in the __blk_add_trace function in\n kernel/trace/blktrace.c (which is used to fill out a blk_io_trace structure and place it in a per-cpu sub-\n buffer). (CVE-2019-19768)\n\n - In the Linux kernel through 5.4.6, there is a NULL pointer dereference in\n drivers/scsi/libsas/sas_discover.c because of mishandling of port disconnection during discovery, related\n to a PHY down race condition, aka CID-f70267f379b5. (CVE-2019-19965)\n\n - In the Linux kernel before 5.1, there is a memory leak in __feat_register_sp() in net/dccp/feat.c, which\n may cause denial of service, aka CID-1d3ff0950e2b. (CVE-2019-20096)\n\n - A flaw was found in the Linux kernel's implementation of some networking protocols in IPsec, such as VXLAN\n and GENEVE tunnels over IPv6. When an encrypted tunnel is created between two hosts, the kernel isn't\n correctly routing tunneled data over the encrypted link; rather sending the data unencrypted. This would\n allow anyone in between the two endpoints to read the traffic unencrypted. The main threat from this\n vulnerability is to data confidentiality. (CVE-2020-1749)\n\n - Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow\n attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout()\n failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the\n htc_connect_service() function, aka CID-853acf7caf10. (CVE-2019-19073)\n\n - drivers/media/usb/dvb-usb/technisat-usb2.c in the Linux kernel through 5.2.9 has an out-of-bounds read via\n crafted USB device traffic (which may be remote via usbip or usbredir). (CVE-2019-15505)\n\n - An issue was discovered in the Linux kernel before 5.4.7. The prb_calc_retire_blk_tmo() function in\n net/packet/af_packet.c can result in a denial of service (CPU consumption and soft lockup) in a certain\n failure case involving TPACKET_V3, aka CID-b43d1f9f7067. (CVE-2019-20812)\n\n - A flaw was found in the Linux kernels implementation of the invert video code on VGA consoles when a\n local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds\n write to occur. This flaw allows a local user with access to the VGA console to crash the system,\n potentially escalating their privileges on the system. The highest threat from this vulnerability is to\n data confidentiality and integrity as well as system availability. (CVE-2020-14331)\n\n - fs/btrfs/volumes.c in the Linux kernel before 5.1 allows a btrfs_verify_dev_extents NULL pointer\n dereference via a crafted btrfs image because fs_devices->devices is mishandled within find_device, aka\n CID-09ba3bc9dd15. (CVE-2019-18885)\n\n - A buffer over-read flaw was found in RH kernel versions before 5.0 in crypto_authenc_extractkeys in\n crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4\n bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat,\n leading to a system crash. This flaw allows a local attacker with user privileges to cause a denial of\n service. (CVE-2020-10769)\n\n - A flaw was found in the Linux kernels SELinux LSM hook implementation before version 5.7, where it\n incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly\n only validate the first netlink message in the skb and allow or deny the rest of the messages within the\n skb with the granted permission without further processing. (CVE-2020-10751)\n\n - An exploitable denial-of-service vulnerability exists in the Linux kernel prior to mainline 5.3. An\n attacker could exploit this vulnerability by triggering AP to send IAPP location updates for stations\n before the required authentication process has completed. This could lead to different denial-of-service\n scenarios, either by causing CAM table attacks, or by leading to traffic flapping if faking already\n existing clients in other nearby APs of the same wireless infrastructure. An attacker can forge\n Authentication and Association Request packets to trigger this vulnerability. (CVE-2019-5108)\n\n - An issue was discovered in write_tpt_entry in drivers/infiniband/hw/cxgb4/mem.c in the Linux kernel\n through 5.3.2. The cxgb4 driver is directly calling dma_map_single (a DMA function) from a stack variable.\n This could allow an attacker to trigger a Denial of Service, exploitable if this driver is used on an\n architecture for which this stack/DMA interaction has security relevance. (CVE-2019-17075)\n\n - An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a\n malicious USB device in the drivers/media/usb/siano/smsusb.c driver. (CVE-2019-15218)\n\n - A memory leak in the gs_can_open() function in drivers/net/can/usb/gs_usb.c in the Linux kernel before\n 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb()\n failures, aka CID-fb5be6a7b486. (CVE-2019-19052)\n\n - An issue was discovered in fs/gfs2/rgrp.c in the Linux kernel before 4.8. A use-after-free is caused by\n the functions gfs2_clear_rgrpd and read_rindex_entry. (CVE-2016-10905)\n\n - An issue was discovered in drivers/net/ethernet/arc/emac_main.c in the Linux kernel before 4.5. A use-\n after-free is caused by a race condition between the functions arc_emac_tx and arc_emac_tx_clean.\n (CVE-2016-10906)\n\n - The omninet_open function in drivers/usb/serial/omninet.c in the Linux kernel before 4.10.4 allows local\n users to cause a denial of service (tty exhaustion) by leveraging reference count mishandling.\n (CVE-2017-8925)\n\n - A memory out-of-bounds read flaw was found in the Linux kernel before 5.9-rc2 with the ext3/ext4 file\n system, in the way it accesses a directory with broken indexing. This flaw allows a local user to crash\n the system if the directory exists. The highest threat from this vulnerability is to system availability.\n (CVE-2020-14314)\n\n - sound/core/seq_device.c in the Linux kernel before 4.13.4 allows local users to cause a denial of service\n (snd_rawmidi_dev_seq_free use-after-free and system crash) or possibly have unspecified other impact via a\n crafted USB device. (CVE-2017-16528)\n\n - The edge_bulk_in_callback function in drivers/usb/serial/io_ti.c in the Linux kernel before 4.10.4 allows\n local users to obtain sensitive information (in the dmesg ringbuffer and syslog) from uninitialized kernel\n memory by using a crafted USB device (posing as an io_ti USB serial device) to trigger an integer\n underflow. (CVE-2017-8924)\n\n - In driver_override_store and driver_override_show of bus.c, there is a possible double free due to\n improper locking. This could lead to local escalation of privilege with System execution privileges\n needed. User interaction is not needed for exploitation. Product: Android Versions: Android kernel Android\n ID: A-69129004 References: Upstream kernel. (CVE-2018-9415)\n\n - An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function\n build_audio_procunit in the file sound/usb/mixer.c. (CVE-2019-15927)\n\n - A flaw was found in the Linux kernel's implementation of GRO in versions before 5.2. This flaw allows an\n attacker with local access to crash the system. (CVE-2020-10720)\n\n - A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers\n to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c\n instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452. (CVE-2020-25212)\n\n - The rbd block device driver in drivers/block/rbd.c in the Linux kernel through 5.8.9 used incomplete\n permission checking for access to rbd devices, which could be leveraged by local attackers to map or unmap\n rbd block devices, aka CID-f44d04e696fe. (CVE-2020-25284)\n\n - A race condition between hugetlb sysctl handlers in mm/hugetlb.c in the Linux kernel before 5.8.8 could be\n used by local attackers to corrupt memory, cause a NULL pointer dereference, or possibly have unspecified\n other impact, aka CID-17743798d812. (CVE-2020-25285)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2020-5866.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-15505\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/10/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/10/06\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 6 / 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\nif ('x86_64' >!< cpu) audit(AUDIT_ARCH_NOT, 'x86_64', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.1.12-124.43.4.el6uek', '4.1.12-124.43.4.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2020-5866');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.1';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.1.12-124.43.4.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.43.4.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.43.4.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.43.4.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.43.4.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.43.4.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'},\n {'reference':'kernel-uek-4.1.12-124.43.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.43.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.43.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.43.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.43.4.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.43.4.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:25:51", "description": "The SUSE Linux Enterprise 15 SP1 realtime kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-12-09T00:00:00", "type": "nessus", "title": "SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2631-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-16166", "CVE-2020-24394"], "modified": "2020-12-11T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt", "p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:dlm-kmp-rt", "p-cpe:/a:novell:suse_linux:dlm-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:gfs2-kmp-rt", "p-cpe:/a:novell:suse_linux:gfs2-kmp-rt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt", "p-cpe:/a:novell:suse_linux:kernel-rt-base", "p-cpe:/a:novell:suse_linux:kernel-rt-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt-debugsource", "p-cpe:/a:novell:suse_linux:kernel-rt-devel", "p-cpe:/a:novell:suse_linux:kernel-rt-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-debugsource", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel", "p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-syms-rt", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt", "p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt-debuginfo", "cpe:/o:novell:suse_linux:15"], "id": "SUSE_SU-2020-2631-1.NASL", "href": "https://www.tenable.com/plugins/nessus/143833", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2631-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(143833);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/12/11\");\n\n script_cve_id(\"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-16166\", \"CVE-2020-24394\");\n\n script_name(english:\"SUSE SLES15 Security Update : kernel (SUSE-SU-2020:2631-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 15 SP1 realtime kernel was updated to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem\nwhich could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions\non new filesystem objects when the filesystem lacks ACL support\n(bsc#1175518).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1074701\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085235\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1087078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102640\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173485\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174161\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174298\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174547\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174887\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174926\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174968\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175064\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175065\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175066\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175067\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175228\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175397\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175399\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175400\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175401\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175402\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175403\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175404\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175406\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175410\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175413\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175414\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175415\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175416\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175417\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175419\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175420\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175421\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175423\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175440\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175493\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175526\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175550\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175654\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175668\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175669\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175670\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175767\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175768\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175786\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175992\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14356/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-24394/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202631-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?15652cc4\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Module for Realtime 15-SP1 :\n\nzypper in -t patch SUSE-SLE-Module-RT-15-SP1-2020-2631=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:cluster-md-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:dlm-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:gfs2-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-rt_debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:ocfs2-kmp-rt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:15\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/07/30\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/14\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/12/09\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES15)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES15\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES15\" && (! preg(pattern:\"^(1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES15 SP1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"cluster-md-kmp-rt-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"dlm-kmp-rt-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"gfs2-kmp-rt-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-base-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-base-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-debugsource-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-devel-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt-devel-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-debugsource-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-devel-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-rt_debug-devel-debuginfo-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"kernel-syms-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-rt-4.12.14-14.31.1\")) flag++;\nif (rpm_check(release:\"SLES15\", sp:\"1\", cpu:\"x86_64\", reference:\"ocfs2-kmp-rt-debuginfo-4.12.14-14.31.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-28T14:15:13", "description": "The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-10T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2582-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14386", "CVE-2020-16166"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-kgraft", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_130-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_130-default-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2582-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140480", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2582-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140480);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14386\", \"CVE-2020-16166\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2582-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP3 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2019-16746: Fixed an improper check of the length of variable\nelements in a beacon head, leading to a buffer overflow (bsc#1152107).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via\nmemory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175228\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1176069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202582-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9dfbd0d4\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud Crowbar 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-Crowbar-8-2020-2582=1\n\nSUSE OpenStack Cloud 8 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-8-2020-2582=1\n\nSUSE Linux Enterprise Server for SAP 12-SP3 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP3-2020-2582=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-2582=1\n\nSUSE Linux Enterprise Server 12-SP3-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2020-2582=1\n\nSUSE Linux Enterprise High Availability 12-SP3 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP3-2020-2582=1\n\nSUSE Enterprise Storage 5 :\n\nzypper in -t patch SUSE-Storage-5-2020-2582=1\n\nHPE Helion Openstack 8 :\n\nzypper in -t patch HPE-Helion-OpenStack-8-2020-2582=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-kgraft\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_130-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_130-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-default-kgraft-4.4.180-94.130.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_130-default-1-4.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_130-default-debuginfo-1-4.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.180-94.130.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-4.4.180-94.130.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-4.4.180-94.130.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-debuginfo-4.4.180-94.130.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debuginfo-4.4.180-94.130.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debugsource-4.4.180-94.130.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-devel-4.4.180-94.130.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-syms-4.4.180-94.130.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-28T14:15:12", "description": "The SUSE Linux Enterprise 12 SP2 kernel was updated to to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2019-16746: Fixed an improper check of the length of variable elements in a beacon head, leading to a buffer overflow (bsc#1152107).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-10T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2576-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14386", "CVE-2020-16166"], "modified": "2021-01-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_141-default", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2576-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140476", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2576-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140476);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14386\", \"CVE-2020-16166\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2576-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP2 kernel was updated to to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2019-16746: Fixed an improper check of the length of variable\nelements in a beacon head, leading to a buffer overflow (bsc#1152107).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via\nmemory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1175691\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1176069\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14314/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-16166/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202576-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9ff56084\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud 7 :\n\nzypper in -t patch SUSE-OpenStack-Cloud-7-2020-2576=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP2-2020-2576=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-2576=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2020-2576=1\n\nSUSE Linux Enterprise High Availability 12-SP2 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP2-2020-2576=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_141-default\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_121-92_141-default-1-3.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.121-92.141.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-4.4.121-92.141.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-4.4.121-92.141.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-debuginfo-4.4.121-92.141.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debuginfo-4.4.121-92.141.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debugsource-4.4.121-92.141.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-devel-4.4.121-92.141.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-syms-4.4.121-92.141.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-21T16:53:16", "description": "It was discovered that a buffer overflow existed in the 802.11 Wi-Fi configuration interface for the Linux kernel when handling beacon settings. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2019-16746)\n\nNicolas Waisman discovered that the WiFi driver stack in the Linux kernel did not properly validate SSID lengths. A physically proximate attacker could use this to cause a denial of service (system crash).\n(CVE-2019-17133)\n\nIt was discovered that the ADIS16400 IIO IMU Driver for the Linux kernel did not properly deallocate memory in certain error conditions.\nA local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19060)\n\nIt was discovered that the Intel OPA Gen1 Infiniband Driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19065)\n\nIt was discovered that the Cascoda CA8210 SPI 802.15.4 wireless controller driver for the Linux kernel did not properly deallocate memory in certain error conditions. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2019-19075)\n\nNicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux kernel performed DMA from a kernel stack. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-17075).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-12-03T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4210-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-17075", "CVE-2019-17133", "CVE-2019-19060", "CVE-2019-19065", "CVE-2019-19075"], "modified": "2023-10-20T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1030-oracle", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1049-gke", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1050-gcp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1051-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1052-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1056-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1065-oem", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1069-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-72-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-72-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-72-lowlatency", "cpe:/o:canonical:ubuntu_linux:16.04:-:lts", "cpe:/o:canonical:ubuntu_linux:18.04:-:lts"], "id": "UBUNTU_USN-4210-1.NASL", "href": "https://www.tenable.com/plugins/nessus/131564", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4210-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131564);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/20\");\n\n script_cve_id(\n \"CVE-2019-16746\",\n \"CVE-2019-17075\",\n \"CVE-2019-17133\",\n \"CVE-2019-19060\",\n \"CVE-2019-19065\",\n \"CVE-2019-19075\"\n );\n script_xref(name:\"USN\", value:\"4210-1\");\n\n script_name(english:\"Ubuntu 16.04 LTS / 18.04 LTS : Linux kernel vulnerabilities (USN-4210-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"It was discovered that a buffer overflow existed in the 802.11 Wi-Fi\nconfiguration interface for the Linux kernel when handling beacon\nsettings. A local attacker could use this to cause a denial of service\n(system crash) or possibly execute arbitrary code. (CVE-2019-16746)\n\nNicolas Waisman discovered that the WiFi driver stack in the Linux\nkernel did not properly validate SSID lengths. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2019-17133)\n\nIt was discovered that the ADIS16400 IIO IMU Driver for the Linux\nkernel did not properly deallocate memory in certain error conditions.\nA local attacker could use this to cause a denial of service (memory\nexhaustion). (CVE-2019-19060)\n\nIt was discovered that the Intel OPA Gen1 Infiniband Driver for the\nLinux kernel did not properly deallocate memory in certain error\nconditions. A local attacker could use this to cause a denial of\nservice (memory exhaustion). (CVE-2019-19065)\n\nIt was discovered that the Cascoda CA8210 SPI 802.15.4 wireless\ncontroller driver for the Linux kernel did not properly deallocate\nmemory in certain error conditions. A local attacker could use this to\ncause a denial of service (memory exhaustion). (CVE-2019-19075)\n\nNicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the\nLinux kernel performed DMA from a kernel stack. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2019-17075).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-4210-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-17133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1030-oracle\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1049-gke\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1050-gcp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1051-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1052-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1056-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1065-oem\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-1069-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-72-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-72-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.15.0-72-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:lts\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:18.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2019-2023 Canonical, Inc. / NASL script (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('16.04' >< os_release || '18.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04 / 18.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '16.04': {\n '4.15.0': {\n 'generic': '4.15.0-72',\n 'generic-lpae': '4.15.0-72',\n 'lowlatency': '4.15.0-72',\n 'oracle': '4.15.0-1030',\n 'gcp': '4.15.0-1050',\n 'aws': '4.15.0-1056'\n }\n },\n '18.04': {\n '4.15.0': {\n 'generic': '4.15.0-72',\n 'generic-lpae': '4.15.0-72',\n 'lowlatency': '4.15.0-72',\n 'oracle': '4.15.0-1030',\n 'gke': '4.15.0-1049',\n 'kvm': '4.15.0-1051',\n 'raspi2': '4.15.0-1052',\n 'aws': '4.15.0-1056',\n 'oem': '4.15.0-1065',\n 'snapdragon': '4.15.0-1069'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-4210-1');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2019-16746', 'CVE-2019-17075', 'CVE-2019-17133', 'CVE-2019-19060', 'CVE-2019-19065', 'CVE-2019-19075');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-4210-1');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:05:59", "description": "The openSUSE Leap 15.1 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-16746: An issue was discovered in net/wireless/nl80211.c where it did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107 1173659).\n\n - CVE-2019-20810: go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c did not call snd_card_free for a failure path, which causes a memory leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where Incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\n - CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\n - CVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on s390/s390x. (bnc#1172999).\n\n - CVE-2020-10781: A zram sysfs resource consumption was fixed. (bnc#1173074).\n\n - CVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer overflow if k_ascii was called several times in a row, aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14331: Fixed a buffer over write in vgacon_scroll (bnc#1174205).\n\n - CVE-2020-14331: Fixed an out of bounds write to the vgacon scrollback buffer (bsc#1174205).\n\n - CVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\n - CVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\nThe following non-security bugs were fixed :\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods (bsc#1111666).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx handling (bsc#1111666).\n\n - ACPI: NFIT: Fix unlock on error in scrub_show() (bsc#1171753).\n\n - ACPI: PM: Avoid using power resources if there are none for D0 (bsc#1051510).\n\n - ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (bsc#1111666).\n\n - ALSA: es1688: Add the missed snd_card_free() (bsc#1051510).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n\n - ALSA: hda: add sienna_cichlid audio asic id for sienna_cichlid up (bsc#1111666).\n\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n\n - ALSA: hda/hdmi - enable runtime pm for newer AMD display audio (bsc#1111666).\n\n - ALSA: hda - let hs_mic be picked ahead of hp_mic (bsc#1111666).\n\n - ALSA: hda/realtek - add a pintbl quirk for several Lenovo machines (bsc#1111666).\n\n - ALSA: hda/realtek - Add LED class support for micmute LED (bsc#1111666).\n\n - ALSA: hda/realtek: Add mute LED and micmute LED support for HP systems (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th gen (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GE63 laptop (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GL63 (bsc#1111666).\n\n - ALSA: hda/realtek - change to suitable link model for ASUS platform (bsc#1111666).\n\n - ALSA: hda/realtek - Check headset type by unplug and resume (bsc#1111666).\n\n - ALSA: hda/realtek - Enable audio jacks of Acer vCopperbox with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer C20-820 with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer Veriton N4660G with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (bsc#1111666).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (bsc#1111666).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (bsc#1111666).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound (bsc#1111666).\n\n - ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th quirk subdevice id (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED GPIO (bsc#1111666).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (bsc#1111666).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n\n - ALSA: lx6464es - add support for LX6464ESe pci express variant (bsc#1111666).\n\n - ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n\n - ALSA: pcm: disallow linking stream to itself (bsc#1111666).\n\n - ALSA: usb-audio: Add duplex sound support for USB devices using implicit feedback (bsc#1111666).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support (bsc#1111666).\n\n - ALSA: usb-audio: add quirk for MacroSilicon MS2109 (bsc#1111666).\n\n - ALSA: usb-audio: Add vendor, product and profile name for HP Thunderbolt Dock (bsc#1111666).\n\n - ALSA: usb-audio: Clean up quirk entries with macros (bsc#1111666).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after resume (bsc#1111666).\n\n - ALSA: usb-audio: Fix packet size calculation (bsc#1111666).\n\n - ALSA: usb-audio: Fix racy list management in output queue (bsc#1111666).\n\n - ALSA: usb-audio: Improve frames size computation (bsc#1111666).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled interfaces (bsc#1111666).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename quirks (bsc#1111666).\n\n - amdgpu: a NULL ->mm does not mean a thread is a kthread (git-fixes).\n\n - arm64: map FDT as RW for early_init_dt_scan() (jsc#SLE-12423).\n\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx (bsc#1111666).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg (bsc#1111666).\n\n - ath9x: Fix stack-out-of-bounds Write in ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE) (networking-stable-20_05_27).\n\n - b43: Fix connection problem with WPA3 (bsc#1111666).\n\n - b43_legacy: Fix connection problem with WPA3 (bsc#1111666).\n\n - bcache: Fix an error code in bch_dump_read() (git fixes (block drivers)).\n\n - be2net: fix link failure after ethtool offline test (git-fixes).\n\n - block: Fix use-after-free in blkdev_get() (bsc#1174843).\n\n - block: nr_sects_write(): Disable preemption on seqcount write (bsc#1173818).\n\n - block: remove QUEUE_FLAG_STACKABLE (git fixes (block drivers)).\n\n - block: sed-opal: fix sparse warning: convert __be64 data (git fixes (block drivers)).\n\n - Bluetooth: Add SCO fallback for invalid LMP parameters error (bsc#1111666).\n\n - bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n\n - bnxt_en: Fix ethtool selftest crash under error conditions (git-fixes).\n\n - bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE cmd fails (git-fixes).\n\n - bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n\n - bnxt_en: fix NULL dereference in case SR-IOV configuration fails (git-fixes).\n\n - bnxt_en: Fix VF anti-spoof filter setup (networking-stable-20_05_12).\n\n - bnxt_en: Fix VLAN acceleration handling in bnxt_fix_features() (networking-stable-20_05_12).\n\n - bnxt_en: Improve AER slot reset (networking-stable-20_05_12).\n\n - brcmfmac: fix wrong location to get firmware feature (bsc#1111666).\n\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).\n\n - btrfs: add new helper btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: Always use a cached extent_state in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n\n - btrfs: do not zero f_bavail if we have available space (bsc#1168081).\n\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n\n - btrfs: fix extent_state leak in btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n\n - btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: Fix a bug that prevents qgroup to be re-enabled after disable (bsc#1172247).\n\n - btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Return EAGAIN if we can't start no snpashot write in check_can_nocow (bsc#1174438).\n\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n\n - btrfs: Use newly introduced btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate() (bsc#1171124).\n\n - bus: hisi_lpc: Add .remove method to avoid driver unbind crash (bsc#1174658).\n\n - bus: hisi_lpc: Do not fail probe for unrecognised child devices (bsc#1174658).\n\n - bus: hisi_lpc: Unregister logical PIO range to avoid potential use-after-free (bsc#1174658).\n\n - bus: sunxi-rsb: Return correct data when mixing 16-bit and 8-bit reads (bsc#1111666).\n\n - carl9170: remove P2P_GO support (bsc#1111666).\n\n - cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: convert mdsc->cap_dirty to a per-session list (bsc#1167104).\n\n - ceph: request expedited service on session's last cap flush (bsc#1167104).\n\n - cgroup, blkcg: Prepare some symbols for module and !CONFIG_CGROUP usages (bsc#1173857).\n\n - char/random: Add a newline at the end of the file (jsc#SLE-12423).\n\n - cifs: get rid of unused parameter in reconn_setup_dfs_targets() (bsc#1144333).\n\n - cifs: handle hostnames that resolve to same ip in failover (bsc#1144333 bsc#1161016).\n\n - cifs: set up next DFS target before generic_ip_connect() (bsc#1144333 bsc#1161016).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate (bsc#1051510).\n\n - clk: clk-flexgen: fix clock-critical handling (bsc#1051510).\n\n - clk: sunxi: Fix incorrect usage of round_down() (bsc#1051510).\n\n - clocksource: dw_apb_timer: Make CPU-affiliation being optional (bsc#1111666).\n\n - compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE (git fixes (block drivers)).\n\n - compat_ioctl: block: handle Persistent Reservations (git fixes (block drivers)).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH References: bsc#1174549\n\n - copy_(to,from)_user(): consolidate object size checks (git fixes).\n\n - crypto: algboss - do not wait during notifier callback (bsc#1111666).\n\n - crypto: algif_skcipher - Cap recv SG list at ctx->used (bsc#1111666).\n\n - crypto: caam - update xts sector size for large input length (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()' when ndevlist is fully iterated (git-fixes).\n\n - crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime (bsc#1111666).\n\n - crypto: rockchip - fix scatterlist nents error (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON() (git-fixes).\n\n - crypto: talitos - check AES key size (git-fixes).\n\n - crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK (git-fixes).\n\n - crypto: talitos - fix IPsec cipher in length (git-fixes).\n\n - crypto: talitos - reorder code in talitos_edesc_alloc() (git-fixes).\n\n - crypto: virtio: Fix src/dst scatterlist calculation in\n __virtio_crypto_skcipher_do_req() (git-fixes).\n\n - debugfs: Check module state before warning in (full/open)_proxy_open() (bsc#1173746).\n\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n\n - dlm: remove BUG() before panic() (bsc#1174844).\n\n - dmaengine: tegra210-adma: Fix an error handling path in 'tegra_adma_probe()' (bsc#1111666).\n\n - dm btree: increase rebalance threshold in __rebalance2() (git fixes (block drivers)).\n\n - dm cache: fix a crash due to incorrect work item cancelling (git fixes (block drivers)).\n\n - dm crypt: fix benbi IV constructor crash if used in authenticated mode (git fixes (block drivers)).\n\n - dm: fix potential for q->make_request_fn NULL pointer (git fixes (block drivers)).\n\n - dm space map common: fix to ensure new block isn't already in use (git fixes (block drivers)).\n\n - dm: various cleanups to md->queue initialization code (git fixes).\n\n - dm verity fec: fix hash block number in verity_fec_decode (git fixes (block drivers)).\n\n - dm verity fec: fix memory leak in verity_fec_dtr (git fixes (block drivers)).\n\n - dpaa_eth: fix usage as DSA master, try 3 (networking-stable-20_05_27).\n\n - driver-core, libnvdimm: Let device subsystems add local lockdep coverage (bsc#1171753)\n\n - Drivers: hv: Change flag to write log level in panic msg to false (bsc#1170617, bsc#1170618).\n\n - drivers: soc: ti: knav_qmss_queue: Make knav_gp_range_ops static (bsc#1051510).\n\n - drm: amd/display: fix Kconfig help text (bsc#1113956) 	* only fix DEBUG_KERNEL_DC\n\n - drm: bridge: adv7511: Extend list of audio sample rates (bsc#1111666).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s (bsc#1113956) * context changes\n\n - drm: encoder_slave: fix refcouting error for modules (bsc#1111666).\n\n - drm: encoder_slave: fix refcouting error for modules (bsc#1114279)\n\n - drm/i915/icl+: Fix hotplug interrupt disabling after storm detection (bsc#1112178)\n\n - drm/i915: Whitelist context-local timestamp in the gen9 cmdparser (bsc#1111666).\n\n - drm/mediatek: Check plane visibility in atomic_update (bsc#1113956) * context changes\n\n - drm/msm/dpu: fix error return code in dpu_encoder_init (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (bsc#1111666).\n\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (bsc#1111666).\n\n - drm/qxl: Use correct notify port address when creating cursor ring (bsc#1113956)\n\n - drm/radeon: fix double free (bsc#1113956)\n\n - drm/radeon: fix fb_div check in ni_init_smc_spll_table() (bsc#1113956)\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider (bsc#1111666).\n\n - drm/tegra: hub: Do not enable orphaned window group (bsc#1111666).\n\n - drm/vkms: Hold gem object while still in-use (bsc#1113956) * context changes\n\n - e1000: Distribute switch variables for initialization (bsc#1111666).\n\n - e1000e: Disable TSO for buffer overrun workaround (bsc#1051510).\n\n - e1000e: Do not wake up the system via WOL if device wakeup is disabled (bsc#1051510).\n\n - e1000e: Relax condition to trigger reset for ME workaround (bsc#1111666).\n\n - EDAC/amd64: Read back the scrub rate PCI register on F15h (bsc#1114279).\n\n - efi/memreserve: deal with memreserve entries in unmapped memory (bsc#1174685).\n\n - efi/random: Increase size of firmware supplied randomness (jsc#SLE-12423).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader randomness (jsc#SLE-12423).\n\n - efi: READ_ONCE rng seed size before munmap (jsc#SLE-12423).\n\n - efi: Reorder pr_notice() with add_device_randomness() call (jsc#SLE-12423).\n\n - evm: Check also if *tfm is an error pointer in init_desc() (bsc#1051510).\n\n - evm: Fix a small race in init_desc() (bsc#1051510).\n\n - ext4: fix a data race at inode->i_blocks (bsc#1171835).\n\n - ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed eh_max (bsc#1174840).\n\n - ext4: fix partial cluster initialization when splitting extent (bsc#1173839).\n\n - ext4: fix race between ext4_sync_parent() and rename() (bsc#1173838).\n\n - ext4, jbd2: ensure panic by fix a race between jbd2 abort and ext4 error handlers (bsc#1173833).\n\n - extcon: adc-jack: Fix an error handling path in 'adc_jack_probe()' (bsc#1051510).\n\n - fanotify: fix ignore mask logic for events on child and on dir (bsc#1172719).\n\n - fat: do not allow to mount if the FAT length == 0 (bsc#1174845).\n\n - fdt: add support for rng-seed (jsc#SLE-12423).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n\n - firmware: imx: scu: Fix corruption of header (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in imx_scu_probe() (bsc#1111666).\n\n - fix multiplication overflow in copy_fdtable() (bsc#1173825).\n\n - Fix Patch-mainline tag in the previous zram fix patch\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks (networking-stable-20_05_12).\n\n - gpiolib: Document that GPIO line names are not globally unique (bsc#1051510).\n\n - gpu: host1x: Detach driver on unregister (bsc#1111666).\n\n - gpu: ipu-v3: pre: do not trigger update if buffer address does not change (bsc#1111666).\n\n - HID: hiddev: fix mess in hiddev_open() (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles (bsc#1051510).\n\n - HISI LPC: Re-Add ACPI child enumeration support (bsc#1174658).\n\n - HISI LPC: Stop using MFD APIs (bsc#1174658).\n\n - hv_netvsc: Fix netvsc_start_xmit's return type (git-fixes).\n\n - hwmon: (acpi_power_meter) Fix potential memory leak in acpi_power_meter_add() (bsc#1111666).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (bsc#1111666).\n\n - hwmon: (max6697) Make sure the OVERT mask is set correctly (bsc#1111666).\n\n - i2c: algo-pca: Add 0x78 as SCL stuck low status for PCA9665 (bsc#1111666).\n\n - i2c: eg20t: Load module automatically if ID matches (bsc#1111666).\n\n - i2c: mlxcpld: check correct size of maximum RECV_LEN packet (bsc#1111666).\n\n - i40e: reduce stack usage in i40e_set_fc (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011 ltc#183538).\n\n - iio: buffer: Do not allow buffers without any channels enabled to be activated (bsc#1051510).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak (bsc#1111666).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues (bsc#1111666).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak issues (bsc#1111666).\n\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (bsc#1111666).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering (bsc#1051510).\n\n - iio:pressure:ms5611 Fix buffer element alignment (bsc#1111666).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (bsc#1111666).\n\n - ima: Directly assign the ima_default_policy pointer to ima_rules (bsc#1051510).\n\n - ima: Fix ima digest hash table key calculation (bsc#1051510).\n\n - include/asm-generic/topology.h: guard cpumask_of_node() macro argument (bsc#1148868).\n\n - input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (bsc#1111666).\n\n - input: i8042 - Remove special PowerPC handling (git-fixes).\n\n - input: synaptics - add a second working PNP_ID for Lenovo T470s (bsc#1111666).\n\n - intel_idle: Graceful probe failure when MWAIT is disabled (bsc#1174115).\n\n - intel_th: Fix a NULL dereference when hub driver is not loaded (bsc#1111666).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - ipvlan: call dev_change_flags when ipvlan mode is reset (git-fixes).\n\n - ixgbevf: Remove limit of 10 entries for unicast filter list (git-fixes).\n\n - jbd2: avoid leaking transaction credits when unreserving handle (bsc#1173845).\n\n - jbd2: Preserve kABI when adding j_abort_mutex (bsc#1173833).\n\n - kabi: hv: prevent struct device_node to become defined (bsc#1172871).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become defined (jsc#SLE-12423).\n\n - kABI: protect struct mlx5_cmd_work_ent (kabi).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n\n - kernfs: fix barrier usage in __kernfs_new_node() (bsc#1111666).\n\n - kvm: nVMX: Do not reread VMCS-agnostic state when switching VMCS (bsc#1114279).\n\n - kvm: nVMX: Skip IBPB when switching between vmcs01 and vmcs02 (bsc#1114279).\n\n - kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n\n - kvm: x86: Fix L1TF mitigation for shadow MMU (bsc#1171904).\n\n - kvm: x86/mmu: Set mmio_value to '0' if reserved #PF can't be generated (bsc#1171904).\n\n - kvm: x86: only do L1TF workaround on affected processors (bsc#1171904).\n\n - l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n\n - libceph: do not omit recovery_deletes in target_copy() (bsc#1174113).\n\n - libceph: ignore pool overlay and cache logic on redirects (bsc#1173146).\n\n - lib: logic_pio: Add logic_pio_unregister_range() (bsc#1174658).\n\n - lib: logic_pio: Avoid possible overlap for unregistering regions (bsc#1174658).\n\n - lib: logic_pio: Fix RCU usage (bsc#1174658).\n\n - libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA deadlock (bsc#1171753).\n\n - libnvdimm/bus: Prepare the nd_ioctl() path to be re-entrant (bsc#1171753).\n\n - libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over\n __nd_ioctl() (bsc#1171753).\n\n - libnvdimm: cover up changes in struct nvdimm_bus (bsc#1171753).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm/dax: Pick the right alignment default when creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check (bsc#1171759).\n\n - libnvdimm/of_pmem: Provide a unique name for bus provider (bsc#1171739).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific probe errors (bsc#1171743).\n\n - libnvdimm/region: Initialize bad block for volatile namespaces (bnc#1151927 5.3.6).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align check (bsc#1171759).\n\n - livepatch: Apply vmlinux-specific KLP relocations early (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - loop: replace kill_bdev with invalidate_bdev (bsc#1173820).\n\n - lpfc_debugfs: get rid of pointless access_ok() (bsc#1172687 bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver devloss_tmo (bcs#1173060).\n\n - mac80211: add option for setting control flags (bsc#1111666).\n\n - mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for nl80211 TX (bsc#1111666).\n\n - mailbox: imx: Disable the clock on devm_mbox_controller_register() failure (git-fixes).\n\n - md: Avoid namespace collision with bitmap API (git fixes (block drivers)).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - md: use memalloc scope APIs in mddev_suspend()/mddev_resume() (bsc#1166985)).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: si2157: Better check for running tuner in init (bsc#1111666).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered workqueue (git-fixes).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw workqueue (git-fixes).\n\n - mlxsw: pci: Return error on PCI reset timeout (git-fixes).\n\n - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion list properly (networking-stable-20_05_12).\n\n - mlxsw: spectrum: Disallow prio-tagged packets when PVID is removed (git-fixes).\n\n - mlxsw: spectrum_dpipe: Add missing error path (git-fixes).\n\n - mlxsw: spectrum: Prevent force of 56G (git-fixes).\n\n - mlxsw: spectrum_router: Refresh nexthop neighbour when it becomes dead (git-fixes).\n\n - mlxsw: spectrum_router: Remove inappropriate usage of WARN_ON() (git-fixes).\n\n - mlxsw: spectrum_switchdev: Add MDB entries in prepare phase (git-fixes).\n\n - mlxsw: spectrum_switchdev: Do not treat static FDB entries as sticky (git-fixes).\n\n - mmc: block: Fix request completion in the CQE timeout path (bsc#1111666).\n\n - mmc: block: Fix use-after-free issue for rpmb (bsc#1111666).\n\n - mmc: fix compilation of user API (bsc#1051510).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type (bsc#1111666).\n\n - mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12 quirk (bsc#1111666).\n\n - Move kabi patch into the right place\n\n - Move upstreamed lpfc patches into sorted section\n\n - mvpp2: remove misleading comment (git-fixes).\n\n - net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n\n - net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n\n - net/cxgb4: Check the return from t4_query_params properly (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: dsa: loop: Add module soft dependency (networking-stable-20_05_16).\n\n - net: dsa: mt7530: fix roaming from DSA user ports (networking-stable-20_05_27).\n\n - net: ena: add intr_moder_rx_interval to struct ena_com_dev and use it (git-fixes).\n\n - net: ena: add missing ethtool TX timestamping indication (git-fixes).\n\n - net: ena: avoid memory access violation by validating req_id properly (git-fixes).\n\n - net: ena: do not wake up tx queue when down (git-fixes).\n\n - net: ena: ena-com.c: prevent NULL pointer dereference (git-fixes).\n\n - net: ena: ethtool: use correct value for crc32 hash (git-fixes).\n\n - net: ena: fix continuous keep-alive resets (git-fixes).\n\n - net: ena: fix corruption of dev_idx_to_host_tbl (git-fixes).\n\n - net: ena: fix default tx interrupt moderation interval (git-fixes).\n\n - net: ena: fix incorrect default RSS key (git-fixes).\n\n - net: ena: fix incorrectly saving queue numbers when setting RSS indirection table (git-fixes).\n\n - net: ena: fix issues in setting interrupt moderation params in ethtool (git-fixes).\n\n - net: ena: fix potential crash when rxfh key is NULL (git-fixes).\n\n - net: ena: fix retrieval of nonadaptive interrupt moderation intervals (git-fixes).\n\n - net: ena: fix uses of round_jiffies() (git-fixes).\n\n - net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE (git-fixes).\n\n - net: ena: reimplement set/get_coalesce() (git-fixes).\n\n - net: ena: rss: do not allocate key when not supported (git-fixes).\n\n - net: ena: rss: fix failure to get indirection table (git-fixes).\n\n - net: ena: rss: store hash function as values and not bits (git-fixes).\n\n - netfilter: connlabels: prefer static lock initialiser (git-fixes).\n\n - netfilter: ctnetlink: netns exit must wait for callbacks (bsc#1169795).\n\n - netfilter: not mark a spinlock as __read_mostly (git-fixes).\n\n - net: fix a potential recursive NETDEV_FEAT_CHANGE (networking-stable-20_05_16).\n\n - net: hns3: add autoneg and change speed support for fibre port (bsc#1174070).\n\n - net: hns3: add support for FEC encoding control (bsc#1174070).\n\n - net: hns3: add support for multiple media type (bsc#1174070).\n\n - net: hns3: fix a not link up issue when fibre port supports autoneg (bsc#1174070).\n\n - net: hns3: fix for FEC configuration (bsc#1174070).\n\n - net: hns3: fix port capbility updating issue (bsc#1174070).\n\n - net: hns3: fix port setting handle for fibre port (bsc#1174070).\n\n - net: hns3: fix selftest fail issue for fibre port with autoneg on (bsc#1174070).\n\n - net: hns3: restore the MAC autoneg state after reset (bsc#1174070).\n\n - net: inet_csk: Fix so_reuseport bind-address cache in tb->fast* (networking-stable-20_05_27).\n\n - net: ipip: fix wrong address family in init error path (networking-stable-20_05_27).\n\n - net: ipvlan: Fix ipvlan device tso disabled while NETIF_F_IP_CSUM is set (git-fixes).\n\n - net: macsec: preserve ingress frame ordering (networking-stable-20_05_12).\n\n - net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n\n - net/mlx4_core: fix a memory leak bug (git-fixes).\n\n - net/mlx4_core: Fix use of ENOSPC around mlx4_counter_alloc() (networking-stable-20_05_12).\n\n - net/mlx5: Add command entry handling completion (networking-stable-20_05_27).\n\n - net/mlx5: Avoid panic when setting vport rate (git-fixes).\n\n - net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n\n - net/mlx5e: ethtool, Fix a typo in WOL function names (git-fixes).\n\n - net/mlx5e: Fix traffic duplication in ethtool steering (git-fixes).\n\n - net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n\n - net/mlx5e: Update netdev txq on completions during closure (networking-stable-20_05_27).\n\n - net/mlx5: Fix command entry leak in Internal Error State (networking-stable-20_05_12).\n\n - net/mlx5: Fix crash upon suspend/resume (networking-stable-20_06_07).\n\n - net/mlx5: Fix forced completion access non initialized command entry (networking-stable-20_05_12).\n\n - net: mvmdio: allow up to four clocks to be specified for orion-mdio (git-fixes).\n\n - net: mvpp2: prs: Do not override the sign bit in SRAM parser shift (git-fixes).\n\n - net: phy: fix aneg restart in phy_ethtool_set_eee (networking-stable-20_05_16).\n\n - netprio_cgroup: Fix unlimited memory leak of v2 cgroups (networking-stable-20_05_16).\n\n - net: qede: stop adding events on an already destroyed workqueue (git-fixes).\n\n - net: qed: fix excessive QM ILT lines consumption (git-fixes).\n\n - net: qed: fix NVMe login fails over VFs (git-fixes).\n\n - net: qrtr: Fix passing invalid reference to qrtr_local_enqueue() (networking-stable-20_05_27).\n\n - net: revert 'net: get rid of an signed integer overflow in ip_idents_reserve()' (networking-stable-20_05_27).\n\n - net sched: fix reporting the first-time use timestamp (networking-stable-20_05_27).\n\n - net: stricter validation of untrusted gso packets (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak in bpf_exec_tx_verdict() (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak when in tls_data_ready() (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add support for DW5816e (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add Telit 0x1050 composition (networking-stable-20_06_07).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K (git-fixes).\n\n - NFS: Fix an RCU lock leak in nfs4_refresh_delegation_stateid() (bsc#1170592).\n\n - NFSv4: Retry CLOSE and DELEGRETURN on NFS4ERR_OLD_STATEID (bsc#1170592).\n\n - nilfs2: fix NULL pointer dereference at nilfs_segctor_do_construct() (bsc#1173857).\n\n - nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type (bsc#1111666).\n\n - nvdimm: Avoid race between probe and reading device attributes (bsc#1170442).\n\n - nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids() (bcs#1171558 bsc#1159058).\n\n - nvme: do not update multipath disk information if the controller is down (bcs#1171558 bsc#1159058).\n\n - nvme: fail cancelled commands with NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n\n - nvme-fc: Fail transport errors with NVME_SC_HOST_PATH (bsc#1158983 bsc#1172538).\n\n - nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send failed (bsc#1158983 bsc#1172538).\n\n - objtool: Clean instruction state before each function validation (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - ocfs2: no need try to truncate file beyond i_size (bsc#1171841).\n\n - overflow: Fix -Wtype-limits compilation warnings (git fixes).\n\n - overflow.h: Add arithmetic shift helper (git fixes).\n\n - p54usb: add AirVasT USB stick device-id (bsc#1051510).\n\n - padata: ensure the reorder timer callback runs on the correct CPU (git-fixes).\n\n - padata: reorder work kABI fixup (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n\n - PCI: Allow pci_resize_resource() for devices on root bus (bsc#1051510).\n\n - PCI: Fix pci_register_host_bridge() device_register() error handling (bsc#1051510).\n\n - PCI: Fix 'try' semantics of bus and slot reset (git-fixes).\n\n - PCI: Generalize multi-function power dependency device links (bsc#1111666).\n\n - PCI: hv: Change pci_protocol_version to per-hbus (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Fix the PCI HyperV probe failure path to release resource properly (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Introduce hv_msi_entry (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Move hypercall related definitions into tlfs header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Move retarget related structures into tlfs header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Reorganize the code in preparation of hibernation (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Retry PCI bus D0 entry on invalid device state (bsc#1172871, bsc#1172872).\n\n - PCI: pciehp: Fix indefinite wait on sysfs requests (git-fixes).\n\n - PCI: pciehp: Support interrupts sent from D3hot (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (bsc#1051510).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings from Upstream Port (bsc#1051510).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n\n - pcm_native: result of put_user() needs to be checked (bsc#1111666).\n\n - perf/x86/amd: Constrain Large Increment per Cycle events (git-fixes).\n\n - perf/x86/amd/ibs: Fix reading of the IBS OpData register and thus precise RIP validity (git-fixes).\n\n - perf/x86/amd/ibs: Fix sample bias for dispatched micro-ops (git-fixes).\n\n - perf/x86/amd/ibs: Handle erratum #420 only on the affected CPU family (10h) (git-fixes).\n\n - perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups' symbol static (git-fixes).\n\n - perf/x86/amd/uncore: Do not set 'ThreadMask' and 'SliceMask' for non-L3 PMCs (git-fixes stable).\n\n - perf/x86/amd/uncore: Set the thread mask for F17h L3 PMCs (git-fixes).\n\n - perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3 Cache perf events (git-fixes stable).\n\n - perf/x86: Enable free running PEBS for REGS_USER/INTR (git-fixes).\n\n - perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n\n - perf/x86/intel: Add generic branch tracing check to intel_pmu_has_bts() (git-fixes).\n\n - perf/x86/intel: Add proper condition to run sched_task callbacks (git-fixes).\n\n - perf/x86/intel/bts: Fix the use of page_private() (git-fixes).\n\n - perf/x86/intel: Fix PT PMI handling (git-fixes).\n\n - perf/x86/intel: Move branch tracing setup to the Intel-specific source file (git-fixes).\n\n - perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n\n - perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on SKX (git-fixes).\n\n - perf/x86/intel/uncore: Handle invalid event coding for free-running counter (git-fixes).\n\n - perf/x86/uncore: Fix event group support (git-fixes).\n\n - pid: Improve the comment about waiting in zap_pid_ns_processes (git fixes)).\n\n - pinctrl: freescale: imx: Fix an error handling path in 'imx_pinctrl_probe()' (bsc#1051510).\n\n - pinctrl: imxl: Fix an error handling path in 'imx1_pinctrl_core_probe()' (bsc#1051510).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend for EINT_TYPE GPIOs (bsc#1051510).\n\n - platform/x86: dell-laptop: do not register micmute LED if there is no token (bsc#1111666).\n\n - platform/x86: hp-wmi: Convert simple_strtoul() to kstrtou32() (bsc#1111666).\n\n - PM / Domains: Allow genpd users to specify default active wakeup behavior (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding (git fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR (bsc#1065729).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage() related functions (bsc#1171759).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n\n - powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n\n - powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.pat ch\n\n - powerpc/xive: Clear the page tables for the ESB IO mapping (bsc#1085030).\n\n - powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n\n - power: supply: bq24257_charger: Replace depends on REGMAP_I2C with select (bsc#1051510).\n\n - power: supply: lp8788: Fix an error handling path in 'lp8788_charger_probe()' (bsc#1051510).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile (bsc#1051510).\n\n - power: vexpress: add suppress_bind_attrs to true (bsc#1111666).\n\n - pppoe: only process PADT targeted at local interfaces (networking-stable-20_05_16).\n\n - propagate_one(): mnt_set_mountpoint() needs mount_lock (bsc#1174841).\n\n - qed: reduce maximum stack frame size (git-fixes).\n\n - qlcnic: fix missing release in qlcnic_83xx_interrupt_test (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet Adapter variant (networking-stable-20_05_27).\n\n - raid5: remove gfp flags from scribble_alloc() (bsc#1166985).\n\n - RDMA/efa: Fix setting of wrong bit in get/set_feature commands (bsc#1111666)\n\n - RDMA/efa: Set maximum pkeys device attribute (bsc#1111666)\n\n - RDMA/efa: Support remote read access in MR registration (bsc#1111666)\n\n - RDMA/efa: Unified getters/setters for device structs bitmask access (bsc#1111666)\n\n - README.BRANCH: Add Takashi Iwai as primary maintainer.\n\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps (bsc#1111666).\n\n - Revert 'bcache: ignore pending signals when creating gc and allocator thread' (git fixes (block drivers)).\n\n - Revert commit e918e570415c ('tpm_tis: Remove the HID IFX0102') (bsc#1111666).\n\n - Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt workqueues' (git fixes (block drivers)).\n\n - Revert 'ipv6: add mtu lock check in\n __ip6_rt_update_pmtu' (networking-stable-20_05_16).\n\n - Revert pciehp patches that broke booting (bsc#1174887)\n\n - Revert 'thermal: mediatek: fix register index error' (bsc#1111666).\n\n - Revert 'tools lib traceevent: Remove unneeded qsort and uses memmove'\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n\n - s390: fix syscall_get_error for compat processes (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n\n - s390/qdio: lock device while installing IRQ handler (git-fixes).\n\n - s390/qdio: put thinint indicator after early error (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n\n - sch_choke: avoid potential panic in choke_reset() (networking-stable-20_05_12).\n\n - sch_sfq: validate silly quantum values (networking-stable-20_05_12).\n\n - scripts/git_sort/git_sort.py: add bluetooth/bluetooth-next.git repository\n\n - scsi: aacraid: fix a signedness bug (bsc#1174296).\n\n - scsi: hisi_sas: fix calls to dma_set_mask_and_coherent() (bsc#1174296).\n\n - scsi: ibmvscsi: Do not send host info in adapter info MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Add an internal trace log buffer (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add blk_io_poll support for latency improvment (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add support to display if adapter dumps are available (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Allow applications to issue Common Set Features mailbox command (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Avoid another null dereference in lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n\n - scsi: lpfc: Fix interrupt assignments when multiple vectors are supported on same CPU (bsc#1158983).\n\n - scsi: lpfc: Fix kdump hang on PPC (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix language in 0373 message to reflect non-error message (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix less-than-zero comparison of unsigned value (bsc#1158983).\n\n - scsi: lpfc: Fix missing MDS functionality (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix NVMe rport deregister and registration during ADISC (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix oops due to overrun when reading SLI3 data (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix shost refcount mismatch when deleting vport (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix stack trace seen while setting rrq active (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix unused assignment in lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.2 (bsc#1158983).\n\n - scsi: megaraid_sas: Fix a compilation warning (bsc#1174296).\n\n - scsi: mpt3sas: Fix double free in attach error handling (bsc#1174296).\n\n - scsi: qedf: Add port_id getter (bsc#1150660).\n\n - scsi: qla2xxx: Fix a condition in qla2x00_find_all_fabric_devs() (bsc#1174296).\n\n - scsi: qla2xxx: Set NVMe status code for failed NVMe FCP request (bsc#1158983).\n\n - sctp: Do not add the shutdown timer if its already been added (networking-stable-20_05_27).\n\n - sctp: Start shutdown on association restart if in SHUTDOWN-SENT state and socket is closed (networking-stable-20_05_27).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error (bsc#1051510).\n\n - spi: fix initial SPI_SR value in spi-fsl-dspi (bsc#1111666).\n\n - spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n\n - spi: spidev: fix a race between spidev_release and spidev_remove (bsc#1111666).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable devices (bsc#1111666).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (bsc#1111666).\n\n - staging: comedi: verify array index is correct before using it (bsc#1111666).\n\n - staging: rtl8712: Fix IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n\n - staging: sm750fb: add missing case while setting FB_VISUAL (bsc#1051510).\n\n - SUNRPC: The TCP back channel mustn't disappear while requests are outstanding (bsc#1152624).\n\n - tg3: driver sleeps indefinitely when EEH errors exceed eeh_max_freezes (bsc#1173284).\n\n - timers: Add a function to start/reduce a timer (networking-stable-20_05_27).\n\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (bsc#1111666).\n\n - tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n\n - tracing: Fix event trigger to accept redundant spaces (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick (bsc#1051510).\n\n - tty: n_gsm: Fix SOF skipping (bsc#1051510).\n\n - tty: n_gsm: Fix waking up upper tty layer when room available (bsc#1051510).\n\n - tunnel: Propagate ECT(1) when decapsulating as recommended by RFC6040 (networking-stable-20_05_12).\n\n - ubifs: remove broken lazytime support (bsc#1173826).\n\n - usb: add USB_QUIRK_DELAY_INIT for Logitech C922 (git-fixes).\n\n - usb: c67x00: fix use after free in c67x00_giveback_urb (bsc#1111666).\n\n - usb: chipidea: core: add wakeup support for extcon (bsc#1111666).\n\n - usb: dwc2: Fix shutdown callback in platform (bsc#1111666).\n\n - usb: dwc2: gadget: move gadget resume after the core is in L0 state (bsc#1051510).\n\n - usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n\n - usb: dwc3: gadget: never call ->complete() from\n ->ep_queue() (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt) (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer (git-fixes).\n\n - usb: ehci: reopen solution for Synopsys HC bug (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe (bsc#1111666).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer before null check (bsc#1051510).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk (bsc#1111666).\n\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (bsc#1111666).\n\n - usb: gadget: udc: Potential Oops in error handling code (bsc#1111666).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL check in s3c2410_udc_nuke (bsc#1051510).\n\n - usb: host: ehci-exynos: Fix error check in exynos_ehci_probe() (bsc#1111666).\n\n - usb: host: ehci-mxc: Add error handling in ehci_mxc_drv_probe() (bsc#1051510).\n\n - usb: musb: Fix runtime PM imbalance on error (bsc#1051510).\n\n - usb: musb: start session in resume for host port (bsc#1051510).\n\n - usbnet: smsc95xx: Fix use-after-free after removal (bsc#1111666).\n\n - usb: ohci-sm501: Add missed iounmap() in remove (bsc#1111666).\n\n - usb: serial: ch341: add new Product ID for CH340 (bsc#1111666).\n\n - usb: serial: cypress_m8: enable Simply Automated UPB PIM (bsc#1111666).\n\n - usb: serial: iuu_phoenix: fix memory corruption (bsc#1111666).\n\n - usb: serial: option: add GosunCn GM500 series (bsc#1111666).\n\n - usb: serial: option: add Quectel EG95 LTE modem (bsc#1111666).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions (bsc#1051510).\n\n - usb: serial: qcserial: add DW5816e QDL support (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal errors (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174123).\n\n - vfs: Fix EOVERFLOW testing in put_compat_statfs64 (bnc#1151927 5.3.6).\n\n - virtio-blk: handle block_device_operations callbacks after hot unplug (git fixes (block drivers)).\n\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - vmxnet3: add geneve and vxlan tunnel offload support (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled (bsc#1172484).\n\n - vmxnet3: avoid format strint overflow warning (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: Remove always false conditional statement (bsc#1172484).\n\n - vmxnet3: remove redundant initialization of pointer 'rq' (bsc#1172484).\n\n - vmxnet3: remove unused flag 'rxcsum' from struct vmxnet3_adapter (bsc#1172484).\n\n - vmxnet3: Replace msleep(1) with usleep_range() (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is encapsulated (bsc#1172484).\n\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n\n - vt_compat_ioctl(): clean up, use compat_ptr() properly (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid options (git-fixes).\n\n - w1: omap-hdq: cleanup to add missing newline for some dev_dbg (bsc#1051510).\n\n - watchdog: sp805: fix restart handler (bsc#1111666).\n\n - wil6210: add general initialization/size checks (bsc#1111666).\n\n - wil6210: check rx_buff_mgmt before accessing it (bsc#1111666).\n\n - wil6210: ignore HALP ICR if already handled (bsc#1111666).\n\n - wil6210: make sure Rx ring sizes are correlated (git-fixes).\n\n - work around mvfs bug (bsc#1162063).\n\n - x86/apic: Install an empty physflat_init_apic_ldr (bsc#1163309).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum (bsc#1114279).\n\n - x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into PEBS_FREERUNNING_FLAGS (git-fixes).\n\n - x86: Fix early boot crash on gcc-10, third try (bsc#1114279).\n\n - x86/(mce,mm): Unmap the entire page if the whole page is affected and poisoned (bsc#1172257).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk (bsc#1114279).\n\n - xfrm: fix error in comment (git fixes).\n\n - xhci: Fix enumeration issue when setting max packet size for FS devices (git-fixes).\n\n - xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation checks (git-fixes).", "cvss3": {}, "published": "2020-08-07T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-1153)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20810", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10766", "CVE-2020-10767", "CVE-2020-10768", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-13974", "CVE-2020-14331", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780", "CVE-2020-16166"], "modified": "2020-08-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "cpe:/o:novell:opensuse:15.1", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource"], "id": "OPENSUSE-2020-1153.NASL", "href": "https://www.tenable.com/plugins/nessus/139401", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-1153.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139401);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20810\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10766\", \"CVE-2020-10767\", \"CVE-2020-10768\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-13974\", \"CVE-2020-14331\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\", \"CVE-2020-16166\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-1153)\");\n script_summary(english:\"Check for the openSUSE-2020-1153 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.1 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2019-16746: An issue was discovered in\n net/wireless/nl80211.c where it did not check the length\n of variable elements in a beacon head, leading to a\n buffer overflow (bnc#1152107 1173659).\n\n - CVE-2019-20810: go7007_snd_init in\n drivers/media/usb/go7007/snd-go7007.c did not call\n snd_card_free for a failure path, which causes a memory\n leak, aka CID-9453264ef586 (bnc#1172458).\n\n - CVE-2019-20908: An issue was discovered in\n drivers/firmware/efi/efi.c where Incorrect access\n permissions for the efivar_ssdt ACPI variable could be\n used by attackers to bypass lockdown or secure boot\n restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a\n possible use-after-free due to a race condition. This\n could lead to local escalation of privilege with System\n execution privileges needed. User interaction is not\n needed for exploitation (bnc#1174462).\n\n - CVE-2020-10135: Legacy pairing and secure-connections\n pairing authentication in Bluetooth® BR/EDR Core\n Specification v5.2 and earlier may have allowed an\n unauthenticated user to complete authentication without\n pairing credentials via adjacent access. An\n unauthenticated, adjacent attacker could impersonate a\n Bluetooth BR/EDR master or slave to pair with a\n previously paired remote device to successfully complete\n the authentication procedure without knowing the link\n key (bnc#1171988).\n\n - CVE-2020-10766: Fixed rogue cross-process SSBD shutdown.\n Linux scheduler logical bug allowed an attacker to turn\n off the SSBD protection. (bnc#1172781).\n\n - CVE-2020-10767: Fixed indirect Branch Prediction Barrier\n is force-disabled when STIBP is unavailable or enhanced\n IBRS is available. (bnc#1172782).\n\n - CVE-2020-10768: Fixed indirect branch speculation can be\n enabled after it was force-disabled by the\n PR_SPEC_FORCE_DISABLE prctl command. (bnc#1172783).\n\n - CVE-2020-10769: A buffer over-read flaw was found in\n crypto_authenc_extractkeys in crypto/authenc.c in the\n IPsec Cryptographic algorithm's module, authenc. When a\n payload longer than 4 bytes, and is not following 4-byte\n alignment boundary guidelines, it causes a buffer\n over-read threat, leading to a system crash. This flaw\n allowed a local attacker with user privileges to cause a\n denial of service (bnc#1173265).\n\n - CVE-2020-10773: Fixed a kernel stack information leak on\n s390/s390x. (bnc#1172999).\n\n - CVE-2020-10781: A zram sysfs resource consumption was\n fixed. (bnc#1173074).\n\n - CVE-2020-12771: btree_gc_coalesce in\n drivers/md/bcache/btree.c has a deadlock if a coalescing\n operation fails (bnc#1171732).\n\n - CVE-2020-12888: The VFIO PCI driver mishandled attempts\n to access disabled memory space (bnc#1171868).\n\n - CVE-2020-13974: drivers/tty/vt/keyboard.c had an integer\n overflow if k_ascii was called several times in a row,\n aka CID-b86dab054059. (bnc#1172775).\n\n - CVE-2020-14331: Fixed a buffer over write in\n vgacon_scroll (bnc#1174205).\n\n - CVE-2020-14331: Fixed an out of bounds write to the\n vgacon scrollback buffer (bsc#1174205).\n\n - CVE-2020-14416: A race condition in tty->disc_data\n handling in the slip and slcan line discipline could\n lead to a use-after-free, aka CID-0ace17d56824. This\n affects drivers/net/slip/slip.c and\n drivers/net/can/slcan.c (bnc#1162002).\n\n - CVE-2020-15393: usbtest_disconnect in\n drivers/usb/misc/usbtest.c has a memory leak, aka\n CID-28ebeb8db770 (bnc#1173514).\n\n - CVE-2020-15780: An issue was discovered in\n drivers/acpi/acpi_configfs.c where injection of\n malicious ACPI tables via configfs could be used by\n attackers to bypass lockdown and secure boot\n restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-16166: The Linux kernel allowed remote\n attackers to make observations that help to obtain\n sensitive information about the internal state of the\n network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c\n (bnc#1174757).\n\nThe following non-security bugs were fixed :\n\n - ACPI: GED: add support for _Exx / _Lxx handler methods\n (bsc#1111666).\n\n - ACPI: GED: use correct trigger type field in _Exx / _Lxx\n handling (bsc#1111666).\n\n - ACPI: NFIT: Fix unlock on error in scrub_show()\n (bsc#1171753).\n\n - ACPI: PM: Avoid using power resources if there are none\n for D0 (bsc#1051510).\n\n - ACPI: sysfs: Fix pm_profile_attr type (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z\n (bsc#1111666).\n\n - ACPI: video: Use native backlight on Acer TravelMate\n 5735Z (bsc#1111666).\n\n - ALSA: es1688: Add the missed snd_card_free()\n (bsc#1051510).\n\n - ALSA: hda: Add ElkhartLake HDMI codec vid (bsc#1111666).\n\n - ALSA: hda: add sienna_cichlid audio asic id for\n sienna_cichlid up (bsc#1111666).\n\n - ALSA: hda: fix NULL pointer dereference during suspend\n (git-fixes).\n\n - ALSA: hda/hdmi - enable runtime pm for newer AMD display\n audio (bsc#1111666).\n\n - ALSA: hda - let hs_mic be picked ahead of hp_mic\n (bsc#1111666).\n\n - ALSA: hda/realtek - add a pintbl quirk for several\n Lenovo machines (bsc#1111666).\n\n - ALSA: hda/realtek - Add LED class support for micmute\n LED (bsc#1111666).\n\n - ALSA: hda/realtek: Add mute LED and micmute LED support\n for HP systems (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for Lenovo Carbon X1 8th\n gen (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GE63 laptop\n (bsc#1111666).\n\n - ALSA: hda/realtek - Add quirk for MSI GL63\n (bsc#1111666).\n\n - ALSA: hda/realtek - change to suitable link model for\n ASUS platform (bsc#1111666).\n\n - ALSA: hda/realtek - Check headset type by unplug and\n resume (bsc#1111666).\n\n - ALSA: hda/realtek - Enable audio jacks of Acer\n vCopperbox with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer C20-820\n with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate\n B311R-31 with ALC256 (bsc#1111666).\n\n - ALSA: hda/realtek: Enable headset mic of Acer Veriton\n N4660G with ALC269VC (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G14(G401) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G15(GA502) series with ALC289 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable micmute LED on and HP system\n (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and\n UX534 (bsc#1111666).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563\n (bsc#1111666).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function\n for intel reference board (alc256) (bsc#1111666).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding\n quirk for Samsung Notebook Pen S (bsc#1111666).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound\n (bsc#1111666).\n\n - ALSA: hda/realtek - Fix Lenovo Thinkpad X1 Carbon 7th\n quirk subdevice id (bsc#1111666).\n\n - ALSA: hda/realtek - Fix unused variable warning w/o\n CONFIG_LEDS_TRIGGER_AUDIO (bsc#1111666).\n\n - ALSA: hda/realtek - Introduce polarity for micmute LED\n GPIO (bsc#1111666).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS\n ROG Zephyrus G14(GA401) series with ALC289\n (bsc#1111666).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel\n platforms (git-fixes).\n\n - ALSA: lx6464es - add support for LX6464ESe pci express\n variant (bsc#1111666).\n\n - ALSA: opl3: fix infoleak in opl3 (bsc#1111666).\n\n - ALSA: pcm: disallow linking stream to itself\n (bsc#1111666).\n\n - ALSA: usb-audio: Add duplex sound support for USB\n devices using implicit feedback (bsc#1111666).\n\n - ALSA: usb-audio: Add Pioneer DJ DJM-900NXS2 support\n (bsc#1111666).\n\n - ALSA: usb-audio: add quirk for MacroSilicon MS2109\n (bsc#1111666).\n\n - ALSA: usb-audio: Add vendor, product and profile name\n for HP Thunderbolt Dock (bsc#1111666).\n\n - ALSA: usb-audio: Clean up quirk entries with macros\n (bsc#1111666).\n\n - ALSA: usb-audio: Fix inconsistent card PM state after\n resume (bsc#1111666).\n\n - ALSA: usb-audio: Fix packet size calculation\n (bsc#1111666).\n\n - ALSA: usb-audio: Fix racy list management in output\n queue (bsc#1111666).\n\n - ALSA: usb-audio: Improve frames size computation\n (bsc#1111666).\n\n - ALSA: usb-audio: Manage auto-pm of all bundled\n interfaces (bsc#1111666).\n\n - ALSA: usb-audio: Use the new macro for HP Dock rename\n quirks (bsc#1111666).\n\n - amdgpu: a NULL ->mm does not mean a thread is a kthread\n (git-fixes).\n\n - arm64: map FDT as RW for early_init_dt_scan()\n (jsc#SLE-12423).\n\n - ath9k: Fix general protection fault in\n ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ath9k: Fix use-after-free Read in ath9k_wmi_ctrl_rx\n (bsc#1111666).\n\n - ath9k: Fix use-after-free Write in ath9k_htc_rx_msg\n (bsc#1111666).\n\n - ath9x: Fix stack-out-of-bounds Write in\n ath9k_hif_usb_rx_cb (bsc#1111666).\n\n - ax25: fix setsockopt(SO_BINDTODEVICE)\n (networking-stable-20_05_27).\n\n - b43: Fix connection problem with WPA3 (bsc#1111666).\n\n - b43_legacy: Fix connection problem with WPA3\n (bsc#1111666).\n\n - bcache: Fix an error code in bch_dump_read() (git fixes\n (block drivers)).\n\n - be2net: fix link failure after ethtool offline test\n (git-fixes).\n\n - block: Fix use-after-free in blkdev_get() (bsc#1174843).\n\n - block: nr_sects_write(): Disable preemption on seqcount\n write (bsc#1173818).\n\n - block: remove QUEUE_FLAG_STACKABLE (git fixes (block\n drivers)).\n\n - block: sed-opal: fix sparse warning: convert __be64 data\n (git fixes (block drivers)).\n\n - Bluetooth: Add SCO fallback for invalid LMP parameters\n error (bsc#1111666).\n\n - bnxt_en: Fix AER reset logic on 57500 chips (git-fixes).\n\n - bnxt_en: Fix ethtool selftest crash under error\n conditions (git-fixes).\n\n - bnxt_en: Fix handling FRAG_ERR when NVM_INSTALL_UPDATE\n cmd fails (git-fixes).\n\n - bnxt_en: Fix ipv6 RFS filter matching logic (git-fixes).\n\n - bnxt_en: fix NULL dereference in case SR-IOV\n configuration fails (git-fixes).\n\n - bnxt_en: Fix VF anti-spoof filter setup\n (networking-stable-20_05_12).\n\n - bnxt_en: Fix VLAN acceleration handling in\n bnxt_fix_features() (networking-stable-20_05_12).\n\n - bnxt_en: Improve AER slot reset\n (networking-stable-20_05_12).\n\n - brcmfmac: fix wrong location to get firmware feature\n (bsc#1111666).\n\n - brcmfmac: Transform compatible string for FW loading\n (bsc#1169771).\n\n - btrfs: add assertions for tree == inode->io_tree to\n extent IO helpers (bsc#1174438).\n\n - btrfs: add new helper btrfs_lock_and_flush_ordered_range\n (bsc#1174438).\n\n - btrfs: Always use a cached extent_state in\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: change timing for qgroup reserved space for\n ordered extents to fix reserved space leak\n (bsc#1172247).\n\n - btrfs: do not zero f_bavail if we have available space\n (bsc#1168081).\n\n - btrfs: drop argument tree from\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch\n range is locked (bsc#1172247).\n\n - btrfs: fix extent_state leak in\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc\n extent beyond eof (bsc#1174438).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT\n write (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to\n cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks\n and waiting for IO (bsc#1174438).\n\n - btrfs: inode: move qgroup reserved space release to the\n callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of\n insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: qgroup: allow to unreserve range without\n releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: Fix a bug that prevents qgroup to be\n re-enabled after disable (bsc#1172247).\n\n - btrfs: qgroup: fix data leak caused by race between\n writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of\n reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Return EAGAIN if we can't start no snpashot write\n in check_can_nocow (bsc#1174438).\n\n - btrfs: use correct count in btrfs_file_write_iter()\n (bsc#1174438).\n\n - btrfs: Use newly introduced\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: volumes: Remove ENOSPC-prone btrfs_can_relocate()\n (bsc#1171124).\n\n - bus: hisi_lpc: Add .remove method to avoid driver unbind\n crash (bsc#1174658).\n\n - bus: hisi_lpc: Do not fail probe for unrecognised child\n devices (bsc#1174658).\n\n - bus: hisi_lpc: Unregister logical PIO range to avoid\n potential use-after-free (bsc#1174658).\n\n - bus: sunxi-rsb: Return correct data when mixing 16-bit\n and 8-bit reads (bsc#1111666).\n\n - carl9170: remove P2P_GO support (bsc#1111666).\n\n - cdc-acm: Add DISABLE_ECHO quirk for Microchip/SMSC chip\n (git-fixes).\n\n - CDC-ACM: heed quirk also in error handling (git-fixes).\n\n - ceph: convert mdsc->cap_dirty to a per-session list\n (bsc#1167104).\n\n - ceph: request expedited service on session's last cap\n flush (bsc#1167104).\n\n - cgroup, blkcg: Prepare some symbols for module and\n !CONFIG_CGROUP usages (bsc#1173857).\n\n - char/random: Add a newline at the end of the file\n (jsc#SLE-12423).\n\n - cifs: get rid of unused parameter in\n reconn_setup_dfs_targets() (bsc#1144333).\n\n - cifs: handle hostnames that resolve to same ip in\n failover (bsc#1144333 bsc#1161016).\n\n - cifs: set up next DFS target before generic_ip_connect()\n (bsc#1144333 bsc#1161016).\n\n - clk: bcm2835: Fix return type of bcm2835_register_gate\n (bsc#1051510).\n\n - clk: clk-flexgen: fix clock-critical handling\n (bsc#1051510).\n\n - clk: sunxi: Fix incorrect usage of round_down()\n (bsc#1051510).\n\n - clocksource: dw_apb_timer: Make CPU-affiliation being\n optional (bsc#1111666).\n\n - compat_ioctl: block: handle BLKREPORTZONE/BLKRESETZONE\n (git fixes (block drivers)).\n\n - compat_ioctl: block: handle Persistent Reservations (git\n fixes (block drivers)).\n\n - config: arm64: enable CONFIG_IOMMU_DEFAULT_PASSTHROUGH\n References: bsc#1174549\n\n - copy_(to,from)_user(): consolidate object size checks\n (git fixes).\n\n - crypto: algboss - do not wait during notifier callback\n (bsc#1111666).\n\n - crypto: algif_skcipher - Cap recv SG list at ctx->used\n (bsc#1111666).\n\n - crypto: caam - update xts sector size for large input\n length (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()'\n when ndevlist is fully iterated (bsc#1111666).\n\n - crypto: cavium/nitrox - Fix 'nitrox_get_first_device()'\n when ndevlist is fully iterated (git-fixes).\n\n - crypto/chcr: fix for ccm(aes) failed test (bsc#1111666).\n\n - crypto: chelsio/chtls: properly set tp->lsndtime\n (bsc#1111666).\n\n - crypto: rockchip - fix scatterlist nents error\n (git-fixes).\n\n - crypto: stm32/crc32 - fix ext4 chksum BUG_ON()\n (git-fixes).\n\n - crypto: talitos - check AES key size (git-fixes).\n\n - crypto: talitos - fix ablkcipher for CONFIG_VMAP_STACK\n (git-fixes).\n\n - crypto: talitos - fix IPsec cipher in length\n (git-fixes).\n\n - crypto: talitos - reorder code in talitos_edesc_alloc()\n (git-fixes).\n\n - crypto: virtio: Fix src/dst scatterlist calculation in\n __virtio_crypto_skcipher_do_req() (git-fixes).\n\n - debugfs: Check module state before warning in\n (full/open)_proxy_open() (bsc#1173746).\n\n - devinet: fix memleak in inetdev_init()\n (networking-stable-20_06_07).\n\n - /dev/mem: Add missing memory barriers for devmem_inode\n (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the\n region (git-fixes).\n\n - dlm: remove BUG() before panic() (bsc#1174844).\n\n - dmaengine: tegra210-adma: Fix an error handling path in\n 'tegra_adma_probe()' (bsc#1111666).\n\n - dm btree: increase rebalance threshold in __rebalance2()\n (git fixes (block drivers)).\n\n - dm cache: fix a crash due to incorrect work item\n cancelling (git fixes (block drivers)).\n\n - dm crypt: fix benbi IV constructor crash if used in\n authenticated mode (git fixes (block drivers)).\n\n - dm: fix potential for q->make_request_fn NULL pointer\n (git fixes (block drivers)).\n\n - dm space map common: fix to ensure new block isn't\n already in use (git fixes (block drivers)).\n\n - dm: various cleanups to md->queue initialization code\n (git fixes).\n\n - dm verity fec: fix hash block number in\n verity_fec_decode (git fixes (block drivers)).\n\n - dm verity fec: fix memory leak in verity_fec_dtr (git\n fixes (block drivers)).\n\n - dpaa_eth: fix usage as DSA master, try 3\n (networking-stable-20_05_27).\n\n - driver-core, libnvdimm: Let device subsystems add local\n lockdep coverage (bsc#1171753)\n\n - Drivers: hv: Change flag to write log level in panic msg\n to false (bsc#1170617, bsc#1170618).\n\n - drivers: soc: ti: knav_qmss_queue: Make\n knav_gp_range_ops static (bsc#1051510).\n\n - drm: amd/display: fix Kconfig help text (bsc#1113956)\n 	* only fix DEBUG_KERNEL_DC\n\n - drm: bridge: adv7511: Extend list of audio sample rates\n (bsc#1111666).\n\n - drm/dp_mst: Increase ACT retry timeout to 3s\n (bsc#1113956) * context changes\n\n - drm: encoder_slave: fix refcouting error for modules\n (bsc#1111666).\n\n - drm: encoder_slave: fix refcouting error for modules\n (bsc#1114279)\n\n - drm/i915/icl+: Fix hotplug interrupt disabling after\n storm detection (bsc#1112178)\n\n - drm/i915: Whitelist context-local timestamp in the gen9\n cmdparser (bsc#1111666).\n\n - drm/mediatek: Check plane visibility in atomic_update\n (bsc#1113956) * context changes\n\n - drm/msm/dpu: fix error return code in dpu_encoder_init\n (bsc#1111666).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA\n panel (bsc#1111666).\n\n - drm: panel-orientation-quirks: Use generic\n orientation-data for Acer S1003 (bsc#1111666).\n\n - drm/qxl: Use correct notify port address when creating\n cursor ring (bsc#1113956)\n\n - drm/radeon: fix double free (bsc#1113956)\n\n - drm/radeon: fix fb_div check in ni_init_smc_spll_table()\n (bsc#1113956)\n\n - drm/sun4i: hdmi ddc clk: Fix size of m divider\n (bsc#1111666).\n\n - drm/tegra: hub: Do not enable orphaned window group\n (bsc#1111666).\n\n - drm/vkms: Hold gem object while still in-use\n (bsc#1113956) * context changes\n\n - e1000: Distribute switch variables for initialization\n (bsc#1111666).\n\n - e1000e: Disable TSO for buffer overrun workaround\n (bsc#1051510).\n\n - e1000e: Do not wake up the system via WOL if device\n wakeup is disabled (bsc#1051510).\n\n - e1000e: Relax condition to trigger reset for ME\n workaround (bsc#1111666).\n\n - EDAC/amd64: Read back the scrub rate PCI register on\n F15h (bsc#1114279).\n\n - efi/memreserve: deal with memreserve entries in unmapped\n memory (bsc#1174685).\n\n - efi/random: Increase size of firmware supplied\n randomness (jsc#SLE-12423).\n\n - efi/random: Treat EFI_RNG_PROTOCOL output as bootloader\n randomness (jsc#SLE-12423).\n\n - efi: READ_ONCE rng seed size before munmap\n (jsc#SLE-12423).\n\n - efi: Reorder pr_notice() with add_device_randomness()\n call (jsc#SLE-12423).\n\n - evm: Check also if *tfm is an error pointer in\n init_desc() (bsc#1051510).\n\n - evm: Fix a small race in init_desc() (bsc#1051510).\n\n - ext4: fix a data race at inode->i_blocks (bsc#1171835).\n\n - ext4: fix EXT_MAX_EXTENT/INDEX to check for zeroed\n eh_max (bsc#1174840).\n\n - ext4: fix partial cluster initialization when splitting\n extent (bsc#1173839).\n\n - ext4: fix race between ext4_sync_parent() and rename()\n (bsc#1173838).\n\n - ext4, jbd2: ensure panic by fix a race between jbd2\n abort and ext4 error handlers (bsc#1173833).\n\n - extcon: adc-jack: Fix an error handling path in\n 'adc_jack_probe()' (bsc#1051510).\n\n - fanotify: fix ignore mask logic for events on child and\n on dir (bsc#1172719).\n\n - fat: do not allow to mount if the FAT length == 0\n (bsc#1174845).\n\n - fdt: add support for rng-seed (jsc#SLE-12423).\n\n - fdt: Update CRC check for rng-seed (jsc#SLE-12423).\n\n - firmware: imx: scu: Fix corruption of header\n (git-fixes).\n\n - firmware: imx: scu: Fix possible memory leak in\n imx_scu_probe() (bsc#1111666).\n\n - fix multiplication overflow in copy_fdtable()\n (bsc#1173825).\n\n - Fix Patch-mainline tag in the previous zram fix patch\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fq_codel: fix TCA_FQ_CODEL_DROP_BATCH_SIZE sanity checks\n (networking-stable-20_05_12).\n\n - gpiolib: Document that GPIO line names are not globally\n unique (bsc#1051510).\n\n - gpu: host1x: Detach driver on unregister (bsc#1111666).\n\n - gpu: ipu-v3: pre: do not trigger update if buffer\n address does not change (bsc#1111666).\n\n - HID: hiddev: fix mess in hiddev_open() (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: sony: Fix for broken buttons on DS3 USB dongles\n (bsc#1051510).\n\n - HISI LPC: Re-Add ACPI child enumeration support\n (bsc#1174658).\n\n - HISI LPC: Stop using MFD APIs (bsc#1174658).\n\n - hv_netvsc: Fix netvsc_start_xmit's return type\n (git-fixes).\n\n - hwmon: (acpi_power_meter) Fix potential memory leak in\n acpi_power_meter_add() (bsc#1111666).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable\n attribute (bsc#1111666).\n\n - hwmon: (max6697) Make sure the OVERT mask is set\n correctly (bsc#1111666).\n\n - i2c: algo-pca: Add 0x78 as SCL stuck low status for\n PCA9665 (bsc#1111666).\n\n - i2c: eg20t: Load module automatically if ID matches\n (bsc#1111666).\n\n - i2c: mlxcpld: check correct size of maximum RECV_LEN\n packet (bsc#1111666).\n\n - i40e: reduce stack usage in i40e_set_fc (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut\n down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut\n down (bsc#1174409).\n\n - ibmveth: Fix max MTU limit (bsc#1173428 ltc#186397).\n\n - ibmvnic: continue to init in CRQ reset returns H_CLOSED\n (bsc#1173280 ltc#185369).\n\n - ibmvnic: Flush existing work items before device removal\n (bsc#1065729).\n\n - ibmvnic: Harden device login requests (bsc#1170011\n ltc#183538).\n\n - iio: buffer: Do not allow buffers without any channels\n enabled to be activated (bsc#1051510).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent\n data leak (bsc#1111666).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues\n (bsc#1111666).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak\n issues (bsc#1111666).\n\n - iio: mma8452: Add missed iio_device_unregister() call in\n mma8452_probe() (bsc#1111666).\n\n - iio: pressure: bmp280: Tolerate IRQ before registering\n (bsc#1051510).\n\n - iio:pressure:ms5611 Fix buffer element alignment\n (bsc#1111666).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync\n failure (bsc#1111666).\n\n - ima: Directly assign the ima_default_policy pointer to\n ima_rules (bsc#1051510).\n\n - ima: Fix ima digest hash table key calculation\n (bsc#1051510).\n\n - include/asm-generic/topology.h: guard cpumask_of_node()\n macro argument (bsc#1148868).\n\n - input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux\n list (bsc#1111666).\n\n - input: i8042 - Remove special PowerPC handling\n (git-fixes).\n\n - input: synaptics - add a second working PNP_ID for\n Lenovo T470s (bsc#1111666).\n\n - intel_idle: Graceful probe failure when MWAIT is\n disabled (bsc#1174115).\n\n - intel_th: Fix a NULL dereference when hub driver is not\n loaded (bsc#1111666).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - ipvlan: call dev_change_flags when ipvlan mode is reset\n (git-fixes).\n\n - ixgbevf: Remove limit of 10 entries for unicast filter\n list (git-fixes).\n\n - jbd2: avoid leaking transaction credits when unreserving\n handle (bsc#1173845).\n\n - jbd2: Preserve kABI when adding j_abort_mutex\n (bsc#1173833).\n\n - kabi: hv: prevent struct device_node to become defined\n (bsc#1172871).\n\n - kabi: ppc64le: prevent struct dma_map_ops to become\n defined (jsc#SLE-12423).\n\n - kABI: protect struct mlx5_cmd_work_ent (kabi).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip\n (kabi).\n\n - kernfs: fix barrier usage in __kernfs_new_node()\n (bsc#1111666).\n\n - kvm: nVMX: Do not reread VMCS-agnostic state when\n switching VMCS (bsc#1114279).\n\n - kvm: nVMX: Skip IBPB when switching between vmcs01 and\n vmcs02 (bsc#1114279).\n\n - kvm: x86: Fix APIC page invalidation race (bsc#1174122).\n\n - kvm: x86: Fix L1TF mitigation for shadow MMU\n (bsc#1171904).\n\n - kvm: x86/mmu: Set mmio_value to '0' if reserved #PF\n can't be generated (bsc#1171904).\n\n - kvm: x86: only do L1TF workaround on affected processors\n (bsc#1171904).\n\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash()\n (networking-stable-20_06_07).\n\n - libceph: do not omit recovery_deletes in target_copy()\n (bsc#1174113).\n\n - libceph: ignore pool overlay and cache logic on\n redirects (bsc#1173146).\n\n - lib: logic_pio: Add logic_pio_unregister_range()\n (bsc#1174658).\n\n - lib: logic_pio: Avoid possible overlap for unregistering\n regions (bsc#1174658).\n\n - lib: logic_pio: Fix RCU usage (bsc#1174658).\n\n - libnvdimm/bus: Fix wait_nvdimm_bus_probe_idle() ABBA\n deadlock (bsc#1171753).\n\n - libnvdimm/bus: Prepare the nd_ioctl() path to be\n re-entrant (bsc#1171753).\n\n - libnvdimm/bus: Stop holding nvdimm_bus_list_mutex over\n __nd_ioctl() (bsc#1171753).\n\n - libnvdimm: cover up changes in struct nvdimm_bus\n (bsc#1171753).\n\n - libnvdimm: cover up nd_pfn_sb changes (bsc#1171759).\n\n - libnvdimm/dax: Pick the right alignment default when\n creating dax devices (bsc#1171759).\n\n - libnvdimm/label: Remove the dpa align check\n (bsc#1171759).\n\n - libnvdimm/of_pmem: Provide a unique name for bus\n provider (bsc#1171739).\n\n - libnvdimm/pfn_dev: Add a build check to make sure we\n notice when struct page size change (bsc#1171743).\n\n - libnvdimm/pfn_dev: Add page size and struct page size to\n pfn superblock (bsc#1171759).\n\n - libnvdimm/pfn: Prevent raw mode fallback if\n pfn-infoblock valid (bsc#1171743).\n\n - libnvdimm/pmem: Advance namespace seed for specific\n probe errors (bsc#1171743).\n\n - libnvdimm/region: Initialize bad block for volatile\n namespaces (bnc#1151927 5.3.6).\n\n - libnvdimm/region: Rewrite _probe_success() to\n _advance_seeds() (bsc#1171743).\n\n - libnvdimm: Use PAGE_SIZE instead of SZ_4K for align\n check (bsc#1171759).\n\n - livepatch: Apply vmlinux-specific KLP relocations early\n (bsc#1071995).\n\n - livepatch: Disallow vmlinux.ko (bsc#1071995).\n\n - livepatch: Make klp_apply_object_relocs static\n (bsc#1071995).\n\n - livepatch: Prevent module-specific KLP rela sections\n from referencing vmlinux symbols (bsc#1071995).\n\n - livepatch: Remove .klp.arch (bsc#1071995).\n\n - loop: replace kill_bdev with invalidate_bdev\n (bsc#1173820).\n\n - lpfc_debugfs: get rid of pointless access_ok()\n (bsc#1172687 bsc#1171530).\n\n - lpfc: Synchronize NVME transport and lpfc driver\n devloss_tmo (bcs#1173060).\n\n - mac80211: add option for setting control flags\n (bsc#1111666).\n\n - mac80211: set IEEE80211_TX_CTRL_PORT_CTRL_PROTO for\n nl80211 TX (bsc#1111666).\n\n - mailbox: imx: Disable the clock on\n devm_mbox_controller_register() failure (git-fixes).\n\n - md: Avoid namespace collision with bitmap API (git fixes\n (block drivers)).\n\n - mdraid: fix read/write bytes accounting (bsc#1172537).\n\n - md: use memalloc scope APIs in\n mddev_suspend()/mddev_resume() (bsc#1166985)).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: si2157: Better check for running tuner in init\n (bsc#1111666).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw ordered\n workqueue (git-fixes).\n\n - mlxsw: core: Do not use WQ_MEM_RECLAIM for mlxsw\n workqueue (git-fixes).\n\n - mlxsw: pci: Return error on PCI reset timeout\n (git-fixes).\n\n - mlxsw: spectrum_acl_tcam: Position vchunk in a vregion\n list properly (networking-stable-20_05_12).\n\n - mlxsw: spectrum: Disallow prio-tagged packets when PVID\n is removed (git-fixes).\n\n - mlxsw: spectrum_dpipe: Add missing error path\n (git-fixes).\n\n - mlxsw: spectrum: Prevent force of 56G (git-fixes).\n\n - mlxsw: spectrum_router: Refresh nexthop neighbour when\n it becomes dead (git-fixes).\n\n - mlxsw: spectrum_router: Remove inappropriate usage of\n WARN_ON() (git-fixes).\n\n - mlxsw: spectrum_switchdev: Add MDB entries in prepare\n phase (git-fixes).\n\n - mlxsw: spectrum_switchdev: Do not treat static FDB\n entries as sticky (git-fixes).\n\n - mmc: block: Fix request completion in the CQE timeout\n path (bsc#1111666).\n\n - mmc: block: Fix use-after-free issue for rpmb\n (bsc#1111666).\n\n - mmc: fix compilation of user API (bsc#1051510).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio\n cd type (bsc#1111666).\n\n - mmc: sdhci-msm: Set SDHCI_QUIRK_MULTIBLOCK_READ_ACMD12\n quirk (bsc#1111666).\n\n - Move kabi patch into the right place\n\n - Move upstreamed lpfc patches into sorted section\n\n - mvpp2: remove misleading comment (git-fixes).\n\n - net: be more gentle about silly gso requests coming from\n user (networking-stable-20_06_07).\n\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n\n - net/cxgb4: Check the return from t4_query_params\n properly (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: dsa: loop: Add module soft dependency\n (networking-stable-20_05_16).\n\n - net: dsa: mt7530: fix roaming from DSA user ports\n (networking-stable-20_05_27).\n\n - net: ena: add intr_moder_rx_interval to struct\n ena_com_dev and use it (git-fixes).\n\n - net: ena: add missing ethtool TX timestamping indication\n (git-fixes).\n\n - net: ena: avoid memory access violation by validating\n req_id properly (git-fixes).\n\n - net: ena: do not wake up tx queue when down (git-fixes).\n\n - net: ena: ena-com.c: prevent NULL pointer dereference\n (git-fixes).\n\n - net: ena: ethtool: use correct value for crc32 hash\n (git-fixes).\n\n - net: ena: fix continuous keep-alive resets (git-fixes).\n\n - net: ena: fix corruption of dev_idx_to_host_tbl\n (git-fixes).\n\n - net: ena: fix default tx interrupt moderation interval\n (git-fixes).\n\n - net: ena: fix incorrect default RSS key (git-fixes).\n\n - net: ena: fix incorrectly saving queue numbers when\n setting RSS indirection table (git-fixes).\n\n - net: ena: fix issues in setting interrupt moderation\n params in ethtool (git-fixes).\n\n - net: ena: fix potential crash when rxfh key is NULL\n (git-fixes).\n\n - net: ena: fix retrieval of nonadaptive interrupt\n moderation intervals (git-fixes).\n\n - net: ena: fix uses of round_jiffies() (git-fixes).\n\n - net: ena: make ena rxfh support ETH_RSS_HASH_NO_CHANGE\n (git-fixes).\n\n - net: ena: reimplement set/get_coalesce() (git-fixes).\n\n - net: ena: rss: do not allocate key when not supported\n (git-fixes).\n\n - net: ena: rss: fix failure to get indirection table\n (git-fixes).\n\n - net: ena: rss: store hash function as values and not\n bits (git-fixes).\n\n - netfilter: connlabels: prefer static lock initialiser\n (git-fixes).\n\n - netfilter: ctnetlink: netns exit must wait for callbacks\n (bsc#1169795).\n\n - netfilter: not mark a spinlock as __read_mostly\n (git-fixes).\n\n - net: fix a potential recursive NETDEV_FEAT_CHANGE\n (networking-stable-20_05_16).\n\n - net: hns3: add autoneg and change speed support for\n fibre port (bsc#1174070).\n\n - net: hns3: add support for FEC encoding control\n (bsc#1174070).\n\n - net: hns3: add support for multiple media type\n (bsc#1174070).\n\n - net: hns3: fix a not link up issue when fibre port\n supports autoneg (bsc#1174070).\n\n - net: hns3: fix for FEC configuration (bsc#1174070).\n\n - net: hns3: fix port capbility updating issue\n (bsc#1174070).\n\n - net: hns3: fix port setting handle for fibre port\n (bsc#1174070).\n\n - net: hns3: fix selftest fail issue for fibre port with\n autoneg on (bsc#1174070).\n\n - net: hns3: restore the MAC autoneg state after reset\n (bsc#1174070).\n\n - net: inet_csk: Fix so_reuseport bind-address cache in\n tb->fast* (networking-stable-20_05_27).\n\n - net: ipip: fix wrong address family in init error path\n (networking-stable-20_05_27).\n\n - net: ipvlan: Fix ipvlan device tso disabled while\n NETIF_F_IP_CSUM is set (git-fixes).\n\n - net: macsec: preserve ingress frame ordering\n (networking-stable-20_05_12).\n\n - net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n\n - net/mlx4_core: fix a memory leak bug (git-fixes).\n\n - net/mlx4_core: Fix use of ENOSPC around\n mlx4_counter_alloc() (networking-stable-20_05_12).\n\n - net/mlx5: Add command entry handling completion\n (networking-stable-20_05_27).\n\n - net/mlx5: Avoid panic when setting vport rate\n (git-fixes).\n\n - net/mlx5: Continue driver initialization despite debugfs\n failure (git-fixes).\n\n - net/mlx5e: ethtool, Fix a typo in WOL function names\n (git-fixes).\n\n - net/mlx5e: Fix traffic duplication in ethtool steering\n (git-fixes).\n\n - net/mlx5e: Remove unnecessary clear_bit()s (git-fixes).\n\n - net/mlx5e: Update netdev txq on completions during\n closure (networking-stable-20_05_27).\n\n - net/mlx5: Fix command entry leak in Internal Error State\n (networking-stable-20_05_12).\n\n - net/mlx5: Fix crash upon suspend/resume\n (networking-stable-20_06_07).\n\n - net/mlx5: Fix forced completion access non initialized\n command entry (networking-stable-20_05_12).\n\n - net: mvmdio: allow up to four clocks to be specified for\n orion-mdio (git-fixes).\n\n - net: mvpp2: prs: Do not override the sign bit in SRAM\n parser shift (git-fixes).\n\n - net: phy: fix aneg restart in phy_ethtool_set_eee\n (networking-stable-20_05_16).\n\n - netprio_cgroup: Fix unlimited memory leak of v2 cgroups\n (networking-stable-20_05_16).\n\n - net: qede: stop adding events on an already destroyed\n workqueue (git-fixes).\n\n - net: qed: fix excessive QM ILT lines consumption\n (git-fixes).\n\n - net: qed: fix NVMe login fails over VFs (git-fixes).\n\n - net: qrtr: Fix passing invalid reference to\n qrtr_local_enqueue() (networking-stable-20_05_27).\n\n - net: revert 'net: get rid of an signed integer overflow\n in ip_idents_reserve()' (networking-stable-20_05_27).\n\n - net sched: fix reporting the first-time use timestamp\n (networking-stable-20_05_27).\n\n - net: stricter validation of untrusted gso packets\n (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak in\n bpf_exec_tx_verdict() (networking-stable-20_05_12).\n\n - net/tls: Fix sk_psock refcnt leak when in\n tls_data_ready() (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add support for DW5816e\n (networking-stable-20_05_12).\n\n - net: usb: qmi_wwan: add Telit 0x1050 composition\n (networking-stable-20_06_07).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n\n - net: vmxnet3: fix possible buffer overflow caused by bad\n DMA value in vmxnet3_get_rss() (bsc#1172484).\n\n - nfp: bpf: fix code-gen bug on BPF_ALU | BPF_XOR | BPF_K\n (git-fixes).\n\n - NFS: Fix an RCU lock leak in\n nfs4_refresh_delegation_stateid() (bsc#1170592).\n\n - NFSv4: Retry CLOSE and DELEGRETURN on\n NFS4ERR_OLD_STATEID (bsc#1170592).\n\n - nilfs2: fix NULL pointer dereference at\n nilfs_segctor_do_construct() (bsc#1173857).\n\n - nl80211: fix NL80211_ATTR_CHANNEL_WIDTH attribute type\n (bsc#1111666).\n\n - nvdimm: Avoid race between probe and reading device\n attributes (bsc#1170442).\n\n - nvme: check for NVME_CTRL_LIVE in nvme_report_ns_ids()\n (bcs#1171558 bsc#1159058).\n\n - nvme: do not update multipath disk information if the\n controller is down (bcs#1171558 bsc#1159058).\n\n - nvme: fail cancelled commands with\n NVME_SC_HOST_PATH_ERROR (bsc#1158983 bsc#1172538).\n\n - nvme-fc: Fail transport errors with NVME_SC_HOST_PATH\n (bsc#1158983 bsc#1172538).\n\n - nvme-tcp: fail command with NVME_SC_HOST_PATH_ERROR send\n failed (bsc#1158983 bsc#1172538).\n\n - objtool: Clean instruction state before each function\n validation (bsc#1169514).\n\n - objtool: Ignore empty alternatives (bsc#1169514).\n\n - ocfs2: avoid inode removal while nfsd is accessing it\n (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - ocfs2: no need try to truncate file beyond i_size\n (bsc#1171841).\n\n - overflow: Fix -Wtype-limits compilation warnings (git\n fixes).\n\n - overflow.h: Add arithmetic shift helper (git fixes).\n\n - p54usb: add AirVasT USB stick device-id (bsc#1051510).\n\n - padata: ensure the reorder timer callback runs on the\n correct CPU (git-fixes).\n\n - padata: reorder work kABI fixup (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER\n ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership\n (bsc#1174356).\n\n - PCI: Allow pci_resize_resource() for devices on root bus\n (bsc#1051510).\n\n - PCI: Fix pci_register_host_bridge() device_register()\n error handling (bsc#1051510).\n\n - PCI: Fix 'try' semantics of bus and slot reset\n (git-fixes).\n\n - PCI: Generalize multi-function power dependency device\n links (bsc#1111666).\n\n - PCI: hv: Change pci_protocol_version to per-hbus\n (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Fix the PCI HyperV probe failure path to\n release resource properly (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Introduce hv_msi_entry (bsc#1172871,\n bsc#1172872).\n\n - PCI: hv: Move hypercall related definitions into tlfs\n header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Move retarget related structures into tlfs\n header (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Reorganize the code in preparation of\n hibernation (bsc#1172871, bsc#1172872).\n\n - PCI: hv: Retry PCI bus D0 entry on invalid device state\n (bsc#1172871, bsc#1172872).\n\n - PCI: pciehp: Fix indefinite wait on sysfs requests\n (git-fixes).\n\n - PCI: pciehp: Support interrupts sent from D3hot\n (git-fixes).\n\n - PCI: Program MPS for RCiEP devices (bsc#1051510).\n\n - PCI/PTM: Inherit Switch Downstream Port PTM settings\n from Upstream Port (bsc#1051510).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for\n kABI (bsc#1174356).\n\n - pcm_native: result of put_user() needs to be checked\n (bsc#1111666).\n\n - perf/x86/amd: Constrain Large Increment per Cycle events\n (git-fixes).\n\n - perf/x86/amd/ibs: Fix reading of the IBS OpData register\n and thus precise RIP validity (git-fixes).\n\n - perf/x86/amd/ibs: Fix sample bias for dispatched\n micro-ops (git-fixes).\n\n - perf/x86/amd/ibs: Handle erratum #420 only on the\n affected CPU family (10h) (git-fixes).\n\n - perf/x86/amd/iommu: Make the 'amd_iommu_attr_groups'\n symbol static (git-fixes).\n\n - perf/x86/amd/uncore: Do not set 'ThreadMask' and\n 'SliceMask' for non-L3 PMCs (git-fixes stable).\n\n - perf/x86/amd/uncore: Set the thread mask for F17h L3\n PMCs (git-fixes).\n\n - perf/x86/amd/uncore: Set ThreadMask and SliceMask for L3\n Cache perf events (git-fixes stable).\n\n - perf/x86: Enable free running PEBS for REGS_USER/INTR\n (git-fixes).\n\n - perf/x86: Fix incorrect PEBS_REGS (git-fixes).\n\n - perf/x86/intel: Add generic branch tracing check to\n intel_pmu_has_bts() (git-fixes).\n\n - perf/x86/intel: Add proper condition to run sched_task\n callbacks (git-fixes).\n\n - perf/x86/intel/bts: Fix the use of page_private()\n (git-fixes).\n\n - perf/x86/intel: Fix PT PMI handling (git-fixes).\n\n - perf/x86/intel: Move branch tracing setup to the\n Intel-specific source file (git-fixes).\n\n - perf/x86/intel/uncore: Add Node ID mask (git-fixes).\n\n - perf/x86/intel/uncore: Fix PCI BDF address of M3UPI on\n SKX (git-fixes).\n\n - perf/x86/intel/uncore: Handle invalid event coding for\n free-running counter (git-fixes).\n\n - perf/x86/uncore: Fix event group support (git-fixes).\n\n - pid: Improve the comment about waiting in\n zap_pid_ns_processes (git fixes)).\n\n - pinctrl: freescale: imx: Fix an error handling path in\n 'imx_pinctrl_probe()' (bsc#1051510).\n\n - pinctrl: imxl: Fix an error handling path in\n 'imx1_pinctrl_core_probe()' (bsc#1051510).\n\n - pinctrl: samsung: Save/restore eint_mask over suspend\n for EINT_TYPE GPIOs (bsc#1051510).\n\n - platform/x86: dell-laptop: do not register micmute LED\n if there is no token (bsc#1111666).\n\n - platform/x86: hp-wmi: Convert simple_strtoul() to\n kstrtou32() (bsc#1111666).\n\n - PM / Domains: Allow genpd users to specify default\n active wakeup behavior (git-fixes).\n\n - pnp: Use list_for_each_entry() instead of open coding\n (git fixes).\n\n - powerpc/64s: Do not let DT CPU features set FSCR_DSCR\n (bsc#1065729).\n\n - powerpc/64s: Save FSCR to init_task.thread.fscr after\n feature init (bsc#1065729).\n\n - powerpc/book3s64: Export has_transparent_hugepage()\n related functions (bsc#1171759).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for\n execute disable pkey (bsc#1065729).\n\n - powerpc/fadump: fix race between pstore write and fadump\n crash trigger (bsc#1168959 ltc#185010).\n\n -\n powerpc-mm-Remove-kvm-radix-prefetch-workaround-for-.pat\n ch\n\n - powerpc/xive: Clear the page tables for the ESB IO\n mapping (bsc#1085030).\n\n - powerpc-xmon-don-t-access-ASDR-in-VMs.patch\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs\n (bsc#1065729).\n\n - power: supply: bq24257_charger: Replace depends on\n REGMAP_I2C with select (bsc#1051510).\n\n - power: supply: lp8788: Fix an error handling path in\n 'lp8788_charger_probe()' (bsc#1051510).\n\n - power: supply: smb347-charger: IRQSTAT_D is volatile\n (bsc#1051510).\n\n - power: vexpress: add suppress_bind_attrs to true\n (bsc#1111666).\n\n - pppoe: only process PADT targeted at local interfaces\n (networking-stable-20_05_16).\n\n - propagate_one(): mnt_set_mountpoint() needs mount_lock\n (bsc#1174841).\n\n - qed: reduce maximum stack frame size (git-fixes).\n\n - qlcnic: fix missing release in\n qlcnic_83xx_interrupt_test (git-fixes).\n\n - r8152: support additional Microsoft Surface Ethernet\n Adapter variant (networking-stable-20_05_27).\n\n - raid5: remove gfp flags from scribble_alloc()\n (bsc#1166985).\n\n - RDMA/efa: Fix setting of wrong bit in get/set_feature\n commands (bsc#1111666)\n\n - RDMA/efa: Set maximum pkeys device attribute\n (bsc#1111666)\n\n - RDMA/efa: Support remote read access in MR registration\n (bsc#1111666)\n\n - RDMA/efa: Unified getters/setters for device structs\n bitmask access (bsc#1111666)\n\n - README.BRANCH: Add Takashi Iwai as primary maintainer.\n\n - regmap: debugfs: Do not sleep while atomic for fast_io\n regmaps (bsc#1111666).\n\n - Revert 'bcache: ignore pending signals when creating gc\n and allocator thread' (git fixes (block drivers)).\n\n - Revert commit e918e570415c ('tpm_tis: Remove the HID\n IFX0102') (bsc#1111666).\n\n - Revert 'dm crypt: use WQ_HIGHPRI for the IO and crypt\n workqueues' (git fixes (block drivers)).\n\n - Revert 'ipv6: add mtu lock check in\n __ip6_rt_update_pmtu' (networking-stable-20_05_16).\n\n - Revert pciehp patches that broke booting (bsc#1174887)\n\n - Revert 'thermal: mediatek: fix register index error'\n (bsc#1111666).\n\n - Revert 'tools lib traceevent: Remove unneeded qsort and\n uses memmove'\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink\n fails (git-fixes).\n\n - s390/bpf: Maintain 8-byte stack alignment (bsc#1169194).\n\n - s390: fix syscall_get_error for compat processes\n (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler\n (git-fixes).\n\n - s390/qdio: lock device while installing IRQ handler\n (git-fixes).\n\n - s390/qdio: put thinint indicator after early error\n (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error\n (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds\n (git-fixes).\n\n - sch_choke: avoid potential panic in choke_reset()\n (networking-stable-20_05_12).\n\n - sch_sfq: validate silly quantum values\n (networking-stable-20_05_12).\n\n - scripts/git_sort/git_sort.py: add\n bluetooth/bluetooth-next.git repository\n\n - scsi: aacraid: fix a signedness bug (bsc#1174296).\n\n - scsi: hisi_sas: fix calls to dma_set_mask_and_coherent()\n (bsc#1174296).\n\n - scsi: ibmvscsi: Do not send host info in adapter info\n MAD after LPM (bsc#1172759 ltc#184814).\n\n - scsi: lpfc: Add an internal trace log buffer\n (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add blk_io_poll support for latency\n improvment (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Add support to display if adapter dumps are\n available (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Allow applications to issue Common Set\n Features mailbox command (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Avoid another null dereference in\n lpfc_sli4_hba_unset() (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix inconsistent indenting (bsc#1158983).\n\n - scsi: lpfc: Fix interrupt assignments when multiple\n vectors are supported on same CPU (bsc#1158983).\n\n - scsi: lpfc: Fix kdump hang on PPC (bsc#1172687\n bsc#1171530).\n\n - scsi: lpfc: Fix language in 0373 message to reflect\n non-error message (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix less-than-zero comparison of unsigned\n value (bsc#1158983).\n\n - scsi: lpfc: Fix missing MDS functionality (bsc#1172687\n bsc#1171530).\n\n - scsi: lpfc: Fix NVMe rport deregister and registration\n during ADISC (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix oops due to overrun when reading SLI3\n data (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix shost refcount mismatch when deleting\n vport (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix stack trace seen while setting rrq\n active (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Fix unused assignment in\n lpfc_sli4_bsg_link_diag_test (bsc#1172687 bsc#1171530).\n\n - scsi: lpfc: Update lpfc version to 12.8.0.2\n (bsc#1158983).\n\n - scsi: megaraid_sas: Fix a compilation warning\n (bsc#1174296).\n\n - scsi: mpt3sas: Fix double free in attach error handling\n (bsc#1174296).\n\n - scsi: qedf: Add port_id getter (bsc#1150660).\n\n - scsi: qla2xxx: Fix a condition in\n qla2x00_find_all_fabric_devs() (bsc#1174296).\n\n - scsi: qla2xxx: Set NVMe status code for failed NVMe FCP\n request (bsc#1158983).\n\n - sctp: Do not add the shutdown timer if its already been\n added (networking-stable-20_05_27).\n\n - sctp: Start shutdown on association restart if in\n SHUTDOWN-SENT state and socket is closed\n (networking-stable-20_05_27).\n\n - spi: dw: use 'smp_mb()' to avoid sending spi data error\n (bsc#1051510).\n\n - spi: fix initial SPI_SR value in spi-fsl-dspi\n (bsc#1111666).\n\n - spi: pxa2xx: Apply CS clk quirk to BXT (bsc#1111666).\n\n - spi: spidev: fix a race between spidev_release and\n spidev_remove (bsc#1111666).\n\n - spi: spi-mem: Fix Dual/Quad modes on Octal-capable\n devices (bsc#1111666).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of\n clock rate (bsc#1111666).\n\n - staging: comedi: verify array index is correct before\n using it (bsc#1111666).\n\n - staging: rtl8712: Fix\n IEEE80211_ADDBA_PARAM_BUF_SIZE_MASK (bsc#1051510).\n\n - staging: sm750fb: add missing case while setting\n FB_VISUAL (bsc#1051510).\n\n - SUNRPC: The TCP back channel mustn't disappear while\n requests are outstanding (bsc#1152624).\n\n - tg3: driver sleeps indefinitely when EEH errors exceed\n eeh_max_freezes (bsc#1173284).\n\n - timers: Add a function to start/reduce a timer\n (networking-stable-20_05_27).\n\n - tpm_tis: extra chip->ops check on error path in\n tpm_tis_core_init (bsc#1111666).\n\n - tpm_tis: Remove the HID IFX0102 (bsc#1111666).\n\n - tracing: Fix event trigger to accept redundant spaces\n (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close\n (git-fixes).\n\n - tty: n_gsm: Fix bogus i++ in gsm_data_kick\n (bsc#1051510).\n\n - tty: n_gsm: Fix SOF skipping (bsc#1051510).\n\n - tty: n_gsm: Fix waking up upper tty layer when room\n available (bsc#1051510).\n\n - tunnel: Propagate ECT(1) when decapsulating as\n recommended by RFC6040 (networking-stable-20_05_12).\n\n - ubifs: remove broken lazytime support (bsc#1173826).\n\n - usb: add USB_QUIRK_DELAY_INIT for Logitech C922\n (git-fixes).\n\n - usb: c67x00: fix use after free in c67x00_giveback_urb\n (bsc#1111666).\n\n - usb: chipidea: core: add wakeup support for extcon\n (bsc#1111666).\n\n - usb: dwc2: Fix shutdown callback in platform\n (bsc#1111666).\n\n - usb: dwc2: gadget: move gadget resume after the core is\n in L0 state (bsc#1051510).\n\n - usb: dwc3: gadget: introduce cancelled_list (git-fixes).\n\n - usb: dwc3: gadget: never call ->complete() from\n ->ep_queue() (git-fixes).\n\n - usb: dwc3: gadget: Properly handle ClearFeature(halt)\n (git-fixes).\n\n - usb: dwc3: gadget: Properly handle failed kick_transfer\n (git-fixes).\n\n - usb: ehci: reopen solution for Synopsys HC bug\n (git-fixes).\n\n - usb: gadget: fix potential double-free in m66592_probe\n (bsc#1111666).\n\n - usb: gadget: lpc32xx_udc: do not dereference ep pointer\n before null check (bsc#1051510).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug\n printk (bsc#1111666).\n\n - usb: gadget: udc: atmel: remove outdated comment in\n usba_ep_disable() (bsc#1111666).\n\n - usb: gadget: udc: Potential Oops in error handling code\n (bsc#1111666).\n\n - usb: gadget: udc: s3c2410_udc: Remove pointless NULL\n check in s3c2410_udc_nuke (bsc#1051510).\n\n - usb: host: ehci-exynos: Fix error check in\n exynos_ehci_probe() (bsc#1111666).\n\n - usb: host: ehci-mxc: Add error handling in\n ehci_mxc_drv_probe() (bsc#1051510).\n\n - usb: musb: Fix runtime PM imbalance on error\n (bsc#1051510).\n\n - usb: musb: start session in resume for host port\n (bsc#1051510).\n\n - usbnet: smsc95xx: Fix use-after-free after removal\n (bsc#1111666).\n\n - usb: ohci-sm501: Add missed iounmap() in remove\n (bsc#1111666).\n\n - usb: serial: ch341: add new Product ID for CH340\n (bsc#1111666).\n\n - usb: serial: cypress_m8: enable Simply Automated UPB PIM\n (bsc#1111666).\n\n - usb: serial: iuu_phoenix: fix memory corruption\n (bsc#1111666).\n\n - usb: serial: option: add GosunCn GM500 series\n (bsc#1111666).\n\n - usb: serial: option: add Quectel EG95 LTE modem\n (bsc#1111666).\n\n - usb: serial: option: add Telit LE910C1-EUX compositions\n (bsc#1051510).\n\n - usb: serial: qcserial: add DW5816e QDL support\n (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal\n errors (bsc#1051510).\n\n - usb: serial: usb_wwan: do not resubmit rx urb on fatal\n errors (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking\n (bsc#1174123).\n\n - vfs: Fix EOVERFLOW testing in put_compat_statfs64\n (bnc#1151927 5.3.6).\n\n - virtio-blk: handle block_device_operations callbacks\n after hot unplug (git fixes (block drivers)).\n\n - virtio: virtio_console: add missing\n MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - vmxnet3: add geneve and vxlan tunnel offload support\n (bsc#1172484).\n\n - vmxnet3: add support to get/set rx flow hash\n (bsc#1172484).\n\n - vmxnet3: allow rx flow hash ops only when rss is enabled\n (bsc#1172484).\n\n - vmxnet3: avoid format strint overflow warning\n (bsc#1172484).\n\n - vmxnet3: prepare for version 4 changes (bsc#1172484).\n\n - vmxnet3: Remove always false conditional statement\n (bsc#1172484).\n\n - vmxnet3: remove redundant initialization of pointer 'rq'\n (bsc#1172484).\n\n - vmxnet3: remove unused flag 'rxcsum' from struct\n vmxnet3_adapter (bsc#1172484).\n\n - vmxnet3: Replace msleep(1) with usleep_range()\n (bsc#1172484).\n\n - vmxnet3: update to version 4 (bsc#1172484).\n\n - vmxnet3: use correct hdr reference when packet is\n encapsulated (bsc#1172484).\n\n - vsock: fix timeout in vsock_accept()\n (networking-stable-20_06_07).\n\n - vt_compat_ioctl(): clean up, use compat_ptr() properly\n (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages\n with invalid options (git-fixes).\n\n - w1: omap-hdq: cleanup to add missing newline for some\n dev_dbg (bsc#1051510).\n\n - watchdog: sp805: fix restart handler (bsc#1111666).\n\n - wil6210: add general initialization/size checks\n (bsc#1111666).\n\n - wil6210: check rx_buff_mgmt before accessing it\n (bsc#1111666).\n\n - wil6210: ignore HALP ICR if already handled\n (bsc#1111666).\n\n - wil6210: make sure Rx ring sizes are correlated\n (git-fixes).\n\n - work around mvfs bug (bsc#1162063).\n\n - x86/apic: Install an empty physflat_init_apic_ldr\n (bsc#1163309).\n\n - x86/cpu/amd: Make erratum #1054 a legacy erratum\n (bsc#1114279).\n\n - x86/events/intel/ds: Add PERF_SAMPLE_PERIOD into\n PEBS_FREERUNNING_FLAGS (git-fixes).\n\n - x86: Fix early boot crash on gcc-10, third try\n (bsc#1114279).\n\n - x86/(mce,mm): Unmap the entire page if the whole page is\n affected and poisoned (bsc#1172257).\n\n - x86/reboot/quirks: Add MacBook6,1 reboot quirk\n (bsc#1114279).\n\n - xfrm: fix error in comment (git fixes).\n\n - xhci: Fix enumeration issue when setting max packet size\n for FS devices (git-fixes).\n\n - xhci: Fix incorrect EP_STATE_MASK (git-fixes).\n\n - vt: vt_ioctl: remove unnecessary console allocation\n checks (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1148868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1161016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1162063\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1166985\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168081\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169194\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170592\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172458\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172537\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172538\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172781\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172782\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172783\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174658\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174685\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174843\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174844\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174887\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.1\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/07\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.1)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.1\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-docs-html-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-macros-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-build-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-obs-qa-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-source-vanilla-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-syms-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-debugsource-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-4.12.14-lp151.28.59.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.1\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp151.28.59.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-10-21T16:52:40", "description": "Zhipeng Xie discovered that an infinite loop could be triggered in the CFS Linux kernel process scheduler. A local attacker could possibly use this to cause a denial of service. (CVE-2018-20784)\n\nNicolas Waisman discovered that the WiFi driver stack in the Linux kernel did not properly validate SSID lengths. A physically proximate attacker could use this to cause a denial of service (system crash).\n(CVE-2019-17133)\n\nNicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the Linux kernel performed DMA from a kernel stack. A local attacker could use this to cause a denial of service (system crash). (CVE-2019-17075).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-12-03T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-4211-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-20784", "CVE-2019-17075", "CVE-2019-17133"], "modified": "2023-10-20T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1063-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1099-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1126-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1130-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-powerpc-e500mc", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-powerpc-smp", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-powerpc64-emb", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-powerpc64-smp", "cpe:/o:canonical:ubuntu_linux:16.04:-:lts"], "id": "UBUNTU_USN-4211-1.NASL", "href": "https://www.tenable.com/plugins/nessus/131565", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-4211-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(131565);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/10/20\");\n\n script_cve_id(\"CVE-2018-20784\", \"CVE-2019-17075\", \"CVE-2019-17133\");\n script_xref(name:\"USN\", value:\"4211-1\");\n\n script_name(english:\"Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-4211-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Ubuntu host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"Zhipeng Xie discovered that an infinite loop could be triggered in the\nCFS Linux kernel process scheduler. A local attacker could possibly\nuse this to cause a denial of service. (CVE-2018-20784)\n\nNicolas Waisman discovered that the WiFi driver stack in the Linux\nkernel did not properly validate SSID lengths. A physically proximate\nattacker could use this to cause a denial of service (system crash).\n(CVE-2019-17133)\n\nNicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for the\nLinux kernel performed DMA from a kernel stack. A local attacker could\nuse this to cause a denial of service (system crash). (CVE-2019-17075).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://ubuntu.com/security/notices/USN-4211-1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-17133\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/02/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/12/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/12/03\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1063-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1099-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1126-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-1130-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-powerpc-e500mc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-powerpc-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-powerpc64-emb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4.0-170-powerpc64-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04:-:lts\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_copyright(english:\"Ubuntu Security Notice (C) 2019-2023 Canonical, Inc. / NASL script (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\ninclude('debian_package.inc');\ninclude('ksplice.inc');\n\nif ( ! get_kb_item('Host/local_checks_enabled') ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nvar os_release = get_kb_item('Host/Ubuntu/release');\nif ( isnull(os_release) ) audit(AUDIT_OS_NOT, 'Ubuntu');\nos_release = chomp(os_release);\nif (! ('16.04' >< os_release)) audit(AUDIT_OS_NOT, 'Ubuntu 16.04', 'Ubuntu ' + os_release);\nif ( ! get_kb_item('Host/Debian/dpkg-l') ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 's390' >!< cpu && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Ubuntu', cpu);\n\nvar kernel_mappings = {\n '16.04': {\n '4.4.0': {\n 'generic': '4.4.0-170',\n 'generic-lpae': '4.4.0-170',\n 'lowlatency': '4.4.0-170',\n 'powerpc-e500mc': '4.4.0-170',\n 'powerpc-smp': '4.4.0-170',\n 'powerpc64-emb': '4.4.0-170',\n 'powerpc64-smp': '4.4.0-170',\n 'kvm': '4.4.0-1063',\n 'aws': '4.4.0-1099',\n 'raspi2': '4.4.0-1126',\n 'snapdragon': '4.4.0-1130'\n }\n }\n};\n\nvar host_kernel_release = get_kb_item_or_exit('Host/uname-r');\nvar host_kernel_version = get_kb_item_or_exit('Host/Debian/kernel-version');\nvar host_kernel_base_version = get_kb_item_or_exit('Host/Debian/kernel-base-version');\nvar host_kernel_type = get_kb_item_or_exit('Host/Debian/kernel-type');\nif(empty_or_null(kernel_mappings[os_release][host_kernel_base_version][host_kernel_type])) audit(AUDIT_INST_VER_NOT_VULN, 'kernel ' + host_kernel_release);\n\nvar extra = '';\nvar kernel_fixed_version = kernel_mappings[os_release][host_kernel_base_version][host_kernel_type];\nif (deb_ver_cmp(ver1:host_kernel_version, ver2:kernel_fixed_version) < 0)\n{\n extra = extra + 'Running Kernel level of ' + host_kernel_version + ' does not meet the minimum fixed level of ' + kernel_fixed_version + ' for this advisory.\\n\\n';\n}\n else\n{\n audit(AUDIT_PATCH_INSTALLED, 'Kernel package for USN-4211-1');\n}\n\nif (get_one_kb_item('Host/ksplice/kernel-cves'))\n{\n var cve_list = make_list('CVE-2018-20784', 'CVE-2019-17075', 'CVE-2019-17133');\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for USN-4211-1');\n }\n else\n {\n extra = extra + ksplice_reporting_text();\n }\n}\nif (extra) {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : extra\n );\n exit(0);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:07:40", "description": "This update for the Linux Kernel 4.4.180-94_116 fixes several issues.\n\nThe following security issues were fixed :\n\nCVE-2020-14331: Fixed a buffer over-write in vgacon_scroll (bsc#1174247).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c (bsc#1173659).\n\nCVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera USB driver (bsc#1173942).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-08T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2499-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2020-11668", "CVE-2020-14331"], "modified": "2020-09-10T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_129-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_116-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_116-default-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2499-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140383", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2499-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140383);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/10\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2020-11668\", \"CVE-2020-14331\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2499-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for the Linux Kernel 4.4.180-94_116 fixes several issues.\n\nThe following security issues were fixed :\n\nCVE-2020-14331: Fixed a buffer over-write in vgacon_scroll\n(bsc#1174247).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c\n(bsc#1173659).\n\nCVE-2020-11668: Fixed a memory corruption issue in the Xirlink camera\nUSB driver (bsc#1173942).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173942\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-11668/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202499-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e2d0f5a7\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server for SAP 12-SP3 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP3-2020-2499=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2 :\n\nzypper in -t patch SUSE-SLE-SAP-12-SP2-2020-2493=1\n\nSUSE Linux Enterprise Server 12-SP3-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-2499=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-2493=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_129-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_116-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_180-94_116-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/09/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/09/08\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2|3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2/3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_116-default-3-2.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_180-94_116-default-debuginfo-3-2.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_121-92_129-default-4-2.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:22", "description": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using ACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect (bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the cmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition incdev_get of char_dev.c. This could lead to local escalation of privilege. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM implementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt ACPI variable, which could be used by attackers to bypass lockdown or secure boot restrictions (bnc#1173567).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c, related to invalid length checks for variable elements in a beacon head (bnc#1152107).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-14331: Fixed a buffer over write in vgacon_scrollback_update() (bnc#1174205).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-06T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2119-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-14331", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2020-08-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-azure", "p-cpe:/a:novell:suse_linux:kernel-azure-base", "p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debugsource", "p-cpe:/a:novell:suse_linux:kernel-azure-devel", "p-cpe:/a:novell:suse_linux:kernel-syms-azure", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2119-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139361", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2119-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139361);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-14331\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2119-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-15780: A lockdown bypass for loading unsigned modules using\nACPI table injection was fixed. (bsc#1173573)\n\nCVE-2020-15393: Fixed a memory leak in usbtest_disconnect\n(bnc#1173514).\n\nCVE-2020-12771: An issue was discovered in btree_gc_coalesce in\ndrivers/md/bcache/btree.c has a deadlock if a coalescing operation\nfails (bnc#1171732).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10773: Fixed a memory leak on s390/s390x, in the\ncmm_timeout_hander in file arch/s390/mm/cmm.c (bnc#1172999).\n\nCVE-2020-14416: Fixed a race condition in tty->disc_data handling in\nthe slip and slcan line discipline could lead to a use-after-free.\nThis affects drivers/net/slip/slip.c and drivers/net/can/slcan.c\n(bnc#1162002).\n\nCVE-2020-0305: Fixed a possible use-after-free due to a race condition\nincdev_get of char_dev.c. This could lead to local escalation of\nprivilege. User interaction is not needed for exploitation\n(bnc#1174462).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. This flaw allowed a local\nattacker with user privileges to cause a denial of service\n(bnc#1173265).\n\nCVE-2020-10781: Fixed a denial of service issue in the ZRAM\nimplementation (bnc#1173074).\n\nCVE-2019-20908: Fixed incorrect access permissions for the efivar_ssdt\nACPI variable, which could be used by attackers to bypass lockdown or\nsecure boot restrictions (bnc#1173567).\n\nCVE-2019-16746: Fixed a buffer overflow in net/wireless/nl80211.c,\nrelated to invalid length checks for variable elements in a beacon\nhead (bnc#1152107).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth may have allowed an unauthenticated user\nto complete authentication without pairing credentials via adjacent\naccess. An unauthenticated, adjacent attacker could impersonate a\nBluetooth BR/EDR master or slave to pair with a previously paired\nremote device to successfully complete the authentication procedure\nwithout knowing the link key (bnc#1171988).\n\nCVE-2020-14331: Fixed a buffer over write in\nvgacon_scrollback_update() (bnc#1174205).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104967\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173659\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174130\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202119-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?2d509505\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2119=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-base-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-base-debuginfo-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-debuginfo-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-debugsource-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-azure-devel-4.12.14-16.22.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-syms-azure-4.12.14-16.22.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-24T14:28:32", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - An issue was discovered in the Linux kernel before 4.18.7. In block/blk-core.c, there is an\n __blk_drain_queue() use-after-free because a certain error case is mishandled.(CVE-2018-20856)\n\n - In the Linux kernel before 5.1.7, a device can be tracked by an attacker using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). An attack may be conducted by hosting a crafted web page that uses WebRTC or gQUIC to force UDP traffic to attacker-controlled IP addresses.(CVE-2019-10638)\n\n - The Linux kernel 4.x (starting from 4.1) and 5.x before 5.0.8 allows Information Exposure (partial kernel address disclosure), leading to a KASLR bypass.\n Specifically, it is possible to extract the KASLR kernel image offset using the IP ID values the kernel produces for connection-less protocols (e.g., UDP and ICMP). When such traffic is sent to multiple destination IP addresses, it is possible to obtain hash collisions (of indices to the counter array) and thereby obtain the hashing key (via enumeration). This key contains enough bits from a kernel address (of a static variable) so when the key is extracted (via enumeration), the offset of the kernel image is exposed. This attack can be carried out remotely, by the attacker forcing the target device to send UDP or ICMP (or certain other) traffic to attacker-controlled IP addresses. Forcing a server to send UDP traffic is trivial if the server is a DNS server. ICMP traffic is trivial if the server answers ICMP Echo requests (ping). For client targets, if the target visits the attacker's web page, then WebRTC or gQUIC can be used to force UDP traffic to attacker-controlled IP addresses.(CVE-2019-10639)\n\n - The Linux kernel was found vulnerable to an integer overflow in the drivers/video/fbdev/uvesafb.c:uvesafb_setcmap() function. The vulnerability could result in local attackers being able to crash the kernel or potentially elevate privileges.(CVE-2018-13406)\n\n - The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack.(CVE-2019-3874)\n\n - The Linux kernel before 5.1-rc5 allows page-i1/4z_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests.(CVE-2019-11487)\n\n - A flaw was found in the Linux kernel's implementation of ext4 extent management. The kernel doesn't correctly initialize memory regions in the extent tree block which may be exported to a local user to obtain sensitive information by reading empty/uninitialized data from the filesystem.(CVE-2019-11833)\n\n - A flaw was found in the Linux kernel's implementation of the Bluetooth Human Interface Device Protocol (HIDP). A local attacker with access permissions to the Bluetooth device can issue an IOCTL which will trigger the do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c.c. This function can leak potentially sensitive information from the kernel stack memory via a HIDPCONNADD command because a name field may not be correctly NULL terminated.(CVE-2019-11884)\n\n - The Linux kernel is vulnerable to an out-of-bounds read in ext4/balloc.c:ext4_valid_block_bitmap() function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted ext4 image to cause a crash.(CVE-2018-1093)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2019-09-24T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-2068)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-1093", "CVE-2018-13406", "CVE-2018-20856", "CVE-2019-10638", "CVE-2019-10639", "CVE-2019-11487", "CVE-2019-11833", "CVE-2019-11884", "CVE-2019-3874"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-debuginfo", "p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-2068.NASL", "href": "https://www.tenable.com/plugins/nessus/129261", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(129261);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-1093\",\n \"CVE-2018-13406\",\n \"CVE-2018-20856\",\n \"CVE-2019-10638\",\n \"CVE-2019-10639\",\n \"CVE-2019-11487\",\n \"CVE-2019-11833\",\n \"CVE-2019-11884\",\n \"CVE-2019-3874\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-2068)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - An issue was discovered in the Linux kernel before\n 4.18.7. In block/blk-core.c, there is an\n __blk_drain_queue() use-after-free because a certain\n error case is mishandled.(CVE-2018-20856)\n\n - In the Linux kernel before 5.1.7, a device can be\n tracked by an attacker using the IP ID values the\n kernel produces for connection-less protocols (e.g.,\n UDP and ICMP). When such traffic is sent to multiple\n destination IP addresses, it is possible to obtain hash\n collisions (of indices to the counter array) and\n thereby obtain the hashing key (via enumeration). An\n attack may be conducted by hosting a crafted web page\n that uses WebRTC or gQUIC to force UDP traffic to\n attacker-controlled IP addresses.(CVE-2019-10638)\n\n - The Linux kernel 4.x (starting from 4.1) and 5.x before\n 5.0.8 allows Information Exposure (partial kernel\n address disclosure), leading to a KASLR bypass.\n Specifically, it is possible to extract the KASLR\n kernel image offset using the IP ID values the kernel\n produces for connection-less protocols (e.g., UDP and\n ICMP). When such traffic is sent to multiple\n destination IP addresses, it is possible to obtain hash\n collisions (of indices to the counter array) and\n thereby obtain the hashing key (via enumeration). This\n key contains enough bits from a kernel address (of a\n static variable) so when the key is extracted (via\n enumeration), the offset of the kernel image is\n exposed. This attack can be carried out remotely, by\n the attacker forcing the target device to send UDP or\n ICMP (or certain other) traffic to attacker-controlled\n IP addresses. Forcing a server to send UDP traffic is\n trivial if the server is a DNS server. ICMP traffic is\n trivial if the server answers ICMP Echo requests\n (ping). For client targets, if the target visits the\n attacker's web page, then WebRTC or gQUIC can be used\n to force UDP traffic to attacker-controlled IP\n addresses.(CVE-2019-10639)\n\n - The Linux kernel was found vulnerable to an integer\n overflow in the\n drivers/video/fbdev/uvesafb.c:uvesafb_setcmap()\n function. The vulnerability could result in local\n attackers being able to crash the kernel or potentially\n elevate privileges.(CVE-2018-13406)\n\n - The SCTP socket buffer used by a userspace application\n is not accounted by the cgroups subsystem. An attacker\n can use this flaw to cause a denial of service\n attack.(CVE-2019-3874)\n\n - The Linux kernel before 5.1-rc5 allows\n page-i1/4z_refcount reference count overflow, with\n resultant use-after-free issues, if about 140 GiB of\n RAM exists. This is related to fs/fuse/dev.c,\n fs/pipe.c, fs/splice.c, include/linux/mm.h,\n include/linux/pipe_fs_i.h, kernel/trace/trace.c,\n mm/gup.c, and mm/hugetlb.c. It can occur with FUSE\n requests.(CVE-2019-11487)\n\n - A flaw was found in the Linux kernel's implementation\n of ext4 extent management. The kernel doesn't correctly\n initialize memory regions in the extent tree block\n which may be exported to a local user to obtain\n sensitive information by reading empty/uninitialized\n data from the filesystem.(CVE-2019-11833)\n\n - A flaw was found in the Linux kernel's implementation\n of the Bluetooth Human Interface Device Protocol\n (HIDP). A local attacker with access permissions to the\n Bluetooth device can issue an IOCTL which will trigger\n the do_hidp_sock_ioctl function in\n net/bluetooth/hidp/sock.c.c. This function can leak\n potentially sensitive information from the kernel stack\n memory via a HIDPCONNADD command because a name field\n may not be correctly NULL terminated.(CVE-2019-11884)\n\n - The Linux kernel is vulnerable to an out-of-bounds read\n in ext4/balloc.c:ext4_valid_block_bitmap() function. An\n attacker could trick a legitimate user or a privileged\n attacker could exploit this by mounting a crafted ext4\n image to cause a crash.(CVE-2018-1093)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-2068\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1059e72a\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/09/25\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/09/24\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-514.44.5.10.h221\",\n \"kernel-debuginfo-3.10.0-514.44.5.10.h221\",\n \"kernel-debuginfo-common-x86_64-3.10.0-514.44.5.10.h221\",\n \"kernel-devel-3.10.0-514.44.5.10.h221\",\n \"kernel-headers-3.10.0-514.44.5.10.h221\",\n \"kernel-tools-3.10.0-514.44.5.10.h221\",\n \"kernel-tools-libs-3.10.0-514.44.5.10.h221\",\n \"perf-3.10.0-514.44.5.10.h221\",\n \"python-perf-3.10.0-514.44.5.10.h221\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:51", "description": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14331: A buffer over write in vgacon_scroll was fixed (bnc#1174205).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c where incorrect access permissions for the efivar_ssdt ACPI variable could be used by attackers to bypass lockdown or secure boot restrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\nCVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c where injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a memory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a deadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: net/wireless/nl80211.c did not check the length of variable elements in a beacon head, leading to a buffer overflow (bnc#1152107).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access disabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in crypto_authenc_extractkeys in crypto/authenc.c in the IPsec Cryptographic algorithm's module, authenc. When a payload longer than 4 bytes, and is not following 4-byte alignment boundary guidelines, it causes a buffer over-read threat, leading to a system crash. This flaw allowed a local attacker with user privileges to cause a denial of service (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was fixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the slip and slcan line discipline could lead to a use-after-free, aka CID-0ace17d56824. This affects drivers/net/slip/slip.c and drivers/net/can/slcan.c (bnc#1162002).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-08-06T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2122-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2019-16746", "CVE-2019-20908", "CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10769", "CVE-2020-10773", "CVE-2020-10781", "CVE-2020-12771", "CVE-2020-12888", "CVE-2020-14331", "CVE-2020-14416", "CVE-2020-15393", "CVE-2020-15780"], "modified": "2020-08-13T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2122-1.NASL", "href": "https://www.tenable.com/plugins/nessus/139363", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2122-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139363);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/08/13\");\n\n script_cve_id(\"CVE-2019-16746\", \"CVE-2019-20908\", \"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10769\", \"CVE-2020-10773\", \"CVE-2020-10781\", \"CVE-2020-12771\", \"CVE-2020-12888\", \"CVE-2020-14331\", \"CVE-2020-14416\", \"CVE-2020-15393\", \"CVE-2020-15780\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2122-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-14331: A buffer over write in vgacon_scroll was fixed\n(bnc#1174205).\n\nCVE-2020-10135: Legacy pairing and secure-connections pairing\nauthentication in Bluetooth BR/EDR Core Specification v5.2 and earlier\nmay have allowed an unauthenticated user to complete authentication\nwithout pairing credentials via adjacent access. An unauthenticated,\nadjacent attacker could impersonate a Bluetooth BR/EDR master or slave\nto pair with a previously paired remote device to successfully\ncomplete the authentication procedure without knowing the link key\n(bnc#1171988).\n\nCVE-2020-0305: In cdev_get of char_dev.c, there is a possible\nuse-after-free due to a race condition. This could lead to local\nescalation of privilege with System execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1174462).\n\nCVE-2019-20908: An issue was discovered in drivers/firmware/efi/efi.c\nwhere incorrect access permissions for the efivar_ssdt ACPI variable\ncould be used by attackers to bypass lockdown or secure boot\nrestrictions, aka CID-1957a85b0032 (bnc#1173567).\n\nCVE-2020-10781: zram sysfs resource consumption was fixed\n(bnc#1173074).\n\nCVE-2020-15780: An issue was discovered in\ndrivers/acpi/acpi_configfs.c where injection of malicious ACPI tables\nvia configfs could be used by attackers to bypass lockdown and secure\nboot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\nCVE-2020-15393: usbtest_disconnect in drivers/usb/misc/usbtest.c had a\nmemory leak, aka CID-28ebeb8db770 (bnc#1173514).\n\nCVE-2020-12771: btree_gc_coalesce in drivers/md/bcache/btree.c had a\ndeadlock if a coalescing operation fails (bnc#1171732).\n\nCVE-2019-16746: net/wireless/nl80211.c did not check the length of\nvariable elements in a beacon head, leading to a buffer overflow\n(bnc#1152107).\n\nCVE-2020-12888: The VFIO PCI driver mishandled attempts to access\ndisabled memory space (bnc#1171868).\n\nCVE-2020-10769: A buffer over-read flaw was found in\ncrypto_authenc_extractkeys in crypto/authenc.c in the IPsec\nCryptographic algorithm's module, authenc. When a payload longer than\n4 bytes, and is not following 4-byte alignment boundary guidelines, it\ncauses a buffer over-read threat, leading to a system crash. This flaw\nallowed a local attacker with user privileges to cause a denial of\nservice (bnc#1173265).\n\nCVE-2020-10773: A kernel stack information leak on s390/s390x was\nfixed (bnc#1172999).\n\nCVE-2020-14416: A race condition in tty->disc_data handling in the\nslip and slcan line discipline could lead to a use-after-free, aka\nCID-0ace17d56824. This affects drivers/net/slip/slip.c and\ndrivers/net/can/slcan.c (bnc#1162002).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104967\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1150660\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1151927\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152107\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152624\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1158983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1159058\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1162002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163309\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1167104\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170442\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170617\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171424\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171529\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171530\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171673\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171753\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171759\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171761\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171835\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171868\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172687\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172719\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172999\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173146\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173265\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173280\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173826\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173833\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173845\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174113\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174122\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174123\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174130\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-16746/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2019-20908/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-0305/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10135/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10769/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10773/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-10781/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12771/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-12888/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14331/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-14416/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15393/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2020-15780/\"\n );\n # https://www.suse.com/support/update/announcement/2020/suse-su-20202122-1\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9978d396\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12-SP5 :\n\nzypper in -t patch SUSE-SLE-WE-12-SP5-2020-2122=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SDK-12-SP5-2020-2122=1\n\nSUSE Linux Enterprise Server 12-SP5 :\n\nzypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-2122=1\n\nSUSE Linux Enterprise Live Patching 12-SP5 :\n\nzypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2020-2122=1\n\nSUSE Linux Enterprise High Availability 12-SP5 :\n\nzypper in -t patch SUSE-SLE-HA-12-SP5-2020-2122=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/09/24\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/04\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/06\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(5)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP5\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-base-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-base-debuginfo-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-debuginfo-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-debugsource-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-default-devel-4.12.14-122.29.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"5\", reference:\"kernel-syms-4.12.14-122.29.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:06:58", "description": "The openSUSE Leap 15.2 kernel was updated to receive various security and bugfixes.\n\nThis update is signed with the new UEFI signing key for openSUSE. It contains rebuilds of all available KMP packages also rebuilt with the new UEFi signing key. (boo#1174543)\n\nThe following security bugs were fixed :\n\n - CVE-2020-14356: A use after free vulnerability in cgroup BPF component was fixed (bsc#1175213).\n\n - CVE-2020-14331: A buffer over write in vgacon_scroll was fixed (bnc#1174205).\n\n - CVE-2020-16166: The Linux kernel allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG, aka CID-f227e3ec3b5c. This is related to drivers/char/random.c and kernel/time/timer.c (bnc#1174757).\n\n - CVE-2020-10135: Legacy pairing and secure-connections pairing authentication in Bluetooth® BR/EDR Core Specification v5.2 and earlier may have allowed an unauthenticated user to complete authentication without pairing credentials via adjacent access. An unauthenticated, adjacent attacker could impersonate a Bluetooth BR/EDR master or slave to pair with a previously paired remote device to successfully complete the authentication procedure without knowing the link key (bnc#1171988).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1174462).\n\n - CVE-2020-15780: An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-10781: zram sysfs resource consumption was fixed (bnc#1173074).\n\nThe following non-security bugs were fixed :\n\n - 9p/trans_fd: Fix concurrency del of req_list in p9_fd_cancelled/p9_read_work (git-fixes).\n\n - ACPICA: Dispatcher: add status checks (git-fixes).\n\n - ACPI/IORT: Fix PMCG node single ID mapping handling (git-fixes).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z (git-fixes).\n\n - ACPI: video: Use native backlight on Acer TravelMate 5735Z (git-fixes).\n\n - af_key: pfkey_dump needs parameter validation (git-fixes).\n\n - agp/intel: Fix a memory leak on module initialisation failure (git-fixes).\n\n - ALSA: asihpi: delete duplicated word (git-fixes).\n\n - ALSA: atmel: Remove invalid 'fall through' comments (git-fixes).\n\n - ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n\n - ALSA: echoaduio: Drop superfluous volatile modifier (git-fixes).\n\n - ALSA: echoaudio: Address bugs in the interrupt handling (git-fixes).\n\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume() (git-fixes).\n\n - ALSA: echoaudio: Prevent races in calls to set_audio_format() (git-fixes).\n\n - ALSA: echoaudio: Prevent some noise on unloading the module (git-fixes).\n\n - ALSA: echoaudio: Race conditions around 'opencount' (git-fixes).\n\n - ALSA: echoaudio: re-enable IRQs on failure path (git-fixes).\n\n - ALSA: echoaudio: Remove redundant check (git-fixes).\n\n - ALSA: firewire: fix kernel-doc (git-fixes).\n\n - ALSA: hda: Add support for Loongson 7A1000 controller (git-fixes).\n\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D (git-fixes).\n\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection commands (git-fixes).\n\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get value (git-fixes).\n\n - ALSA: hda: Enable sync-write operation as default for all controllers (git-fixes).\n\n - ALSA: hda: fix NULL pointer dereference during suspend (git-fixes).\n\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation (git-fixes).\n\n - ALSA: hda - fix the micmute led status for Lenovo ThinkCentre AIO (git-fixes).\n\n - ALSA: hda/hdmi: Add quirk to force connectivity (git-fixes).\n\n - ALSA: hda/hdmi: Fix keep_power assignment for non-component devices (git-fixes).\n\n - ALSA: hda/hdmi: Use force connectivity quirk on another HP desktop (git-fixes).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H and EKL (jsc#SLE-13261).\n\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for Loongson-3 laptops (git-fixes).\n\n - ALSA: hda/realtek - change to suitable link model for ASUS platform (git-fixes).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate B311R-31 with ALC256 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G14(G401) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG Zephyrus G15(GA502) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and UX534 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563 (git-fixes).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function for intel reference board (alc256) (git-fixes).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding quirk for Samsung Notebook Pen S (git-fixes).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound (git-fixes).\n\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning (git-fixes).\n\n - ALSA: hda/realtek - fixup for yet another Intel reference board (git-fixes).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).\n\n - ALSA: hda - reverse the setting value in the micmute_led_set (git-fixes).\n\n - ALSA: hda/tegra: Disable sync-write operation (git-fixes).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel platforms (git-fixes).\n\n - ALSA: info: Drop WARN_ON() from buffer NULL sanity check (git-fixes).\n\n - ALSA: isa: delete repeated words in comments (git-fixes).\n\n - ALSA: isa/gus: remove 'set but not used' warning (git-fixes).\n\n - ALSA: isa/gus: remove -Wmissing-prototypes warnings (git-fixes).\n\n - ALSA: line6: add hw monitor volume control for POD HD500 (git-fixes).\n\n - ALSA: line6: Perform sanity check for each URB creation (git-fixes).\n\n - ALSA: line6: Sync the pending work cancel at disconnection (git-fixes).\n\n - ALSA: line6: Use kmemdup in podhd_set_monitor_level() (git-fixes).\n\n - ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warnings (git-fixes).\n\n - ALSA: pci/au88x0: remove 'defined but not used' warnings (git-fixes).\n\n - ALSA: pci/aw2-saa7146: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n\n - ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n\n - ALSA: pci: delete repeated words in comments (git-fixes).\n\n - ALSA: pci/echoaudio: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/emu10k1: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/es1938: remove 'set but not used' warning (git-fixes).\n\n - ALSA: pci/fm801: fix kernel-doc (git-fixes).\n\n - ALSA: pci/korg1212: remove 'set but not used' warnings (git-fixes).\n\n - ALSA: pci/oxygen/xonar_wm87x6: remove always true condition (git-fixes).\n\n - ALSA: pci/rme9652/hdspm: remove always true condition (git-fixes).\n\n - ALSA: pci/via82xx: remove 'set but not used' warnings (git-fixes).\n\n - ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n\n - ALSA: seq: oss: Serialize ioctls (git-fixes).\n\n - ALSA: usb-audio: Add implicit feedback quirk for SSL2 (git-fixes).\n\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB (git-fixes).\n\n - ALSA: usb-audio: Add registration quirk for Kingston HyperX Cloud Flight S (git-fixes).\n\n - ALSA: usb-audio: add startech usb audio dock name (git-fixes).\n\n - ALSA: usb-audio: Add support for Lenovo ThinkStation P620 (git-fixes).\n\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume knob support (git-fixes).\n\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume control (git-fixes).\n\n - ALSA: usb-audio: endpoint : remove needless check before usb_free_coherent() (git-fixes).\n\n - ALSA: usb-audio: fix overeager device match for MacroSilicon MS2109 (bsc#1174625).\n\n - ALSA: usb-audio: Fix race against the error recovery URB submission (git-fixes).\n\n - ALSA: usb-audio: Fix some typos (git-fixes).\n\n - ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus' (git-fixes).\n\n - ALSA: usb-audio: work around streaming quirk for MacroSilicon MS2109 (git-fixes).\n\n - ALSA: usb/line6: remove 'defined but not used' warning (git-fixes).\n\n - ALSA: vx_core: remove warning for empty loop body (git-fixes).\n\n - ALSA: xen: remove 'set but not used' warning (git-fixes).\n\n - ALSA: xen: Remove superfluous fall through comments (git-fixes).\n\n - apparmor: ensure that dfa state tables have entries (git-fixes).\n\n - apparmor: fix introspection of of task mode for unconfined tasks (git-fixes).\n\n - apparmor: Fix memory leak of profile proxy (git-fixes).\n\n - apparmor: Fix use-after-free in aa_audit_rule_init (git-fixes).\n\n - apparmor: remove useless aafs_create_symlink (git-fixes).\n\n - appletalk: Fix atalk_proc_init() return path (git-fixes).\n\n - arm64: armv8_deprecated: Fix undef_hook mask for thumb setend (bsc#1175180).\n\n - arm64: cacheflush: Fix KGDB trap detection (bsc#1175188).\n\n - arm64: csum: Fix handling of bad packets (bsc#1175192).\n\n - arm64: dts: allwinner: a64: Remove unused SPDIF sound card (none bsc#1175016).\n\n - arm64: dts: clearfog-gt-8k: set gigabit PHY reset deassert delay (bsc#1175347).\n\n - arm64: dts: exynos: Fix silent hang after boot on Espresso (bsc#1175346).\n\n - arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range (none bsc#1175019).\n\n - arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY (bsc#1175345).\n\n - arm64: dts: librem5-devkit: add a vbus supply to usb0 (none bsc#1175013).\n\n - arm64: dts: ls1028a: delete extraneous #interrupt-cells for ENETC RCIE (none bsc#1175012).\n\n - arm64: dts: ls1043a-rdb: correct RGMII delay mode to rgmii-id (bsc#1174398).\n\n - arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID mode (bsc#1174398).\n\n - arm64: dts: qcom: msm8998-clamshell: Fix label on l15 regulator (git-fixes).\n\n - arm64: dts: rockchip: fix rk3399-puma gmac reset gpio (none bsc#1175021).\n\n - arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio (none bsc#1175020).\n\n - arm64: dts: rockchip: Rename dwc3 device nodes on rk3399 to make dtc happy (none bsc#1175015).\n\n - arm64: dts: rockchip: Replace RK805 PMIC node name with 'pmic' on rk3328 boards (none bsc#1175014).\n\n - arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n\n - arm64: dts: uniphier: Set SCSSI clock and reset IDs for each channel (none bsc#1175011).\n\n - arm64: errata: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n\n - arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n\n - arm64: fix the flush_icache_range arguments in machine_kexec (bsc#1175184).\n\n - arm64: hugetlb: avoid potential NULL dereference (bsc#1175183).\n\n - arm64: hw_breakpoint: Do not invoke overflow handler on uaccess watchpoints (bsc#1175189).\n\n - arm64: insn: Fix two bugs in encoding 32-bit logical immediates (bsc#1175186).\n\n - arm64: kexec_file: print appropriate variable (bsc#1175187).\n\n - arm64: kgdb: Fix single-step exception handling oops (bsc#1175191).\n\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).\n\n - arm64: Retrieve stolen time as paravirtualized guest (bsc#1172197 jsc#SLE-13593).\n\n - arm64: tegra: Enable I2C controller for EEPROM (none bsc#1175010).\n\n - arm64: tegra: Fix ethernet phy-mode for Jetson Xavier (none bsc#1175017).\n\n - arm64: tegra: Fix flag for 64-bit resources in 'ranges' property (none bsc#1175018).\n\n - arm64: tegra: Fix Tegra194 PCIe compatible string (none bsc#1175009).\n\n - arm64: vdso: Add -fasynchronous-unwind-tables to cflags (bsc#1175182).\n\n - arm64: vdso: do not free unallocated pages (bsc#1175181).\n\n - arm/arm64: Make use of the SMCCC 1.1 wrapper (bsc#1174906).\n\n - arm/arm64: Provide a wrapper for SMCCC 1.1 calls (bsc#1174906).\n\n - arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit() (bsc#1174906).\n\n - ARM: percpu.h: fix build error (git-fixes).\n\n - arm: spectre-v2: use arm_smccc_1_1_get_conduit() (bsc#1174906).\n\n - ASoC: codecs: max98373: Removed superfluous volume control from chip default (git-fixes).\n\n - ASoc: codecs: max98373: remove Idle_bias_on to let codec suspend (git-fixes).\n\n - ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK (git-fixes).\n\n - ASoC: hdac_hda: fix deadlock after PCM open error (git-fixes).\n\n - ASoC: Intel: bxt_rt298: add missing .owner field (git-fixes).\n\n - ASoC: Intel: bytcht_es8316: Add missed put_device() (git-fixes).\n\n - ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n\n - ASoC: meson: axg-tdm-interface: fix link fmt setup (git-fixes).\n\n - ASoC: meson: fixes the missed kfree() for axg_card_add_tdm_loopback (git-fixes).\n\n - ASoC: rockchip: add format and rate constraints on rk3399 (git-fixes).\n\n - ASoC: rt286: fix unexpected interrupt happens (git-fixes).\n\n - ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and enable it on the Lenovo Miix 2 10 (git-fixes).\n\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n\n - ASoC: rt5670: Fix dac- and adc- vol-tlv values being off by a factor of 10 (git-fixes).\n\n - ASoC: rt5682: Report the button event in the headset type only (git-fixes).\n\n - ASoC: SOF: nocodec: add missing .owner field (git-fixes).\n\n - ASoC: topology: fix kernel oops on route addition error (git-fixes).\n\n - ASoC: topology: fix tlvs in error handling for widget_dmixer (git-fixes).\n\n - ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n\n - ASoC: wm8974: remove unsupported clock mode (git-fixes).\n\n - ath10k: Acquire tx_lock in tx error paths (git-fixes).\n\n - ath10k: enable transmit data ack RSSI for QCA9884 (git-fixes).\n\n - ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix regression with Atheros 9271 (git-fixes).\n\n - atm: fix atm_dev refcnt leaks in atmtcp_remove_persistent (git-fixes).\n\n - AX.25: Fix out-of-bounds read in ax25_connect() (git-fixes).\n\n - AX.25: Prevent integer overflows in connect and sendmsg (git-fixes).\n\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg() (git-fixes).\n\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n\n - b43: Remove uninitialized_var() usage (git-fixes).\n\n - blk-mq: consider non-idle request as 'inflight' in blk_mq_rq_inflight() (bsc#1165933).\n\n - Bluetooth: btmtksdio: fix up firmware download sequence (git-fixes).\n\n - Bluetooth: btusb: fix up firmware download sequence (git-fixes).\n\n - Bluetooth: fix kernel oops in store_pending_adv_report (git-fixes).\n\n - Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Fix update of connection state in `hci_encrypt_cfm` (git-fixes).\n\n - Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct flags (git-fixes).\n\n - Bluetooth: hci_serdev: Only unregister device if it was registered (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt() (git-fixes).\n\n - bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bnxt_en: Init ethtool link settings after reading updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Do not allow btf_ctx_access with __int128 types (bsc#1155518).\n\n - bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n\n - bpfilter: fix up a sparse annotation (bsc#1155518).\n\n - bpfilter: Initialize pos variable (bsc#1155518).\n\n - bpfilter: reject kernel addresses (bsc#1155518).\n\n - bpfilter: switch to kernel_write (bsc#1155518).\n\n - bpf: net: Avoid copying sk_user_data of reuseport_array during sk_clone (bsc#1155518).\n\n - bpf: net: Avoid incorrect bpf_sk_reuseport_detach call (bsc#1155518).\n\n - brcmfmac: Set timeout value when configuring power save (bsc#1173468).\n\n - brcmfmac: Transform compatible string for FW loading (bsc#1169771).\n\n - bridge: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n\n - bridge: mcast: Fix MLD2 Report IPv6 payload length check (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8977 chipset (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8997 chipset (git-fixes).\n\n - btrfs: add assertions for tree == inode->io_tree to extent IO helpers (bsc#1174438).\n\n - btrfs: avoid unnecessary splits when setting bits on an extent io tree (bsc#1175377).\n\n - btrfs: change timing for qgroup reserved space for ordered extents to fix reserved space leak (bsc#1172247).\n\n - btrfs: delete the ordered isize update code (bsc#1175377).\n\n - btrfs: do not set path->leave_spinning for truncate (bsc#1175377).\n\n - btrfs: drop argument tree from btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch range is locked (bsc#1172247).\n\n - btrfs: fix a block group ref counter leak after failure to remove block group (bsc#1175149).\n\n - btrfs: fix block group leak when removing fails (bsc#1175149).\n\n - btrfs: fix bytes_may_use underflow when running balance and scrub in parallel (bsc#1175149).\n\n - btrfs: fix corrupt log due to concurrent fsync of inodes with shared extents (bsc#1175149).\n\n - btrfs: fix data block group relocation failure due to concurrent scrub (bsc#1175149).\n\n - btrfs: fix deadlock during fast fsync when logging prealloc extents beyond eof (bsc#1175377).\n\n - btrfs: fix double free on ulist after backref resolution failure (bsc#1175149).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc extent beyond eof (bsc#1174438).\n\n - btrfs: fix fatal extent_buffer readahead vs releasepage race (bsc#1175149).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT write (bsc#1174438).\n\n - btrfs: fix lost i_size update after cloning inline extent (bsc#1175377).\n\n - btrfs: fix page leaks after failure to lock page for delalloc (bsc#1175149).\n\n - btrfs: fix race between block group removal and block group creation (bsc#1175149).\n\n - btrfs: fix race between shrinking truncate and fiemap (bsc#1175377).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks and waiting for IO (bsc#1174438).\n\n - btrfs: fix space_info bytes_may_use underflow after nocow buffered write (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow during space cache writeout (bsc#1175149).\n\n - btrfs: fix wrong file range cleanup after an error filling dealloc range (bsc#1175149).\n\n - btrfs: inode: fix NULL pointer dereference if inode does not need compression (bsc#1174484).\n\n - btrfs: inode: move qgroup reserved space release to the callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: introduce per-inode file extent tree (bsc#1175377).\n\n - btrfs: make btrfs_ordered_extent naming consistent with btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: move extent_io_tree defs to their own header (bsc#1175377).\n\n - btrfs: Move free_pages_out label in inline extent handling branch in compress_file_range (bsc#1175263).\n\n - btrfs: qgroup: allow to unreserve range without releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: fix data leak caused by race between writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Remove delalloc_end argument from extent_clear_unlock_delalloc (bsc#1175149).\n\n - btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n\n - btrfs: remove unnecessary delalloc mutex for inodes (bsc#1175377).\n\n - btrfs: Rename btrfs_join_transaction_nolock (bsc#1175377).\n\n - btrfs: replace all uses of btrfs_ordered_update_i_size (bsc#1175377).\n\n - btrfs: separate out the extent io init function (bsc#1175377).\n\n - btrfs: separate out the extent leak code (bsc#1175377).\n\n - btrfs: trim: fix underflow in trim length to prevent access beyond device boundary (bsc#1175263).\n\n - btrfs: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1175377).\n\n - btrfs: use correct count in btrfs_file_write_iter() (bsc#1174438).\n\n - btrfs: use the file extent tree infrastructure (bsc#1175377).\n\n - bus: ti-sysc: Do not disable on suspend for no-idle (git-fixes).\n\n - cfg80211: check vendor command doit pointer before use (git-fixes).\n\n - clk: actions: Fix h_clk for Actions S500 SoC (git-fixes).\n\n - clk: at91: clk-generated: check best_rate against ranges (git-fixes).\n\n - clk: at91: clk-generated: continue if\n __clk_determine_rate() returns error (git-fixes).\n\n - clk: at91: sam9x60: fix main rc oscillator frequency (git-fixes).\n\n - clk: at91: sam9x60-pll: check fcore against ranges (git-fixes).\n\n - clk: at91: sam9x60-pll: use logical or for range check (git-fixes).\n\n - clk: at91: sckc: register slow_rc with accuracy option (git-fixes).\n\n - clk: bcm2835: Do not use prediv with bcm2711's PLLs (bsc#1174865).\n\n - clk: bcm63xx-gate: fix last clock availability (git-fixes).\n\n - clk: clk-atlas6: fix return value check in atlas6_clk_init() (git-fixes).\n\n - clk: iproc: round clock rate to the closest (git-fixes).\n\n - clk: qcom: gcc-sdm660: Add missing modem reset (git-fixes).\n\n - clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk (git-fixes).\n\n - clk: rockchip: Revert 'fix wrong mmc sample phase shift for rk3328' (git-fixes).\n\n - clk: scmi: Fix min and max rate when registering clocks with discrete rates (git-fixes).\n\n - clk: spear: Remove uninitialized_var() usage (git-fixes).\n\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n\n - console: newport_con: fix an issue about leak related system resources (git-fixes).\n\n - crc-t10dif: Fix potential crypto notify dead-lock (git-fixes).\n\n - crypto: caam - Fix argument type in handle_imx6_err005766 (git-fixes).\n\n - crypto: ccp - Fix use of merged scatterlists (git-fixes).\n\n - crypto: ccree - fix resource leak on error path (git-fixes).\n\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: hisilicon - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: qat - fix double free in qat_uclo_create_batch_init_list (git-fixes).\n\n - dccp: Fix possible memleak in dccp_init and dccp_fini (networking-stable-20_06_16).\n\n - Delete patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.p atch (bsc#1174627)\n\n - devinet: fix memleak in inetdev_init() (networking-stable-20_06_07).\n\n - devlink: ignore -EOPNOTSUPP errors on dumpit (bsc#1154353).\n\n - /dev/mem: Add missing memory barriers for devmem_inode (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the region (git-fixes).\n\n - devres: keep both device name and resource name in pretty name (git-fixes).\n\n - dlm: remove BUG() before panic() (git-fixes).\n\n - dmaengine: dmatest: stop completed threads when running without set channel (git-fixes).\n\n - dmaengine: dw: Initialize channel before each transfer (git-fixes).\n\n - dmaengine: fsl-edma-common: correct DSIZE_32BYTE (git-fixes).\n\n - dmaengine: fsl-edma: Fix NULL pointer exception in fsl_edma_tx_handler (git-fixes).\n\n - dmaengine: fsl-edma: fix wrong tcd endianness for big-endian cpu (git-fixes).\n\n - dmaengine: imx-sdma: Fix: Remove 'always true' comparison (git-fixes).\n\n - dmaengine: ioat setting ioat timeout as module parameter (git-fixes).\n\n - dmaengine: mcf-edma: Fix NULL pointer exception in mcf_edma_tx_handler (git-fixes).\n\n - dmaengine: sh: usb-dmac: set tx_result parameters (git-fixes).\n\n - dmaengine: tegra210-adma: Fix runtime PM imbalance on error (git-fixes).\n\n - dm: do not use waitqueue for request-based DM (bsc#1165933).\n\n - docs: fix memory.low description in cgroup-v2.rst (git-fixes). (SLE documentation might refer to cgroup-v2.rst.)\n\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n\n - dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n\n - drbd: Remove uninitialized_var() usage (git-fixes).\n\n - driver core: Avoid binding drivers to dead devices (git-fixes).\n\n - drivers/firmware/psci: Fix memory leakage in alloc_init_cpu_groups() (git-fixes).\n\n - drivers/net/wan: lapb: Corrected the usage of skb_cow (git-fixes).\n\n - drm/amd/display: Clear dm_state for fast updates (git-fixes).\n\n - drm/amd/display: Use kfree() to free rgb_user in calculate_user_regamma_ramp() (git-fixes).\n\n - drm/amdgpu/atomfirmware: fix vram_info fetching for renoir (git-fixes).\n\n - drm/amdgpu/display: use blanked rather than plane state for sync (bsc#1152489) 	* refreshed for context changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0\n\n - drm/amdgpu: do not do soft recovery if gpu_recovery=0 (git-fixes).\n\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers (git-fixes).\n\n - drm/amdgpu: fix preemption unit test (git-fixes).\n\n - drm/amdgpu/gfx10: fix race condition for kiq (git-fixes).\n\n - drm/amdgpu: Prevent kernel-infoleak in amdgpu_info_ioctl() (git-fixes).\n\n - drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr() (git-fixes).\n\n - drm/amdgpu: use %u rather than %d for sclk/mclk (git-fixes).\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M (bsc#1152472)\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M (git-fixes).\n\n - drm/arm: fix unintentional integer overflow on left shift (git-fixes).\n\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc ptr in (bsc#1152472) 	* refreshed for context changes\n\n - drm/bridge: sil_sii8620: initialize return of sii8620_readb (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Clear old error bits before AUX transfers (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment for local array (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock choice (bsc#1152489) 	* refreshed for context changes\n\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472) 	* move drm_mipi_dbi.c -> tinydrm/mipi-dbi.c\n\n - drm/etnaviv: Fix error path on failure to enable bus clk (git-fixes).\n\n - drm/exynos: fix ref count leak in mic_pre_enable (git-fixes).\n\n - drm/exynos: Properly propagate return value in drm_iommu_attach_device() (git-fixes).\n\n - drm: fix drm_dp_mst_port refcount leaks in drm_dp_mst_allocate_vcpi (git-fixes).\n\n - drm/gem: Fix a leak in drm_gem_objects_lookup() (git-fixes).\n\n - drm: hold gem reference until object is no longer accessed (git-fixes).\n\n - drm/i915: Actually emit the await_start (bsc#1174737).\n\n - drm/i915: Copy across scheduler behaviour flags across submit fences (bsc#1174737).\n\n - drm/i915: Do not poison i915_request.link on removal (bsc#1174737).\n\n - drm/i915: Drop no-semaphore boosting (bsc#1174737).\n\n - drm/i915: Eliminate the trylock for awaiting an earlier request (bsc#1174737).\n\n - drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489) 	* context changes\n\n - drm/i915: Flush execution tasklets before checking request status (bsc#1174737).\n\n - drm/i915: Flush tasklet submission before sleeping on i915_request_wait (bsc#1174737).\n\n - drm/i915/gt: Close race between engine_park and intel_gt_retire_requests (git-fixes).\n\n - drm/i915/gt: Flush submission tasklet before waiting/retiring (bsc#1174737).\n\n - drm/i915/gt: Ignore irq enabling on the virtual engines (git-fixes).\n\n - drm/i915/gt: Move new timelines to the end of active_list (git-fixes).\n\n - drm/i915/gt: Only swap to a random sibling once upon creation (bsc#1152489) 	* context changes\n\n - drm/i915/gt: Unlock engine-pm after queuing the kernel context switch (git-fixes).\n\n - drm/i915: Ignore submit-fences on the same timeline (bsc#1174737).\n\n - drm/i915: Improve the start alignment of bonded pairs (bsc#1174737).\n\n - drm/i915: Keep track of request among the scheduling lists (bsc#1174737).\n\n - drm/i915: Lock signaler timeline while navigating (bsc#1174737).\n\n - drm/i915: Mark i915_request.timeline as a volatile, rcu pointer (bsc#1174737).\n\n - drm/i915: Mark racy read of intel_engine_cs.saturated (bsc#1174737).\n\n - drm/i915: Mark up unlocked update of i915_request.hwsp_seqno (bsc#1174737).\n\n - drm/i915: Move cec_notifier to intel_hdmi_connector_unregister, v2. (bsc#1152489) 	* context changes\n\n - drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n\n - drm/i915: Prevent using semaphores to chain up to external fences (bsc#1174737).\n\n - drm/i915: Protect i915_request_await_start from early waits (bsc#1174737).\n\n - drm/i915: Pull waiting on an external dma-fence into its routine (bsc#1174737).\n\n - drm/i915: Rely on direct submission to the queue (bsc#1174737).\n\n - drm/i915: Remove wait priority boosting (bsc#1174737).\n\n - drm/i915: Reorder await_execution before await_request (bsc#1174737).\n\n - drm/i915: Return early for await_start on same timeline (bsc#1174737).\n\n - drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n\n - drm/imx: fix use after free (git-fixes).\n\n - drm/imx: imx-ldb: Disable both channels for split mode in enc->disable() (git-fixes).\n\n - drm/imx: tve: fix regulator_disable error path (git-fixes).\n\n - drm/ingenic: Fix incorrect assumption about plane->index (bsc#1152489) 	* refreshed for context changes\n\n - drm: mcde: Fix display initialization problem (git-fixes).\n\n - drm/mediatek: Check plane visibility in atomic_update (git-fixes).\n\n - drm/mipi: use dcs write for mipi_dsi_dcs_set_tear_scanline (git-fixes).\n\n - drm/msm/dpu: allow initialization of encoder locks during encoder init (git-fixes).\n\n - drm/msm: fix potential memleak in error branch (git-fixes).\n\n - drm/nouveau/fbcon: fix module unload when fbcon init has failed for some reason (git-fixes).\n\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2 structure (git-fixes).\n\n - drm/nouveau/i2c/g94-: increase NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA panel (git-fixes).\n\n - drm: panel-orientation-quirks: Use generic orientation-data for Acer S1003 (git-fixes).\n\n - drm/panel: otm8009a: Drop unnessary backlight_device_unregister() (git-fixes).\n\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel (git-fixes).\n\n - drm/radeon: fix array out-of-bounds read and write issues (git-fixes).\n\n - drm/radeon: fix double free (git-fixes).\n\n - drm/stm: repair runtime power management (git-fixes).\n\n - drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n\n - drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on A20 (git-fixes).\n\n - drm/tegra: hub: Do not enable orphaned window group (git-fixes).\n\n - drm/vgem: Replace opencoded version of drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed for context changes\n\n - drm/vmwgfx: Fix two list_for_each loop exit tests (git-fixes).\n\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer (git-fixes).\n\n - exfat: add missing brelse() calls on error paths (git-fixes).\n\n - exfat: fix incorrect update of stream entry in\n __exfat_truncate() (git-fixes).\n\n - exfat: fix memory leak in exfat_parse_param() (git-fixes).\n\n - exfat: move setting VOL_DIRTY over exfat_remove_entries() (git-fixes).\n\n - fbdev: Detect integer underflow at 'struct fbcon_ops'->clear_margins (git-fixes).\n\n - firmware: arm_scmi: Fix SCMI genpd domain probing (git-fixes).\n\n - firmware: arm_scmi: Keep the discrete clock rates sorted (git-fixes).\n\n - firmware: arm_sdei: use common SMCCC_CONDUIT_* (bsc#1174906).\n\n - firmware: Fix a reference count leak (git-fixes).\n\n - firmware_loader: fix memory leak for paged buffer (bsc#1175367).\n\n - firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n\n - firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n\n - firmware: smccc: Add function to fetch SMCCC version (bsc#1174906).\n\n - firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to identify SMCCC v1.1 and above (bsc#1174906).\n\n - firmware: smccc: Add the definition for SMCCCv1.2 version/error codes (bsc#1174906).\n\n - firmware: smccc: Drop smccc_version enum and use ARM_SMCCC_VERSION_1_x instead (bsc#1174906).\n\n - firmware: smccc: Refactor SMCCC specific bits into separate file (bsc#1174906).\n\n - firmware: smccc: Update link to latest SMCCC specification (bsc#1174906).\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fsl/fman: detect FMan erratum A050385 (bsc#1174396) Update arm64 config file\n\n - fuse: copy_file_range should truncate cache (git-fixes).\n\n - fuse: fix copy_file_range cache issues (git-fixes).\n\n - fuse: Fix parameter for FS_IOC_(GET,SET)FLAGS (bsc#1175176).\n\n - fuse: fix weird page warning (bsc#1175175).\n\n - geneve: fix an uninitialized value in geneve_changelink() (git-fixes).\n\n - genirq/affinity: Improve __irq_build_affinity_masks() (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Remove const qualifier from node_to_cpumask argument (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Spread vectors on node according to nr_cpu ratio (bsc#1174897 ltc#187090).\n\n - gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n\n - gfs2: fix gfs2_find_jhead that returns uninitialized jhead with seq 0 (bsc#1174825).\n\n - go7007: add sanity checking for endpoints (git-fixes).\n\n - gpio: arizona: handle pm_runtime_get_sync failure case (git-fixes).\n\n - gpio: arizona: put pm_runtime in case of failure (git-fixes).\n\n - gpio: max77620: Fix missing release of interrupt (git-fixes).\n\n - gpio: pca953x: disable regmap locking for automatic address incrementing (git-fixes).\n\n - gpio: pca953x: Fix GPIO resource leak on Intel Galileo Gen 2 (git-fixes).\n\n - gpio: pca953x: Override IRQ for one of the expanders on Galileo Gen 2 (git-fixes).\n\n - gpu: host1x: Detach driver on unregister (git-fixes).\n\n - habanalabs: increase timeout during reset (git-fixes).\n\n - HID: alps: support devices with report id 2 (git-fixes).\n\n - HID: apple: Disable Fn-key key-re-mapping on clone keyboards (git-fixes).\n\n - HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor override (git-fixes).\n\n - HID: logitech-hidpp: avoid repeated 'multiplier = ' log messages (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: quirks: Always poll Obins Anne Pro 2 keyboard (git-fixes).\n\n - HID: quirks: Ignore Simply Automated UPB PIM (git-fixes).\n\n - HID: quirks: Remove ITE 8595 entry from hid_have_special_driver (git-fixes).\n\n - HID: steam: fixes race in handling device list (git-fixes).\n\n - hippi: Fix a size used in a 'pci_free_consistent()' in an error handling path (git-fixes).\n\n - hwmon: (adm1275) Make sure we are reading enough data for different chips (git-fixes).\n\n - hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow (git-fixes).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable attribute (git-fixes).\n\n - hwmon: (nct6775) Accept PECI Calibration as temperature source for NCT6798D (git-fixes).\n\n - hwmon: (scmi) Fix potential buffer overflow in scmi_hwmon_probe() (git-fixes).\n\n - hwrng: ks-sa - Fix runtime PM imbalance on error (git-fixes).\n\n - i2c: also convert placeholder function to return errno (git-fixes).\n\n - i2c: eg20t: Load module automatically if ID matches (git-fixes).\n\n - i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n\n - i2c: iproc: fix race between client unreg and isr (git-fixes).\n\n - i2c: rcar: always clear ICSAR to avoid side effects (git-fixes).\n\n - i2c: rcar: avoid race when unregistering slave (git-fixes).\n\n - i2c: rcar: slave: only send STOP event when we have been addressed (git-fixes).\n\n - i2c: slave: add sanity check when unregistering (git-fixes).\n\n - i2c: slave: improve sanity check when registering (git-fixes).\n\n - i40iw: Do an RCU lookup in i40iw_add_ipv4_addr (git-fixes).\n\n - i40iw: Fix error handling in i40iw_manage_arp_cache() (git-fixes).\n\n - i40iw: fix NULL pointer dereference on a null wqe pointer (git-fixes).\n\n - i40iw: Report correct firmware version (git-fixes).\n\n - IB/cma: Fix ports memory leak in cma_configfs (git-fixes).\n\n - IB/core: Fix potential NULL pointer dereference in pkey cache (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut down (bsc#1174409).\n\n - IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n\n - IB/hfi1: Fix another case where pq is left on waitlist (bsc#1174411).\n\n - IB/hfi1: Fix memory leaks in sysfs registration and unregistration (git-fixes).\n\n - IB/hfi1: Fix module use count flaw due to leftover module put calls (bsc#1174407).\n\n - IB/hfi1, qib: Ensure RCU is locked when accessing list (git-fixes).\n\n - IB/ipoib: Fix double free of skb in case of multicast traffic in CM mode (git-fixes).\n\n - IB/mad: Fix use after free when destroying MAD agent (git-fixes).\n\n - IB/mlx4: Test return value of calls to ib_get_cached_pkey (git-fixes).\n\n - IB/mlx5: Fix 50G per lane indication (git-fixes).\n\n - IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP command (git-fixes).\n\n - IB/mlx5: Fix missing congestion control debugfs on rep rdma device (git-fixes).\n\n - IB/mlx5: Replace tunnel mpls capability bits for tunnel_offloads (git-fixes).\n\n - ibmvnic: Fix IRQ mapping disposal in error path (bsc#1175112 ltc#187459).\n\n - IB/qib: Call kobject_put() when kobject_init_and_add() fails (git-fixes).\n\n - IB/rdmavt: Always return ERR_PTR from rvt_create_mmap_info() (git-fixes).\n\n - IB/rdmavt: Delete unused routine (git-fixes).\n\n - IB/rdmavt: Fix RQ counting issues causing use of an invalid RWQE (bsc#1174770).\n\n - IB/sa: Resolv use-after-free in ib_nl_make_request() (git-fixes).\n\n - ide: Remove uninitialized_var() usage (git-fixes).\n\n - ieee802154: fix one possible memleak in adf7242_probe (git-fixes).\n\n - iio: adc: ad7780: Fix a resource handling path in 'ad7780_probe()' (git-fixes).\n\n - iio: core: add missing IIO_MOD_H2/ETHANOL string identifiers (git-fixes).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent data leak (git-fixes).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues (git-fixes).\n\n - iio:humidity:hts221 Fix alignment and data leak issues (git-fixes).\n\n - iio: improve IIO_CONCENTRATION channel type description (git-fixes).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak issues (git-fixes).\n\n - iio: magnetometer: ak8974: Fix runtime PM imbalance on error (git-fixes).\n\n - iio: mma8452: Add missed iio_device_unregister() call in mma8452_probe() (git-fixes).\n\n - iio:pressure:ms5611 Fix buffer element alignment (git-fixes).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync failure (git-fixes).\n\n - Input: elan_i2c - add more hardware ID for Lenovo laptops (git-fixes).\n\n - Input: elan_i2c - only increment wakeup count on touch (git-fixes).\n\n - Input: goodix - fix touch coordinates on Cube I15-TC (git-fixes).\n\n - Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux list (git-fixes).\n\n - Input: mms114 - add extra compatible for mms345l (git-fixes).\n\n - Input: sentelic - fix error return when fsp_reg_write fails (git-fixes).\n\n - Input: synaptics - enable InterTouch for ThinkPad X1E 1st gen (git-fixes).\n\n - integrity: remove redundant initialization of variable ret (git-fixes).\n\n - intel_th: Fix a NULL dereference when hub driver is not loaded (git-fixes).\n\n - intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n\n - intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n\n - intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - iommu/arm-smmu-v3: Do not reserve implementation defined register space (bsc#1174126).\n\n - iommu/vt-d: Enable PCI ACS for platform opt in hint (bsc#1174127).\n\n - iommu/vt-d: Update scalable mode paging structure coherency (bsc#1174128).\n\n - ionic: centralize queue reset code (bsc#1167773).\n\n - ionic: fix up filter locks and debug msgs (bsc#1167773).\n\n - ionic: keep rss hash after fw update (bsc#1167773).\n\n - ionic: unlock queue mutex in error path (bsc#1167773).\n\n - ionic: update filter id after replay (bsc#1167773).\n\n - ionic: update the queue count on open (bsc#1167773).\n\n - ionic: use mutex to protect queue operations (bsc#1167773).\n\n - ionic: use offset for ethtool regs data (bsc#1167773).\n\n - irqchip/gic: Atomically update affinity (bsc#1175195).\n\n - kabi fix for SUNRPC-dont-update-timeout-value-on-connection-reset.pat ch (bsc1174263).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip (kabi).\n\n - kABI: restore signature of xfrm_policy_bysel_ctx() and xfrm_policy_byid() (bsc#1174645).\n\n - kABI workaround for enum cpuhp_state (git-fixes).\n\n - kABI workaround for struct kvm_device (git-fixes). Just change an variable to 'const' type in kvm_device.\n\n - kABI workaround for struct kvm_vcpu_arch (git-fixes).\n\n - kernel.h: remove duplicate include of asm/div64.h (git-fixes).\n\n - keys: asymmetric: fix error return code in software_key_query() (git-fixes).\n\n - kobject: Avoid premature parent object freeing in kobject_cleanup() (git-fixes).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Annotate hyp NMI-related functions as\n __always_inline (bsc#1175190).\n\n - KVM: arm64: Correct PSTATE on exception entry (bsc#1133021).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts (bsc#1133021).\n\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Provide VCPU attributes for stolen time (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Stop writing aarch32's CSSELR into ACTLR (bsc#1133021).\n\n - KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Support stolen time reporting via shared structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Use the correct timer structure to access the physical counter (bsc#1133021).\n\n - KVM: arm/arm64: Correct AArch32 SPSR on exception entry (bsc#1133021).\n\n - KVM: arm/arm64: Correct CPSR on exception entry (bsc#1133021).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm: vgic: Fix limit condition when writing to GICD_IACTIVER (bsc#1133021).\n\n - KVM: Implement kvm_put_guest() (bsc#1172197 jsc#SLE-13593).\n\n - KVM: nVMX: always update CR3 in VMCS (git-fixes).\n\n - KVM: Play nice with read-only memslots when querying host page size (bsc#1133021).\n\n - KVM: s390: Remove false WARN_ON_ONCE for the PQAP instruction (bsc#1133021).\n\n - l2tp: add sk_family checks to l2tp_validate_socket (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash() (networking-stable-20_06_07).\n\n - leds: 88pm860x: fix use-after-free on unbind (git-fixes).\n\n - leds: core: Flush scheduled work for system suspend (git-fixes).\n\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n\n - leds: gpio: Fix semantic error (git-fixes).\n\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n\n - leds: lm36274: fix use-after-free on unbind (git-fixes).\n\n - leds: wm831x-status: fix use-after-free on unbind (git-fixes).\n\n - libbpf: Wrap source argument of BPF_CORE_READ macro in parentheses (bsc#1155518).\n\n - lib: Reduce user_access_begin() boundaries in strncpy_from_user() and strnlen_user() (bsc#1174331).\n\n - liquidio: Fix wrong return value in cn23xx_get_pf_num() (git-fixes).\n\n - locktorture: Print ratio of acquisitions, not failures (bsc#1149032).\n\n - mac80211: allow rx of mesh eapol frames with default rx key (git-fixes).\n\n - mac80211: fix misplaced while instead of if (git-fixes).\n\n - mac80211: mesh: Free ie data when leaving mesh (git-fixes).\n\n - mac80211: mesh: Free pending skb when destroying a mpath (git-fixes).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: cxusb-analog: fix V4L2 dependency (git-fixes).\n\n - media: exynos4-is: Add missed check for pinctrl_lookup_state() (git-fixes).\n\n - media: firewire: Using uninitialized values in node_probe() (git-fixes).\n\n - media: marvell-ccic: Add missed v4l2_async_notifier_cleanup() (git-fixes).\n\n - media: media-request: Fix crash if memory allocation fails (git-fixes).\n\n - media: nuvoton-cir: remove setting tx carrier functions (git-fixes).\n\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for preview_init_entities() (git-fixes).\n\n - media: sur40: Remove uninitialized_var() usage (git-fixes).\n\n - media: vsp1: dl: Fix NULL pointer dereference on unbind (git-fixes).\n\n - mei: bus: do not clean driver pointer (git-fixes).\n\n - mfd: arizona: Ensure 32k clock is put on driver unbind and error (git-fixes).\n\n - mfd: dln2: Run event handler loop under spinlock (git-fixes).\n\n - mfd: intel-lpss: Add Intel Jasper Lake PCI IDs (jsc#SLE-12602).\n\n - mlxsw: core: Fix wrong SFP EEPROM reading for upper pages 1-3 (bsc#1154488).\n\n - mlxsw: core: Use different get_trend() callbacks for different thermal zones (networking-stable-20_06_10).\n\n - mmc: meson-gx: limit segments to 1 when dram-access-quirk is needed (git-fixes).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio cd type (git-fixes).\n\n - mm: Fix protection usage propagation (bsc#1174002).\n\n - mm/mmap.c: close race between munmap() and expand_upwards()/downwards() (bsc#1174527).\n\n - mtd: properly check all write ioctls for permissions (git-fixes).\n\n - mtd: rawnand: fsl_upm: Remove unused mtd var (git-fixes).\n\n - mtd: rawnand: qcom: avoid write to unavailable register (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8977 chipset (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8997 chipset (git-fixes).\n\n - mwifiex: Prevent memory corruption handling keys (git-fixes).\n\n - nbd: Fix memory leak in nbd_add_socket (git-fixes).\n\n - ndctl/papr_scm,uapi: Add support for PAPR nvdimm specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - net: be more gentle about silly gso requests coming from user (networking-stable-20_06_07).\n\n - net/bpfilter: Initialize pos in\n __bpfilter_process_sockopt (bsc#1155518).\n\n - net/bpfilter: split __bpfilter_process_sockopt (bsc#1155518).\n\n - net: check untrusted gso_size at kernel entry (networking-stable-20_06_07).\n\n - netdevsim: fix unbalaced locking in nsim_create() (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: ena: add reserved PCI device ID (bsc#1174852).\n\n - net: ena: add support for reporting of packet drops (bsc#1174852).\n\n - net: ena: add support for the rx offset feature (bsc#1174852).\n\n - net: ena: add support for traffic mirroring (bsc#1174852).\n\n - net: ena: add unmask interrupts statistics to ethtool (bsc#1174852).\n\n - net: ena: allow setting the hash function without changing the key (bsc#1174852).\n\n - net: ena: avoid memory access violation by validating req_id properly (bsc#1174852).\n\n - net: ena: avoid unnecessary admin command when RSS function set fails (bsc#1174852).\n\n - net: ena: avoid unnecessary rearming of interrupt vector when busy-polling (bsc#1174852).\n\n - net: ena: change default RSS hash function to Toeplitz (bsc#1174852).\n\n - net: ena: changes to RSS hash key allocation (bsc#1174852).\n\n - net: ena: cosmetic: change ena_com_stats_admin stats to u64 (bsc#1174852).\n\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n\n - net: ena: cosmetic: extract code to ena_indirection_table_set() (bsc#1174852).\n\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spelling and grammar mistakes in comments (bsc#1174852).\n\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary code (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary spaces and tabs in ena_com.h macros (bsc#1174852).\n\n - net: ena: cosmetic: rename ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n\n - net: ena: cosmetic: set queue sizes to u32 for consistency (bsc#1174852).\n\n - net: ena: drop superfluous prototype (bsc#1174852).\n\n - net: ena: enable support of rss hash key and function changes (bsc#1174852).\n\n - net: ena: ethtool: clean up minor indentation issue (bsc#1174852).\n\n - net: ena: ethtool: remove redundant non-zero check on rc (bsc#1174852).\n\n - net/ena: Fix build warning in ena_xdp_set() (bsc#1174852).\n\n - net: ena: fix continuous keep-alive resets (bsc#1174852).\n\n - net: ena: fix ena_com_comp_status_to_errno() return value (bsc#1174852).\n\n - net: ena: fix error returning in ena_com_get_hash_function() (bsc#1174852).\n\n - net: ena: fix request of incorrect number of IRQ vectors (bsc#1174852).\n\n - net: ena: Fix using plain integer as NULL pointer in ena_init_napi_in_range (bsc#1174852).\n\n - net: ena: Make some functions static (bsc#1174852).\n\n - net: ena: move llq configuration from ena_probe to ena_device_init() (bsc#1174852).\n\n - net: ena: reduce driver load time (bsc#1174852).\n\n - net: ena: remove code that does nothing (bsc#1174852).\n\n - net: ena: remove set but not used variable 'hash_key' (bsc#1174852).\n\n - net: ena: rename ena_com_free_desc to make API more uniform (bsc#1174852).\n\n - net: ena: simplify ena_com_update_intr_delay_resolution() (bsc#1174852).\n\n - net: ena: support new LLQ acceleration mode (bsc#1174852).\n\n - net: ena: use explicit variable size for clarity (bsc#1174852).\n\n - net: ena: use SHUTDOWN as reset reason when closing interface (bsc#1174852).\n\n - net_failover: fixed rollback in net_failover_open() (networking-stable-20_06_10).\n\n - netfilter: ip6tables: Add a .pre_exit hook in all ip6table_foo.c (bsc#1171857).\n\n - netfilter: ip6tables: Split ip6t_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n\n - netfilter: iptables: Add a .pre_exit hook in all iptable_foo.c (bsc#1171857).\n\n - netfilter: iptables: Split ipt_unregister_table() into pre_exit and exit helpers (bsc#1171857).\n\n - net: Fix a documentation bug wrt.\n ip_unprivileged_port_start (git-fixes). (SLES tuning guide refers to ip-sysctl.txt.)\n\n - net: fsl/fman: treat all RGMII modes in memac_adjust_link() (bsc#1174398).\n\n - net: hns3: check reset pending after FLR prepare (bsc#1154353).\n\n - net: hns3: fix error handling for desc filling (git-fixes).\n\n - net: hns3: fix for not calculating TX BD send size correctly (git-fixes).\n\n - net: hns3: fix return value error when query MAC link status fail (git-fixes).\n\n - net: ipv4: Fix wrong type conversion from hint to rt in ip_route_use_hint() (bsc#1154353).\n\n - net: lan78xx: add missing endpoint sanity check (git-fixes).\n\n - net: lan78xx: fix transfer-buffer memory leak (git-fixes).\n\n - net: lan78xx: replace bogus endpoint lookup (git-fixes).\n\n - net: macb: call pm_runtime_put_sync on failure path (git-fixes).\n\n - net/mlx5: drain health workqueue in case of driver load error (networking-stable-20_06_16).\n\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix CPU mapping after function reload to avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix repeated XSK usage on one channel (networking-stable-20_06_16).\n\n - net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n\n - net/mlx5e: Fix VXLAN configuration restore after function reload (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the mode (jsc#SLE-8464).\n\n - net/mlx5: Fix fatal error handling during device load (networking-stable-20_06_16).\n\n - net: phy: Check harder for errors in get_phy_id() (git-fixes).\n\n - net: phy: fix memory leak in device-create error path (git-fixes).\n\n - net: phy: realtek: add support for configuring the RX delay on RTL8211F (bsc#1174398).\n\n - net, sk_msg: Clear sk_user_data pointer on clone if tagged (bsc#1155518).\n\n - net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data (bsc#1155518).\n\n - net/smc: fix restoring of fallback changes (git-fixes).\n\n - net: stmmac: do not attach interface until resume finishes (bsc#1174072).\n\n - net: stmmac: dwc-qos: avoid clk and reset for acpi device (bsc#1174072).\n\n - net: stmmac: dwc-qos: use generic device api (bsc#1174072).\n\n - net: stmmac: enable timestamp snapshot for required PTP packets in dwmac v5.10a (networking-stable-20_06_07).\n\n - net: stmmac: platform: fix probe for ACPI devices (bsc#1174072).\n\n - net/tls: fix encryption error checking (git-fixes).\n\n - net/tls: free record only on encryption error (git-fixes).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition (networking-stable-20_06_07).\n\n - nfc: nci: add missed destroy_workqueue in nci_register_device (git-fixes).\n\n - nfc: s3fwrn5: add missing release on skb in s3fwrn5_recv_frame (git-fixes).\n\n - nfp: flower: fix used time of merge flow statistics (networking-stable-20_06_07).\n\n - NFS: Fix interrupted slots by sending a solo SEQUENCE operation (bsc#1174264).\n\n - NTB: Fix static check warning in perf_clear_test (git-fixes).\n\n - NTB: Fix the default port and peer numbers for legacy drivers (git-fixes).\n\n - ntb: hw: remove the code that sets the DMA mask (git-fixes).\n\n - NTB: ntb_pingpong: Choose doorbells based on port number (git-fixes).\n\n - NTB: ntb_test: Fix bug when counting remote files (git-fixes).\n\n - NTB: ntb_tool: reading the link file should not end in a NULL byte (git-fixes).\n\n - NTB: perf: Do not require one more memory window than number of peers (git-fixes).\n\n - NTB: perf: Fix race condition when run with ntb_test (git-fixes).\n\n - NTB: perf: Fix support for hardware that does not have port numbers (git-fixes).\n\n - ntb_perf: pass correct struct device to dma_alloc_coherent (git-fixes).\n\n - NTB: Revert the change to use the NTB device dev for DMA allocations (git-fixes).\n\n - ntb_tool: pass correct struct device to dma_alloc_coherent (git-fixes).\n\n - ocfs2: avoid inode removal while nfsd is accessing it (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: fix remounting needed after setfacl command (bsc#1173954).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - omapfb: dss: Fix max fclk divider for omap36xx (git-fixes).\n\n - ovl: inode reference leak in ovl_is_inuse true case (git-fixes).\n\n - padata: add separate cpuhp node for CPUHP_PADATA_DEAD (git-fixes).\n\n - padata: kABI fixup for struct padata_instance splitting nodes (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership (bsc#1174356).\n\n - PCI/ASPM: Add missing newline in sysfs 'policy' (git-fixes).\n\n - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085 PCIe-to-PCI bridge (git-fixes).\n\n - PCI: cadence: Fix updating Vendor ID and Subsystem Vendor ID register (git-fixes).\n\n - PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events (bsc#1174513).\n\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n\n - PCI: hotplug: ACPI: Fix context refcounting in acpiphp_grab_context() (git-fixes).\n\n - PCI: hv: Add support for protocol 1.3 and support PCI_BUS_RELATIONS2 (bsc#1172201).\n\n - PCI: qcom: Add missing ipq806x clocks in PCIe driver (git-fixes).\n\n - PCI: qcom: Add missing reset for ipq806x (git-fixes).\n\n - PCI: qcom: Add support for tx term offset for rev 2.1.0 (git-fixes).\n\n - PCI: qcom: Define some PARF params needed for ipq8064 SoC (git-fixes).\n\n - PCI: rcar: Fix runtime PM imbalance on error (git-fixes).\n\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for kABI (bsc#1174356).\n\n - PCI: switchtec: Add missing __iomem and __user tags to fix sparse warnings (git-fixes).\n\n - PCI: switchtec: Add missing __iomem tag to fix sparse warnings (git-fixes).\n\n - PCI: tegra: Revert tegra124 raw_violation_fixup (git-fixes).\n\n - percpu: Separate decrypted varaibles anytime encryption can be enabled (bsc#1174332).\n\n - phy: armada-38x: fix NETA lockup when repeatedly switching speeds (git-fixes).\n\n - phy: exynos5-usbdrd: Calibrating makes sense only for USB2.0 PHY (git-fixes).\n\n - phy: renesas: rcar-gen3-usb2: move irq registration to init (git-fixes).\n\n - phy: sun4i-usb: fix dereference of pointer phy0 before it is null checked (git-fixes).\n\n - pinctrl: amd: fix npins for uart0 in kerncz_groups (git-fixes).\n\n - pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH (git-fixes).\n\n - pinctrl: single: fix function name in documentation (git-fixes).\n\n - pinctrl-single: fix pcs_parse_pinconf() return value (git-fixes).\n\n - platform/chrome: cros_ec_ishtp: Fix a double-unlock issue (git-fixes).\n\n - platform/x86: intel-hid: Fix return value check in check_acpi_dev() (git-fixes).\n\n - platform/x86: intel-vbtn: Fix return value check in check_acpi_dev() (git-fixes).\n\n - platform/x86: ISST: Increase timeout (bsc#1174185).\n\n - PM: wakeup: Show statistics for deleted wakeup sources again (git-fixes).\n\n - powerpc/64s: Fix early_init_mmu section mismatch (bsc#1065729).\n\n - powerpc: Allow 4224 bytes of stack expansion for the signal frame (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for execute disable pkey (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu feature (bsc#1065729).\n\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references (bsc#1065729).\n\n - powerpc: Document details on H_SCM_HEALTH hcall (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/eeh: Fix pseries_eeh_configure_bridge() (bsc#1174689).\n\n - powerpc/fadump: fix race between pstore write and fadump crash trigger (bsc#1168959 ltc#185010).\n\n - powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END (git-fixes).\n\n - powerpc/nvdimm: Use HCALL error as the return value (bsc#1175284).\n\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error (bsc#1175284).\n\n - powerpc/papr_scm: Add support for fetching nvdimm 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm health information from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm performance stats from PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Improve error logging and handling papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Mark papr_scm_ndctl() as static (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/pseries/hotplug-cpu: Remove double free in error path (bsc#1065729).\n\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n\n - powerpc/pseries: remove cede offline state for CPUs (bsc#1065729).\n\n - powerpc/rtas: do not online CPUs for partition suspend (bsc#1065729).\n\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs (bsc#1065729).\n\n - power: supply: check if calc_soc succeeded in pm860x_init_battery (git-fixes).\n\n - pwm: bcm-iproc: handle clk_get_rate() return (git-fixes).\n\n - qed: suppress 'do not support RoCE & iWARP' flooding on HW init (git-fixes).\n\n - qed: suppress false-positives interrupt error messages on HW init (git-fixes).\n\n - r8169: fix jumbo configuration for RTL8168evl (bsc#1175296).\n\n - r8169: fix jumbo packet handling on resume from suspend (bsc#1175296).\n\n - r8169: fix resume on cable plug-in (bsc#1175296).\n\n - r8169: fix rtl_hw_jumbo_disable for RTL8168evl (bsc#1175296).\n\n - r8169: move disabling interrupt coalescing to RTL8169/RTL8168 init (bsc#1175296).\n\n - r8169: read common register for PCI commit (bsc#1175296).\n\n - random32: move the pseudo-random 32-bit definitions to prandom.h (git-fixes).\n\n - random32: remove net_rand_state from the latent entropy gcc plugin (git-fixes).\n\n - random: fix circular include dependency on arm64 after addition of percpu.h (git-fixes).\n\n - RDMA/cm: Add missing locking around id.state in cm_dup_req_handler (git-fixes).\n\n - RDMA/cma: Protect bind_list and listen_list while finding matching cm id (git-fixes).\n\n - RDMA/cm: Fix an error check in cm_alloc_id_priv() (git-fixes).\n\n - RDMA/cm: Fix checking for allowed duplicate listens (git-fixes).\n\n - RDMA/cm: Fix ordering of xa_alloc_cyclic() in ib_create_cm_id() (git-fixes).\n\n - RDMA/cm: Read id.state under lock when doing pr_debug() (git-fixes).\n\n - RDMA/cm: Remove a race freeing timewait_info (git-fixes).\n\n - RDMA/cm: Update num_paths in cma_resolve_iboe_route error flow (git-fixes).\n\n - RDMA/core: Fix double destruction of uobject (git-fixes).\n\n - RDMA/core: Fix double put of resource (git-fixes).\n\n - RDMA/core: Fix missing error check on dev_set_name() (git-fixes).\n\n - RDMA/core: Fix protection fault in ib_mr_pool_destroy (git-fixes).\n\n - RDMA/core: Fix race between destroy and release FD object (git-fixes).\n\n - RDMA/core: Fix race in rdma_alloc_commit_uobject() (git-fixes).\n\n - RDMA/core: Prevent mixed use of FDs between shared ufiles (git-fixes).\n\n - RDMA/counter: Query a counter before release (git-fixes).\n\n - RDMA/efa: Set maximum pkeys device attribute (git-fixes).\n\n - RDMA/hns: Bugfix for querying qkey (git-fixes).\n\n - RDMA/hns: Fix cmdq parameter of querying pf timer resource (git-fixes).\n\n - RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n\n - RDMA/iw_cxgb4: Fix incorrect function parameters (git-fixes).\n\n - RDMA/mad: Do not crash if the rdma device does not have a umad interface (git-fixes).\n\n - RDMA/mad: Fix possible memory leak in ib_mad_post_receive_mads() (git-fixes).\n\n - RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n\n - RDMA/mlx5: Add init2init as a modify command (git-fixes).\n\n - RDMA/mlx5: Fix access to wrong pointer while performing flush due to error (git-fixes).\n\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix prefetch memory leak if get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix the number of hwcounters of a dynamic counter (git-fixes).\n\n - RDMA/mlx5: Fix udata response upon SRQ creation (git-fixes).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Set GRH fields in query QP on RoCE (git-fixes).\n\n - RDMA/mlx5: Use xa_lock_irq when access to SRQ table (git-fixes).\n\n - RDMA/mlx5: Verify that QP is created with RQ or SQ (git-fixes).\n\n - RDMA/nldev: Fix crash when set a QP to a new counter but QPN is missing (git-fixes).\n\n - RDMA/pvrdma: Fix missing pci disable in pvrdma_pci_probe() (git-fixes).\n\n - RDMA/qedr: Fix KASAN: use-after-free in ucma_event_handler+0x532 (git-fixes).\n\n - RDMA/rvt: Fix potential memory leak caused by rvt_alloc_rq (git-fixes).\n\n - RDMA/rxe: Always return ERR_PTR from rxe_create_mmap_info() (git-fixes).\n\n - RDMA/rxe: Fix configuration of atomic queue pair attributes (git-fixes).\n\n - RDMA/rxe: Set default vendor ID (git-fixes).\n\n - RDMA/rxe: Set sys_image_guid to be aligned with HW IB devices (git-fixes).\n\n - RDMA/siw: Fix failure handling during device creation (git-fixes).\n\n - RDMA/siw: Fix passive connection establishment (git-fixes).\n\n - RDMA/siw: Fix pointer-to-int-cast warning in siw_rx_pbl() (git-fixes).\n\n - RDMA/siw: Fix potential siw_mem refcnt leak in siw_fastreg_mr() (git-fixes).\n\n - RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n\n - RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n\n - RDMA/siw: Fix setting active_(speed, width) attributes (git-fixes).\n\n - RDMA/ucma: Put a lock around every call to the rdma_cm layer (git-fixes).\n\n - RDMA/uverbs: Fix create WQ to use the given user handle (git-fixes).\n\n - regmap: debugfs: check count when read regmap file (git-fixes).\n\n - regmap: debugfs: Do not sleep while atomic for fast_io regmaps (git-fixes).\n\n - regmap: dev_get_regmap_match(): fix string comparison (git-fixes).\n\n - regmap: fix alignment issue (git-fixes).\n\n - regmap: Fix memory leak from regmap_register_patch (git-fixes).\n\n - regulator: gpio: Honor regulator-boot-on property (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate MBA firmware size before load (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate modem blob firmware size before load (git-fixes).\n\n - remoteproc: qcom: q6v5: Update running state before requesting stop (git-fixes).\n\n - Revert 'ALSA: hda: call runtime_allow() for all hda controllers' (git-fixes).\n\n - Revert 'drm/amd/display: Expose connector VRR range via debugfs' (bsc#1152489) 	* refreshed for context changes\n\n - Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs handlers' (git-fixes).\n\n - Revert 'i2c: cadence: Fix the hold bit setting' (git-fixes).\n\n - Revert 'RDMA/cma: Simplify rdma_resolve_addr() error flow' (git-fixes).\n\n - Revert 'thermal: mediatek: fix register index error' (git-fixes).\n\n - rhashtable: Document the right function parameters (bsc#1174880).\n\n - rhashtable: drop duplicated word in <linux/rhashtable.h> (bsc#1174880).\n\n - rhashtable: Drop raw RCU deref in nested_table_free (bsc#1174880).\n\n - rhashtable: Fix unprotected RCU dereference in __rht_ptr (bsc#1174880).\n\n - rhashtable: Restore RCU marking on rhash_lock_head (bsc#1174880).\n\n - RMDA/cm: Fix missing ib_cm_destroy_id() in ib_cm_insert_listen() (git-fixes).\n\n - rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs is needed for podman or docker builds when no more specific driver can be used (like lvm or btrfs). As the default build fs is ext4 currently, we need overlayfs kernel modules to be available.\n\n - rpm/modules.fips: add ecdh_generic (boo#1173813)\n\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage (git-fixes).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (bsc#1154353).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink fails (git-fixes).\n\n - rtw88: fix LDPC field for RA info (git-fixes).\n\n - rtw88: fix short GI capability based on current bandwidth (git-fixes).\n\n - s390: fix syscall_get_error for compat processes (git-fixes).\n\n - s390/ism: fix error return code in ism_probe() (git-fixes).\n\n - s390/kaslr: add support for R_390_JMP_SLOT relocation type (git-fixes).\n\n - s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler (git-fixes).\n\n - s390/qdio: put thinint indicator after early error (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds (git-fixes).\n\n - sched/fair: handle case of task_h_load() returning 0 (bnc#1155798 (CPU scheduler functional and performance backports)).\n\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).\n\n - scsi: ipr: Fix softlockup when rescanning devices in petitboot (jsc#SLE-13654).\n\n - scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer overflow (jsc#SLE-13654).\n\n - scsi: libfc: free response frame from GPN_ID (bsc#1173849).\n\n - scsi: libfc: Handling of extra kref (bsc#1173849).\n\n - scsi: libfc: If PRLI rejected, move rport to PLOGI state (bsc#1173849).\n\n - scsi: libfc: rport state move to PLOGI if all PRLI retry exhausted (bsc#1173849).\n\n - scsi: libfc: Skip additional kref updating work event (bsc#1173849).\n\n - scsi: ufs-bsg: Fix runtime PM imbalance on error (git-fixes).\n\n - scsi: zfcp: Fix panic on ERP timeout for previously dismissed ERP action (git-fixes).\n\n - selftests/net: in rxtimestamp getopt_long needs terminating null entry (networking-stable-20_06_16).\n\n - selinux: fall back to ref-walk if audit is required (bsc#1174333).\n\n - selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC upon follow_link' (bsc#1174333).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - serial: 8250: fix null-ptr-deref in serial8250_start_tx() (git-fixes).\n\n - serial: 8250_mtk: Fix high-speed baud rates clamping (git-fixes).\n\n - serial: 8250_pci: Move Pericom IDs to pci_ids.h (git-fixes).\n\n - serial: 8250_tegra: Create Tegra specific 8250 driver (bsc#1173941).\n\n - serial: amba-pl011: Make sure we initialize the port.lock spinlock (git-fixes).\n\n - serial: exar: Fix GPIO configuration for Sealevel cards based on XR17V35X (git-fixes).\n\n - serial: mxs-auart: add missed iounmap() in probe failure and remove (git-fixes).\n\n - serial: tegra: fix CREAD handling for PIO (git-fixes).\n\n - SMB3: Honor lease disabling for multiuser mounts (git-fixes).\n\n - soc/tegra: pmc: Enable PMIC wake event on Tegra210 (bsc#1175116).\n\n - soundwire: intel: fix memory leak with devm_kasprintf (git-fixes).\n\n - spi: davinci: Remove uninitialized_var() usage (git-fixes).\n\n - spi: lantiq: fix: Rx overflow error in full duplex mode (git-fixes).\n\n - spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM (git-fixes).\n\n - spi: mediatek: use correct SPI_CFG2_REG MACRO (git-fixes).\n\n - spi: rockchip: Fix error in SPI slave pio read (git-fixes).\n\n - spi: spidev: fix a potential use-after-free in spidev_release() (git-fixes).\n\n - spi: spidev: fix a race between spidev_release and spidev_remove (git-fixes).\n\n - spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of clock rate (git-fixes).\n\n - spi: sun4i: update max transfer size reported (git-fixes).\n\n - staging: comedi: addi_apci_1032: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1500: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1564: check INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG support (git-fixes).\n\n - staging: comedi: verify array index is correct before using it (git-fixes).\n\n - Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable authmode (git-fixes).\n\n - staging: rtl8192u: fix a dubious looking mask before a shift (git-fixes).\n\n - staging: rtl8712: handle firmware load failure (git-fixes).\n\n - staging: vchiq_arm: Add a matching unregister call (git-fixes).\n\n - staging: wlan-ng: properly check endpoint types (git-fixes).\n\n - SUNRPC dont update timeout value on connection reset (bsc#1174263).\n\n - sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n\n - tcp: md5: allow changing MD5 keys in all socket states (git-fixes).\n\n - thermal/drivers: imx: Fix missing of_node_put() at probe time (git-fixes).\n\n - thermal: int3403_thermal: Downgrade error message (git-fixes).\n\n - thermal: ti-soc-thermal: Fix reversed condition in ti_thermal_expose_sensor() (git-fixes).\n\n - tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n\n - tpm: Require that all digests are present in TCG_PCR_EVENT2 structures (git-fixes).\n\n - tpm_tis: extra chip->ops check on error path in tpm_tis_core_init (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close (git-fixes).\n\n - ubsan: check panic_on_warn (bsc#1174805).\n\n - udp: Copy has_conns in reuseport_grow() (git-fixes).\n\n - udp: Improve load balancing for SO_REUSEPORT (git-fixes).\n\n - uio_pdrv_genirq: Remove warning when irq is not specified (bsc#1174762).\n\n - USB: c67x00: fix use after free in c67x00_giveback_urb (git-fixes).\n\n - usb: chipidea: core: add wakeup support for extcon (git-fixes).\n\n - usb: core: fix quirks_param_set() writing to a const pointer (git-fixes).\n\n - usb: dwc2: Fix shutdown callback in platform (git-fixes).\n\n - usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Jasper Lake (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Tiger Lake PCH\n -H variant (git-fixes).\n\n - usb: dwc3: pci: Fix reference count leak in dwc3_pci_resume_work (git-fixes).\n\n - usb: gadget: Fix issue with config_ep_by_speed function (git-fixes).\n\n - usb: gadget: f_uac2: fix AC Interface Header Descriptor wTotalLength (git-fixes).\n\n - usb: gadget: function: fix missing spinlock in f_uac1_legacy (git-fixes).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug printk (git-fixes).\n\n - usb: gadget: udc: atmel: remove outdated comment in usba_ep_disable() (git-fixes).\n\n - usb: gadget: udc: gr_udc: fix memleak on error handling path in gr_ep_init() (git-fixes).\n\n - usb: hso: check for return value in hso_serial_common_create() (git-fixes).\n\n - usb: hso: Fix debug compile warning on sparc32 (git-fixes).\n\n - USB: iowarrior: fix up report size handling for some devices (git-fixes).\n\n - usbip: tools: fix module name in man page (git-fixes).\n\n - usbnet: smsc95xx: Fix use-after-free after removal (git-fixes).\n\n - USB: serial: ch341: add new Product ID for CH340 (git-fixes).\n\n - USB: serial: cp210x: enable usb generic throttle/unthrottle (git-fixes).\n\n - USB: serial: cp210x: re-enable auto-RTS on open (git-fixes).\n\n - USB: serial: cypress_m8: enable Simply Automated UPB PIM (git-fixes).\n\n - USB: serial: iuu_phoenix: fix led-activity helpers (git-fixes).\n\n - USB: serial: iuu_phoenix: fix memory corruption (git-fixes).\n\n - USB: serial: option: add GosunCn GM500 series (git-fixes).\n\n - USB: serial: option: add Quectel EG95 LTE modem (git-fixes).\n\n - USB: serial: qcserial: add EM7305 QDL product ID (git-fixes).\n\n - usb: tegra: Fix allocation for the FPCI context (git-fixes).\n\n - usb: xhci: define IDs for various ASMedia host controllers (git-fixes).\n\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing (git-fixes).\n\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing (git-fixes).\n\n - usb: xhci-mtk: fix the failure of bandwidth allocation (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking (bsc#1174129).\n\n - video: fbdev: sm712fb: fix an issue about iounmap for a wrong address (git-fixes).\n\n - video: pxafb: Fix the function used to balance a 'dma_alloc_coherent()' call (git-fixes).\n\n - virtio: virtio_console: add missing MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - virt: vbox: Fix guest capabilities mask check (git-fixes).\n\n - virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG req numbers to match upstream (git-fixes).\n\n - vsock: fix timeout in vsock_accept() (networking-stable-20_06_07).\n\n - vt: Reject zero-sized screen buffer size (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages with invalid options (networking-stable-20_06_10).\n\n - watchdog: f71808e_wdt: clear watchdog timeout occurred flag (git-fixes).\n\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support in watchdog_info.options (git-fixes).\n\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info option (git-fixes).\n\n - watchdog: initialize device before misc_register (git-fixes).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO (jsc#SLE-13202).\n\n - wireless: Use linux/stddef.h instead of stddef.h (git-fixes).\n\n - wireless: Use offsetof instead of custom macro (git-fixes).\n\n - wl1251: fix always return 0 error (git-fixes).\n\n - workqueue: Remove unnecessary kfree() call in rcu_free_wq() (git-fixes).\n\n - xen/pvcalls-back: test for errors when calling backend_connect() (bsc#1065600).\n\n - xfrm: fix a warning in xfrm_policy_insert_list (bsc#1174645).\n\n - xfrm: policy: match with both mark and mask on user interfaces (bsc#1174645).\n\n - xfs: do not eat an EIO/ENOSPC writeback error when scrubbing data fork (git-fixes).\n\n - xfs: fix inode allocation block res calculation precedence (git-fixes).\n\n - xfs: fix reflink quota reservation accounting error (git-fixes).\n\n - xfs: preserve rmapbt swapext block reservation from freed blocks (git-fixes).", "cvss3": {}, "published": "2020-08-24T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2020-1236)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-0305", "CVE-2020-10135", "CVE-2020-10781", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-15780", "CVE-2020-16166"], "modified": "2022-05-13T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:bbswitch", "p-cpe:/a:novell:opensuse:bbswitch-debugsource", "p-cpe:/a:novell:opensuse:drbd-debugsource", "p-cpe:/a:novell:opensuse:bbswitch-kmp-default", "p-cpe:/a:novell:opensuse:drbd-kmp-default", "p-cpe:/a:novell:opensuse:bbswitch-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:drbd-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt", "p-cpe:/a:novell:opensuse:drbd-kmp-preempt", "p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:drbd-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-debugsource", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default", "p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:crash", "p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt", "p-cpe:/a:novell:opensuse:crash-debuginfo", "p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:crash-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:crash-devel", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:crash-eppic", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:crash-eppic-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:crash-gcore", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:crash-gcore-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-default", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:crash-kmp-preempt", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:crash-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:dpdk", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:dpdk-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:dpdk-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:dpdk-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:dpdk-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:dpdk-examples", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:dpdk-examples-debuginfo", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:dpdk-kmp-default", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-preempt", "p-cpe:/a:novell:opensuse:dpdk-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo", "p-cpe:/a:novell:opensuse:dpdk-kmp-preempt", "p-cpe:/a:novell:opensuse:kernel-preempt-debugsource", "p-cpe:/a:novell:opensuse:kernel-preempt-devel", "p-cpe:/a:novell:opensuse:dpdk-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:dpdk-tools", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:libdpdk-20_0", "p-cpe:/a:novell:opensuse:dpdk-tools-debuginfo", "p-cpe:/a:novell:opensuse:drbd", "p-cpe:/a:novell:opensuse:libdpdk-20_0-debuginfo", "p-cpe:/a:novell:opensuse:openafs-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl", "p-cpe:/a:novell:opensuse:mhvtl-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl-debugsource", "p-cpe:/a:novell:opensuse:openafs-kmp-preempt", "p-cpe:/a:novell:opensuse:mhvtl-kmp-default", "p-cpe:/a:novell:opensuse:openafs-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt", "p-cpe:/a:novell:opensuse:openafs-server", "p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:openafs-server-debuginfo", "p-cpe:/a:novell:opensuse:openafs", "p-cpe:/a:novell:opensuse:openafs-authlibs", "p-cpe:/a:novell:opensuse:pcfclock", "p-cpe:/a:novell:opensuse:openafs-authlibs-debuginfo", "p-cpe:/a:novell:opensuse:openafs-authlibs-devel", "p-cpe:/a:novell:opensuse:pcfclock-debuginfo", "p-cpe:/a:novell:opensuse:openafs-client", "p-cpe:/a:novell:opensuse:pcfclock-debugsource", "p-cpe:/a:novell:opensuse:openafs-client-debuginfo", "p-cpe:/a:novell:opensuse:openafs-debuginfo", "p-cpe:/a:novell:opensuse:openafs-debugsource", "p-cpe:/a:novell:opensuse:openafs-devel", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default", "p-cpe:/a:novell:opensuse:openafs-devel-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:openafs-fuse_client", "p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt", "p-cpe:/a:novell:opensuse:openafs-fuse_client-debuginfo", "p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:openafs-kernel-source", "p-cpe:/a:novell:opensuse:openafs-kmp-default", "p-cpe:/a:novell:opensuse:python3-virtualbox", "p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:rtl8812au", "p-cpe:/a:novell:opensuse:rtl8812au-debugsource", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-default", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-websrv", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt", "p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons", "p-cpe:/a:novell:opensuse:xtables-addons-debuginfo", "p-cpe:/a:novell:opensuse:sysdig", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default", "p-cpe:/a:novell:opensuse:sysdig-debuginfo", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:sysdig-debugsource", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt", "p-cpe:/a:novell:opensuse:sysdig-kmp-default", "p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:sysdig-kmp-default-debuginfo", "cpe:/o:novell:opensuse:15.2", "p-cpe:/a:novell:opensuse:sysdig-kmp-preempt", "p-cpe:/a:novell:opensuse:sysdig-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:v4l2loopback-debugsource", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt", "p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:v4l2loopback-utils", "p-cpe:/a:novell:opensuse:vhba-kmp-default", "p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:vhba-kmp-preempt", "p-cpe:/a:novell:opensuse:vhba-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox", "p-cpe:/a:novell:opensuse:virtualbox-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-debugsource", "p-cpe:/a:novell:opensuse:virtualbox-devel", "p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons", "p-cpe:/a:novell:opensuse:virtualbox-guest-source", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools", "p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11", "p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-host-source", "p-cpe:/a:novell:opensuse:virtualbox-kmp-default", "p-cpe:/a:novell:opensuse:virtualbox-kmp-default-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt", "p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-qt", "p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo", "p-cpe:/a:novell:opensuse:virtualbox-vnc"], "id": "OPENSUSE-2020-1236.NASL", "href": "https://www.tenable.com/plugins/nessus/139766", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2020-1236.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(139766);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\"CVE-2020-0305\", \"CVE-2020-10135\", \"CVE-2020-10781\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-15780\", \"CVE-2020-16166\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2020-1236)\");\n script_summary(english:\"Check for the openSUSE-2020-1236 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The openSUSE Leap 15.2 kernel was updated to receive various security\nand bugfixes.\n\nThis update is signed with the new UEFI signing key for openSUSE. It\ncontains rebuilds of all available KMP packages also rebuilt with the\nnew UEFi signing key. (boo#1174543)\n\nThe following security bugs were fixed :\n\n - CVE-2020-14356: A use after free vulnerability in cgroup\n BPF component was fixed (bsc#1175213).\n\n - CVE-2020-14331: A buffer over write in vgacon_scroll was\n fixed (bnc#1174205).\n\n - CVE-2020-16166: The Linux kernel allowed remote\n attackers to make observations that help to obtain\n sensitive information about the internal state of the\n network RNG, aka CID-f227e3ec3b5c. This is related to\n drivers/char/random.c and kernel/time/timer.c\n (bnc#1174757).\n\n - CVE-2020-10135: Legacy pairing and secure-connections\n pairing authentication in Bluetooth® BR/EDR Core\n Specification v5.2 and earlier may have allowed an\n unauthenticated user to complete authentication without\n pairing credentials via adjacent access. An\n unauthenticated, adjacent attacker could impersonate a\n Bluetooth BR/EDR master or slave to pair with a\n previously paired remote device to successfully complete\n the authentication procedure without knowing the link\n key (bnc#1171988).\n\n - CVE-2020-0305: In cdev_get of char_dev.c, there is a\n possible use-after-free due to a race condition. This\n could lead to local escalation of privilege with System\n execution privileges needed. User interaction is not\n needed for exploitation (bnc#1174462).\n\n - CVE-2020-15780: An issue was discovered in\n drivers/acpi/acpi_configfs.c in the Linux kernel\n Injection of malicious ACPI tables via configfs could be\n used by attackers to bypass lockdown and secure boot\n restrictions, aka CID-75b0cea7bf30 (bnc#1173573).\n\n - CVE-2020-10781: zram sysfs resource consumption was\n fixed (bnc#1173074).\n\nThe following non-security bugs were fixed :\n\n - 9p/trans_fd: Fix concurrency del of req_list in\n p9_fd_cancelled/p9_read_work (git-fixes).\n\n - ACPICA: Dispatcher: add status checks (git-fixes).\n\n - ACPI/IORT: Fix PMCG node single ID mapping handling\n (git-fixes).\n\n - ACPI: video: Use native backlight on Acer Aspire 5783z\n (git-fixes).\n\n - ACPI: video: Use native backlight on Acer TravelMate\n 5735Z (git-fixes).\n\n - af_key: pfkey_dump needs parameter validation\n (git-fixes).\n\n - agp/intel: Fix a memory leak on module initialisation\n failure (git-fixes).\n\n - ALSA: asihpi: delete duplicated word (git-fixes).\n\n - ALSA: atmel: Remove invalid 'fall through' comments\n (git-fixes).\n\n - ALSA: core: pcm_iec958: fix kernel-doc (git-fixes).\n\n - ALSA: echoaduio: Drop superfluous volatile modifier\n (git-fixes).\n\n - ALSA: echoaudio: Address bugs in the interrupt handling\n (git-fixes).\n\n - ALSA: echoaudio: Fix potential Oops in snd_echo_resume()\n (git-fixes).\n\n - ALSA: echoaudio: Prevent races in calls to\n set_audio_format() (git-fixes).\n\n - ALSA: echoaudio: Prevent some noise on unloading the\n module (git-fixes).\n\n - ALSA: echoaudio: Race conditions around 'opencount'\n (git-fixes).\n\n - ALSA: echoaudio: re-enable IRQs on failure path\n (git-fixes).\n\n - ALSA: echoaudio: Remove redundant check (git-fixes).\n\n - ALSA: firewire: fix kernel-doc (git-fixes).\n\n - ALSA: hda: Add support for Loongson 7A1000 controller\n (git-fixes).\n\n - ALSA: hda/ca0132 - Add new quirk ID for Recon3D\n (git-fixes).\n\n - ALSA: hda/ca0132 - Fix AE-5 microphone selection\n commands (git-fixes).\n\n - ALSA: hda/ca0132 - Fix ZxR Headphone gain control get\n value (git-fixes).\n\n - ALSA: hda: Enable sync-write operation as default for\n all controllers (git-fixes).\n\n - ALSA: hda: fix NULL pointer dereference during suspend\n (git-fixes).\n\n - ALSA: hda: fix snd_hda_codec_cleanup() documentation\n (git-fixes).\n\n - ALSA: hda - fix the micmute led status for Lenovo\n ThinkCentre AIO (git-fixes).\n\n - ALSA: hda/hdmi: Add quirk to force connectivity\n (git-fixes).\n\n - ALSA: hda/hdmi: Fix keep_power assignment for\n non-component devices (git-fixes).\n\n - ALSA: hda/hdmi: Use force connectivity quirk on another\n HP desktop (git-fixes).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H\n and EKL (jsc#SLE-13261).\n\n - ALSA: hda: Intel: add missing PCI IDs for ICL-H, TGL-H\n and EKL (jsc#SLE-13261).\n\n - ALSA: hda/realtek: Add alc269/alc662 pin-tables for\n Loongson-3 laptops (git-fixes).\n\n - ALSA: hda/realtek - change to suitable link model for\n ASUS platform (git-fixes).\n\n - ALSA: hda/realtek: Enable headset mic of Acer TravelMate\n B311R-31 with ALC256 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G14(G401) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek: enable headset mic of ASUS ROG\n Zephyrus G15(GA502) series with ALC289 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX533 and\n UX534 (git-fixes).\n\n - ALSA: hda/realtek - Enable Speaker for ASUS UX563\n (git-fixes).\n\n - ALSA: hda/realtek: Fix add a 'ultra_low_power' function\n for intel reference board (alc256) (git-fixes).\n\n - ALSA: hda/realtek: Fixed ALC298 sound bug by adding\n quirk for Samsung Notebook Pen S (git-fixes).\n\n - ALSA: hda/realtek - Fixed HP right speaker no sound\n (git-fixes).\n\n - ALSA: hda/realtek: Fix pin default on Intel NUC 8 Rugged\n (git-fixes).\n\n - ALSA: hda/realtek - Fix unused variable warning\n (git-fixes).\n\n - ALSA: hda/realtek - fixup for yet another Intel\n reference board (git-fixes).\n\n - ALSA: hda/realtek: typo_fix: enable headset mic of ASUS\n ROG Zephyrus G14(GA401) series with ALC289 (git-fixes).\n\n - ALSA: hda - reverse the setting value in the\n micmute_led_set (git-fixes).\n\n - ALSA: hda/tegra: Disable sync-write operation\n (git-fixes).\n\n - ALSA: hda: Workaround for spurious wakeups on some Intel\n platforms (git-fixes).\n\n - ALSA: info: Drop WARN_ON() from buffer NULL sanity check\n (git-fixes).\n\n - ALSA: isa: delete repeated words in comments\n (git-fixes).\n\n - ALSA: isa/gus: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: isa/gus: remove -Wmissing-prototypes warnings\n (git-fixes).\n\n - ALSA: line6: add hw monitor volume control for POD HD500\n (git-fixes).\n\n - ALSA: line6: Perform sanity check for each URB creation\n (git-fixes).\n\n - ALSA: line6: Sync the pending work cancel at\n disconnection (git-fixes).\n\n - ALSA: line6: Use kmemdup in podhd_set_monitor_level()\n (git-fixes).\n\n - ALSA: pci/asihpi: fix kernel-doc (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/asihpi: remove 'set but not used' warnings\n (git-fixes).\n\n - ALSA: pci/au88x0: remove 'defined but not used' warnings\n (git-fixes).\n\n - ALSA: pci/aw2-saa7146: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/ctxfi/ctatc: fix kernel-doc (git-fixes).\n\n - ALSA: pci/ctxfi: fix kernel-doc warnings (git-fixes).\n\n - ALSA: pci: delete repeated words in comments\n (git-fixes).\n\n - ALSA: pci/echoaudio: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/emu10k1: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/es1938: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: pci/fm801: fix kernel-doc (git-fixes).\n\n - ALSA: pci/korg1212: remove 'set but not used' warnings\n (git-fixes).\n\n - ALSA: pci/oxygen/xonar_wm87x6: remove always true\n condition (git-fixes).\n\n - ALSA: pci/rme9652/hdspm: remove always true condition\n (git-fixes).\n\n - ALSA: pci/via82xx: remove 'set but not used' warnings\n (git-fixes).\n\n - ALSA: pcmcia/pdaudiocf: fix kernel-doc (git-fixes).\n\n - ALSA: seq: oss: Serialize ioctls (git-fixes).\n\n - ALSA: usb-audio: Add implicit feedback quirk for SSL2\n (git-fixes).\n\n - ALSA: usb-audio: add quirk for Pioneer DDJ-RB\n (git-fixes).\n\n - ALSA: usb-audio: Add registration quirk for Kingston\n HyperX Cloud Flight S (git-fixes).\n\n - ALSA: usb-audio: add startech usb audio dock name\n (git-fixes).\n\n - ALSA: usb-audio: Add support for Lenovo ThinkStation\n P620 (git-fixes).\n\n - ALSA: usb-audio: Creative USB X-Fi Pro SB1095 volume\n knob support (git-fixes).\n\n - ALSA: usb-audio: Disable Lenovo P620 Rear line-in volume\n control (git-fixes).\n\n - ALSA: usb-audio: endpoint : remove needless check before\n usb_free_coherent() (git-fixes).\n\n - ALSA: usb-audio: fix overeager device match for\n MacroSilicon MS2109 (bsc#1174625).\n\n - ALSA: usb-audio: Fix race against the error recovery URB\n submission (git-fixes).\n\n - ALSA: usb-audio: Fix some typos (git-fixes).\n\n - ALSA: usb-audio: fix spelling mistake 'buss' -> 'bus'\n (git-fixes).\n\n - ALSA: usb-audio: work around streaming quirk for\n MacroSilicon MS2109 (git-fixes).\n\n - ALSA: usb/line6: remove 'defined but not used' warning\n (git-fixes).\n\n - ALSA: vx_core: remove warning for empty loop body\n (git-fixes).\n\n - ALSA: xen: remove 'set but not used' warning\n (git-fixes).\n\n - ALSA: xen: Remove superfluous fall through comments\n (git-fixes).\n\n - apparmor: ensure that dfa state tables have entries\n (git-fixes).\n\n - apparmor: fix introspection of of task mode for\n unconfined tasks (git-fixes).\n\n - apparmor: Fix memory leak of profile proxy (git-fixes).\n\n - apparmor: Fix use-after-free in aa_audit_rule_init\n (git-fixes).\n\n - apparmor: remove useless aafs_create_symlink\n (git-fixes).\n\n - appletalk: Fix atalk_proc_init() return path\n (git-fixes).\n\n - arm64: armv8_deprecated: Fix undef_hook mask for thumb\n setend (bsc#1175180).\n\n - arm64: cacheflush: Fix KGDB trap detection\n (bsc#1175188).\n\n - arm64: csum: Fix handling of bad packets (bsc#1175192).\n\n - arm64: dts: allwinner: a64: Remove unused SPDIF sound\n card (none bsc#1175016).\n\n - arm64: dts: clearfog-gt-8k: set gigabit PHY reset\n deassert delay (bsc#1175347).\n\n - arm64: dts: exynos: Fix silent hang after boot on\n Espresso (bsc#1175346).\n\n - arm64: dts: imx8mm-evk: correct ldo1/ldo2 voltage range\n (none bsc#1175019).\n\n - arm64: dts: imx8qxp-mek: Remove unexisting Ethernet PHY\n (bsc#1175345).\n\n - arm64: dts: librem5-devkit: add a vbus supply to usb0\n (none bsc#1175013).\n\n - arm64: dts: ls1028a: delete extraneous #interrupt-cells\n for ENETC RCIE (none bsc#1175012).\n\n - arm64: dts: ls1043a-rdb: correct RGMII delay mode to\n rgmii-id (bsc#1174398).\n\n - arm64: dts: ls1046ardb: set RGMII interfaces to RGMII_ID\n mode (bsc#1174398).\n\n - arm64: dts: qcom: msm8998-clamshell: Fix label on l15\n regulator (git-fixes).\n\n - arm64: dts: rockchip: fix rk3399-puma gmac reset gpio\n (none bsc#1175021).\n\n - arm64: dts: rockchip: fix rk3399-puma vcc5v0-host gpio\n (none bsc#1175020).\n\n - arm64: dts: rockchip: Rename dwc3 device nodes on rk3399\n to make dtc happy (none bsc#1175015).\n\n - arm64: dts: rockchip: Replace RK805 PMIC node name with\n 'pmic' on rk3328 boards (none bsc#1175014).\n\n - arm64: dts: uDPU: fix broken ethernet (bsc#1175344).\n\n - arm64: dts: uniphier: Set SCSSI clock and reset IDs for\n each channel (none bsc#1175011).\n\n - arm64: errata: use arm_smccc_1_1_get_conduit()\n (bsc#1174906).\n\n - arm64: Fix PTRACE_SYSEMU semantics (bsc#1175185).\n\n - arm64: fix the flush_icache_range arguments in\n machine_kexec (bsc#1175184).\n\n - arm64: hugetlb: avoid potential NULL dereference\n (bsc#1175183).\n\n - arm64: hw_breakpoint: Do not invoke overflow handler on\n uaccess watchpoints (bsc#1175189).\n\n - arm64: insn: Fix two bugs in encoding 32-bit logical\n immediates (bsc#1175186).\n\n - arm64: kexec_file: print appropriate variable\n (bsc#1175187).\n\n - arm64: kgdb: Fix single-step exception handling oops\n (bsc#1175191).\n\n - arm64: Retrieve stolen time as paravirtualized guest\n (bsc#1172197 jsc#SLE-13593).\n\n - arm64: Retrieve stolen time as paravirtualized guest\n (bsc#1172197 jsc#SLE-13593).\n\n - arm64: tegra: Enable I2C controller for EEPROM (none\n bsc#1175010).\n\n - arm64: tegra: Fix ethernet phy-mode for Jetson Xavier\n (none bsc#1175017).\n\n - arm64: tegra: Fix flag for 64-bit resources in 'ranges'\n property (none bsc#1175018).\n\n - arm64: tegra: Fix Tegra194 PCIe compatible string (none\n bsc#1175009).\n\n - arm64: vdso: Add -fasynchronous-unwind-tables to cflags\n (bsc#1175182).\n\n - arm64: vdso: do not free unallocated pages\n (bsc#1175181).\n\n - arm/arm64: Make use of the SMCCC 1.1 wrapper\n (bsc#1174906).\n\n - arm/arm64: Provide a wrapper for SMCCC 1.1 calls\n (bsc#1174906).\n\n - arm/arm64: smccc/psci: add arm_smccc_1_1_get_conduit()\n (bsc#1174906).\n\n - ARM: percpu.h: fix build error (git-fixes).\n\n - arm: spectre-v2: use arm_smccc_1_1_get_conduit()\n (bsc#1174906).\n\n - ASoC: codecs: max98373: Removed superfluous volume\n control from chip default (git-fixes).\n\n - ASoc: codecs: max98373: remove Idle_bias_on to let codec\n suspend (git-fixes).\n\n - ASoC: fsl_sai: Fix value of FSL_SAI_CR1_RFW_MASK\n (git-fixes).\n\n - ASoC: hdac_hda: fix deadlock after PCM open error\n (git-fixes).\n\n - ASoC: Intel: bxt_rt298: add missing .owner field\n (git-fixes).\n\n - ASoC: Intel: bytcht_es8316: Add missed put_device()\n (git-fixes).\n\n - ASoC: meson: axg-tdmin: fix g12a skew (git-fixes).\n\n - ASoC: meson: axg-tdm-interface: fix link fmt setup\n (git-fixes).\n\n - ASoC: meson: fixes the missed kfree() for\n axg_card_add_tdm_loopback (git-fixes).\n\n - ASoC: rockchip: add format and rate constraints on\n rk3399 (git-fixes).\n\n - ASoC: rt286: fix unexpected interrupt happens\n (git-fixes).\n\n - ASoC: rt5670: Add new gpio1_is_ext_spk_en quirk and\n enable it on the Lenovo Miix 2 10 (git-fixes).\n\n - ASoC: rt5670: Correct RT5670_LDO_SEL_MASK (git-fixes).\n\n - ASoC: rt5670: Fix dac- and adc- vol-tlv values being off\n by a factor of 10 (git-fixes).\n\n - ASoC: rt5682: Report the button event in the headset\n type only (git-fixes).\n\n - ASoC: SOF: nocodec: add missing .owner field\n (git-fixes).\n\n - ASoC: topology: fix kernel oops on route addition error\n (git-fixes).\n\n - ASoC: topology: fix tlvs in error handling for\n widget_dmixer (git-fixes).\n\n - ASoC: wm8974: fix Boost Mixer Aux Switch (git-fixes).\n\n - ASoC: wm8974: remove unsupported clock mode (git-fixes).\n\n - ath10k: Acquire tx_lock in tx error paths (git-fixes).\n\n - ath10k: enable transmit data ack RSSI for QCA9884\n (git-fixes).\n\n - ath9k: Fix general protection fault in\n ath9k_hif_usb_rx_cb (git-fixes).\n\n - ath9k: Fix regression with Atheros 9271 (git-fixes).\n\n - atm: fix atm_dev refcnt leaks in\n atmtcp_remove_persistent (git-fixes).\n\n - AX.25: Fix out-of-bounds read in ax25_connect()\n (git-fixes).\n\n - AX.25: Prevent integer overflows in connect and sendmsg\n (git-fixes).\n\n - AX.25: Prevent out-of-bounds read in ax25_sendmsg()\n (git-fixes).\n\n - ax88172a: fix ax88172a_unbind() failures (git-fixes).\n\n - b43: Remove uninitialized_var() usage (git-fixes).\n\n - blk-mq: consider non-idle request as 'inflight' in\n blk_mq_rq_inflight() (bsc#1165933).\n\n - Bluetooth: btmtksdio: fix up firmware download sequence\n (git-fixes).\n\n - Bluetooth: btusb: fix up firmware download sequence\n (git-fixes).\n\n - Bluetooth: fix kernel oops in store_pending_adv_report\n (git-fixes).\n\n - Bluetooth: Fix slab-out-of-bounds read in\n hci_extended_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Fix update of connection state in\n `hci_encrypt_cfm` (git-fixes).\n\n - Bluetooth: hci_h5: Set HCI_UART_RESET_ON_INIT to correct\n flags (git-fixes).\n\n - Bluetooth: hci_serdev: Only unregister device if it was\n registered (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_evt() (git-fixes).\n\n - Bluetooth: Prevent out-of-bounds read in\n hci_inquiry_result_with_rssi_evt() (git-fixes).\n\n - bnxt_en: Init ethtool link settings after reading\n updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bnxt_en: Init ethtool link settings after reading\n updated PHY configuration (jsc#SLE-8371 bsc#1153274).\n\n - bpf: Do not allow btf_ctx_access with __int128 types\n (bsc#1155518).\n\n - bpf: Fix map leak in HASH_OF_MAPS map (bsc#1155518).\n\n - bpfilter: fix up a sparse annotation (bsc#1155518).\n\n - bpfilter: Initialize pos variable (bsc#1155518).\n\n - bpfilter: reject kernel addresses (bsc#1155518).\n\n - bpfilter: switch to kernel_write (bsc#1155518).\n\n - bpf: net: Avoid copying sk_user_data of reuseport_array\n during sk_clone (bsc#1155518).\n\n - bpf: net: Avoid incorrect bpf_sk_reuseport_detach call\n (bsc#1155518).\n\n - brcmfmac: Set timeout value when configuring power save\n (bsc#1173468).\n\n - brcmfmac: Transform compatible string for FW loading\n (bsc#1169771).\n\n - bridge: Avoid infinite loop when suppressing NS messages\n with invalid options (networking-stable-20_06_10).\n\n - bridge: mcast: Fix MLD2 Report IPv6 payload length check\n (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8977 chipset\n (git-fixes).\n\n - btmrvl: Fix firmware filename for sd8997 chipset\n (git-fixes).\n\n - btrfs: add assertions for tree == inode->io_tree to\n extent IO helpers (bsc#1174438).\n\n - btrfs: avoid unnecessary splits when setting bits on an\n extent io tree (bsc#1175377).\n\n - btrfs: change timing for qgroup reserved space for\n ordered extents to fix reserved space leak\n (bsc#1172247).\n\n - btrfs: delete the ordered isize update code\n (bsc#1175377).\n\n - btrfs: do not set path->leave_spinning for truncate\n (bsc#1175377).\n\n - btrfs: drop argument tree from\n btrfs_lock_and_flush_ordered_range (bsc#1174438).\n\n - btrfs: file: reserve qgroup space after the hole punch\n range is locked (bsc#1172247).\n\n - btrfs: fix a block group ref counter leak after failure\n to remove block group (bsc#1175149).\n\n - btrfs: fix block group leak when removing fails\n (bsc#1175149).\n\n - btrfs: fix bytes_may_use underflow when running balance\n and scrub in parallel (bsc#1175149).\n\n - btrfs: fix corrupt log due to concurrent fsync of inodes\n with shared extents (bsc#1175149).\n\n - btrfs: fix data block group relocation failure due to\n concurrent scrub (bsc#1175149).\n\n - btrfs: fix deadlock during fast fsync when logging\n prealloc extents beyond eof (bsc#1175377).\n\n - btrfs: fix double free on ulist after backref resolution\n failure (bsc#1175149).\n\n - btrfs: fix failure of RWF_NOWAIT write into prealloc\n extent beyond eof (bsc#1174438).\n\n - btrfs: fix fatal extent_buffer readahead vs releasepage\n race (bsc#1175149).\n\n - btrfs: fix hang on snapshot creation after RWF_NOWAIT\n write (bsc#1174438).\n\n - btrfs: fix lost i_size update after cloning inline\n extent (bsc#1175377).\n\n - btrfs: fix page leaks after failure to lock page for\n delalloc (bsc#1175149).\n\n - btrfs: fix race between block group removal and block\n group creation (bsc#1175149).\n\n - btrfs: fix race between shrinking truncate and fiemap\n (bsc#1175377).\n\n - btrfs: fix RWF_NOWAIT write not failling when we need to\n cow (bsc#1174438).\n\n - btrfs: fix RWF_NOWAIT writes blocking on extent locks\n and waiting for IO (bsc#1174438).\n\n - btrfs: fix space_info bytes_may_use underflow after\n nocow buffered write (bsc#1175149).\n\n - btrfs: fix space_info bytes_may_use underflow during\n space cache writeout (bsc#1175149).\n\n - btrfs: fix wrong file range cleanup after an error\n filling dealloc range (bsc#1175149).\n\n - btrfs: inode: fix NULL pointer dereference if inode does\n not need compression (bsc#1174484).\n\n - btrfs: inode: move qgroup reserved space release to the\n callers of insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: inode: refactor the parameters of\n insert_reserved_file_extent() (bsc#1172247).\n\n - btrfs: introduce per-inode file extent tree\n (bsc#1175377).\n\n - btrfs: make btrfs_ordered_extent naming consistent with\n btrfs_file_extent_item (bsc#1172247).\n\n - btrfs: move extent_io_tree defs to their own header\n (bsc#1175377).\n\n - btrfs: Move free_pages_out label in inline extent\n handling branch in compress_file_range (bsc#1175263).\n\n - btrfs: qgroup: allow to unreserve range without\n releasing other ranges (bsc#1120163).\n\n - btrfs: qgroup: fix data leak caused by race between\n writeback and truncate (bsc#1172247).\n\n - btrfs: qgroup: remove ASYNC_COMMIT mechanism in favor of\n reserve retry-after-EDQUOT (bsc#1120163).\n\n - btrfs: qgroup: try to flush qgroup space when we get\n -EDQUOT (bsc#1120163).\n\n - btrfs: Remove delalloc_end argument from\n extent_clear_unlock_delalloc (bsc#1175149).\n\n - btrfs: Remove leftover of in-band dedupe (bsc#1175149).\n\n - btrfs: remove unnecessary delalloc mutex for inodes\n (bsc#1175377).\n\n - btrfs: Rename btrfs_join_transaction_nolock\n (bsc#1175377).\n\n - btrfs: replace all uses of btrfs_ordered_update_i_size\n (bsc#1175377).\n\n - btrfs: separate out the extent io init function\n (bsc#1175377).\n\n - btrfs: separate out the extent leak code (bsc#1175377).\n\n - btrfs: trim: fix underflow in trim length to prevent\n access beyond device boundary (bsc#1175263).\n\n - btrfs: use btrfs_ordered_update_i_size in\n clone_finish_inode_update (bsc#1175377).\n\n - btrfs: use correct count in btrfs_file_write_iter()\n (bsc#1174438).\n\n - btrfs: use the file extent tree infrastructure\n (bsc#1175377).\n\n - bus: ti-sysc: Do not disable on suspend for no-idle\n (git-fixes).\n\n - cfg80211: check vendor command doit pointer before use\n (git-fixes).\n\n - clk: actions: Fix h_clk for Actions S500 SoC\n (git-fixes).\n\n - clk: at91: clk-generated: check best_rate against ranges\n (git-fixes).\n\n - clk: at91: clk-generated: continue if\n __clk_determine_rate() returns error (git-fixes).\n\n - clk: at91: sam9x60: fix main rc oscillator frequency\n (git-fixes).\n\n - clk: at91: sam9x60-pll: check fcore against ranges\n (git-fixes).\n\n - clk: at91: sam9x60-pll: use logical or for range check\n (git-fixes).\n\n - clk: at91: sckc: register slow_rc with accuracy option\n (git-fixes).\n\n - clk: bcm2835: Do not use prediv with bcm2711's PLLs\n (bsc#1174865).\n\n - clk: bcm63xx-gate: fix last clock availability\n (git-fixes).\n\n - clk: clk-atlas6: fix return value check in\n atlas6_clk_init() (git-fixes).\n\n - clk: iproc: round clock rate to the closest (git-fixes).\n\n - clk: qcom: gcc-sdm660: Add missing modem reset\n (git-fixes).\n\n - clk: qcom: gcc-sdm660: Fix up gcc_mss_mnoc_bimc_axi_clk\n (git-fixes).\n\n - clk: rockchip: Revert 'fix wrong mmc sample phase shift\n for rk3328' (git-fixes).\n\n - clk: scmi: Fix min and max rate when registering clocks\n with discrete rates (git-fixes).\n\n - clk: spear: Remove uninitialized_var() usage\n (git-fixes).\n\n - clk: st: Remove uninitialized_var() usage (git-fixes).\n\n - console: newport_con: fix an issue about leak related\n system resources (git-fixes).\n\n - crc-t10dif: Fix potential crypto notify dead-lock\n (git-fixes).\n\n - crypto: caam - Fix argument type in\n handle_imx6_err005766 (git-fixes).\n\n - crypto: ccp - Fix use of merged scatterlists\n (git-fixes).\n\n - crypto: ccree - fix resource leak on error path\n (git-fixes).\n\n - crypto: cpt - do not sleep of CRYPTO_TFM_REQ_MAY_SLEEP\n was not specified (git-fixes).\n\n - crypto: hisilicon - do not sleep of\n CRYPTO_TFM_REQ_MAY_SLEEP was not specified (git-fixes).\n\n - crypto: qat - fix double free in\n qat_uclo_create_batch_init_list (git-fixes).\n\n - dccp: Fix possible memleak in dccp_init and dccp_fini\n (networking-stable-20_06_16).\n\n - Delete\n patches.suse/apparmor-Fix-memory-leak-of-profile-proxy.p\n atch (bsc#1174627)\n\n - devinet: fix memleak in inetdev_init()\n (networking-stable-20_06_07).\n\n - devlink: ignore -EOPNOTSUPP errors on dumpit\n (bsc#1154353).\n\n - /dev/mem: Add missing memory barriers for devmem_inode\n (git-fixes).\n\n - /dev/mem: Revoke mappings when a driver claims the\n region (git-fixes).\n\n - devres: keep both device name and resource name in\n pretty name (git-fixes).\n\n - dlm: remove BUG() before panic() (git-fixes).\n\n - dmaengine: dmatest: stop completed threads when running\n without set channel (git-fixes).\n\n - dmaengine: dw: Initialize channel before each transfer\n (git-fixes).\n\n - dmaengine: fsl-edma-common: correct DSIZE_32BYTE\n (git-fixes).\n\n - dmaengine: fsl-edma: Fix NULL pointer exception in\n fsl_edma_tx_handler (git-fixes).\n\n - dmaengine: fsl-edma: fix wrong tcd endianness for\n big-endian cpu (git-fixes).\n\n - dmaengine: imx-sdma: Fix: Remove 'always true'\n comparison (git-fixes).\n\n - dmaengine: ioat setting ioat timeout as module parameter\n (git-fixes).\n\n - dmaengine: mcf-edma: Fix NULL pointer exception in\n mcf_edma_tx_handler (git-fixes).\n\n - dmaengine: sh: usb-dmac: set tx_result parameters\n (git-fixes).\n\n - dmaengine: tegra210-adma: Fix runtime PM imbalance on\n error (git-fixes).\n\n - dm: do not use waitqueue for request-based DM\n (bsc#1165933).\n\n - docs: fix memory.low description in cgroup-v2.rst\n (git-fixes). (SLE documentation might refer to\n cgroup-v2.rst.)\n\n - dpaa_eth: FMan erratum A050385 workaround (bsc#1174396).\n\n - dpaa_eth: Make dpaa_a050385_wa static (bsc#1174396).\n\n - drbd: Remove uninitialized_var() usage (git-fixes).\n\n - driver core: Avoid binding drivers to dead devices\n (git-fixes).\n\n - drivers/firmware/psci: Fix memory leakage in\n alloc_init_cpu_groups() (git-fixes).\n\n - drivers/net/wan: lapb: Corrected the usage of skb_cow\n (git-fixes).\n\n - drm/amd/display: Clear dm_state for fast updates\n (git-fixes).\n\n - drm/amd/display: Use kfree() to free rgb_user in\n calculate_user_regamma_ramp() (git-fixes).\n\n - drm/amdgpu/atomfirmware: fix vram_info fetching for\n renoir (git-fixes).\n\n - drm/amdgpu/display: use blanked rather than plane state\n for sync (bsc#1152489) 	* refreshed for context\n changes 	* protect code with CONFIG_DRM_AMD_DC_DCN2_0\n\n - drm/amdgpu: do not do soft recovery if gpu_recovery=0\n (git-fixes).\n\n - drm/amdgpu: Fix NULL dereference in dpm sysfs handlers\n (git-fixes).\n\n - drm/amdgpu: fix preemption unit test (git-fixes).\n\n - drm/amdgpu/gfx10: fix race condition for kiq\n (git-fixes).\n\n - drm/amdgpu: Prevent kernel-infoleak in\n amdgpu_info_ioctl() (git-fixes).\n\n - drm/amdgpu/sdma5: fix wptr overwritten in ->get_wptr()\n (git-fixes).\n\n - drm/amdgpu: use %u rather than %d for sclk/mclk\n (git-fixes).\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M\n (bsc#1152472)\n\n - drm/amd/powerplay: fix a crash when overclocking Vega M\n (git-fixes).\n\n - drm/arm: fix unintentional integer overflow on left\n shift (git-fixes).\n\n - drm/bridge: dw-hdmi: Do not cleanup i2c adapter and ddc\n ptr in (bsc#1152472) 	* refreshed for context changes\n\n - drm/bridge: sil_sii8620: initialize return of\n sii8620_readb (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Clear old error bits before\n AUX transfers (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Do not use kernel-doc comment\n for local array (git-fixes).\n\n - drm/bridge: ti-sn65dsi86: Fix off-by-one error in clock\n choice (bsc#1152489) 	* refreshed for context changes\n\n - drm/dbi: Fix SPI Type 1 (9-bit) transfer (bsc#1152472)\n 	* move drm_mipi_dbi.c -> tinydrm/mipi-dbi.c\n\n - drm/etnaviv: Fix error path on failure to enable bus clk\n (git-fixes).\n\n - drm/exynos: fix ref count leak in mic_pre_enable\n (git-fixes).\n\n - drm/exynos: Properly propagate return value in\n drm_iommu_attach_device() (git-fixes).\n\n - drm: fix drm_dp_mst_port refcount leaks in\n drm_dp_mst_allocate_vcpi (git-fixes).\n\n - drm/gem: Fix a leak in drm_gem_objects_lookup()\n (git-fixes).\n\n - drm: hold gem reference until object is no longer\n accessed (git-fixes).\n\n - drm/i915: Actually emit the await_start (bsc#1174737).\n\n - drm/i915: Copy across scheduler behaviour flags across\n submit fences (bsc#1174737).\n\n - drm/i915: Do not poison i915_request.link on removal\n (bsc#1174737).\n\n - drm/i915: Drop no-semaphore boosting (bsc#1174737).\n\n - drm/i915: Eliminate the trylock for awaiting an earlier\n request (bsc#1174737).\n\n - drm/i915/fbc: Fix fence_y_offset handling (bsc#1152489)\n 	* context changes\n\n - drm/i915: Flush execution tasklets before checking\n request status (bsc#1174737).\n\n - drm/i915: Flush tasklet submission before sleeping on\n i915_request_wait (bsc#1174737).\n\n - drm/i915/gt: Close race between engine_park and\n intel_gt_retire_requests (git-fixes).\n\n - drm/i915/gt: Flush submission tasklet before\n waiting/retiring (bsc#1174737).\n\n - drm/i915/gt: Ignore irq enabling on the virtual engines\n (git-fixes).\n\n - drm/i915/gt: Move new timelines to the end of\n active_list (git-fixes).\n\n - drm/i915/gt: Only swap to a random sibling once upon\n creation (bsc#1152489) 	* context changes\n\n - drm/i915/gt: Unlock engine-pm after queuing the kernel\n context switch (git-fixes).\n\n - drm/i915: Ignore submit-fences on the same timeline\n (bsc#1174737).\n\n - drm/i915: Improve the start alignment of bonded pairs\n (bsc#1174737).\n\n - drm/i915: Keep track of request among the scheduling\n lists (bsc#1174737).\n\n - drm/i915: Lock signaler timeline while navigating\n (bsc#1174737).\n\n - drm/i915: Mark i915_request.timeline as a volatile, rcu\n pointer (bsc#1174737).\n\n - drm/i915: Mark racy read of intel_engine_cs.saturated\n (bsc#1174737).\n\n - drm/i915: Mark up unlocked update of\n i915_request.hwsp_seqno (bsc#1174737).\n\n - drm/i915: Move cec_notifier to\n intel_hdmi_connector_unregister, v2. (bsc#1152489) 	*\n context changes\n\n - drm/i915: Peel dma-fence-chains for await (bsc#1174737).\n\n - drm/i915: Prevent using semaphores to chain up to\n external fences (bsc#1174737).\n\n - drm/i915: Protect i915_request_await_start from early\n waits (bsc#1174737).\n\n - drm/i915: Pull waiting on an external dma-fence into its\n routine (bsc#1174737).\n\n - drm/i915: Rely on direct submission to the queue\n (bsc#1174737).\n\n - drm/i915: Remove wait priority boosting (bsc#1174737).\n\n - drm/i915: Reorder await_execution before await_request\n (bsc#1174737).\n\n - drm/i915: Return early for await_start on same timeline\n (bsc#1174737).\n\n - drm/i915: Use EAGAIN for trylock failures (bsc#1174737).\n\n - drm/imx: fix use after free (git-fixes).\n\n - drm/imx: imx-ldb: Disable both channels for split mode\n in enc->disable() (git-fixes).\n\n - drm/imx: tve: fix regulator_disable error path\n (git-fixes).\n\n - drm/ingenic: Fix incorrect assumption about plane->index\n (bsc#1152489) 	* refreshed for context changes\n\n - drm: mcde: Fix display initialization problem\n (git-fixes).\n\n - drm/mediatek: Check plane visibility in atomic_update\n (git-fixes).\n\n - drm/mipi: use dcs write for\n mipi_dsi_dcs_set_tear_scanline (git-fixes).\n\n - drm/msm/dpu: allow initialization of encoder locks\n during encoder init (git-fixes).\n\n - drm/msm: fix potential memleak in error branch\n (git-fixes).\n\n - drm/nouveau/fbcon: fix module unload when fbcon init has\n failed for some reason (git-fixes).\n\n - drm/nouveau/fbcon: zero-initialise the mode_cmd2\n structure (git-fixes).\n\n - drm/nouveau/i2c/g94-: increase\n NV_PMGR_DP_AUXCTL_TRANSACTREQ timeout (git-fixes).\n\n - drm: panel-orientation-quirks: Add quirk for Asus T101HA\n panel (git-fixes).\n\n - drm: panel-orientation-quirks: Use generic\n orientation-data for Acer S1003 (git-fixes).\n\n - drm/panel: otm8009a: Drop unnessary\n backlight_device_unregister() (git-fixes).\n\n - drm: panel: simple: Fix bpc for LG LB070WV8 panel\n (git-fixes).\n\n - drm/radeon: fix array out-of-bounds read and write\n issues (git-fixes).\n\n - drm/radeon: fix double free (git-fixes).\n\n - drm/stm: repair runtime power management (git-fixes).\n\n - drm: sun4i: hdmi: Fix inverted HPD result (git-fixes).\n\n - drm/sun4i: tcon: Separate quirks for tcon0 and tcon1 on\n A20 (git-fixes).\n\n - drm/tegra: hub: Do not enable orphaned window group\n (git-fixes).\n\n - drm/vgem: Replace opencoded version of\n drm_gem_dumb_map_offset() (bsc#1152489) 	* refreshed\n for context changes\n\n - drm/vmwgfx: Fix two list_for_each loop exit tests\n (git-fixes).\n\n - drm/vmwgfx: Use correct vmw_legacy_display_unit pointer\n (git-fixes).\n\n - exfat: add missing brelse() calls on error paths\n (git-fixes).\n\n - exfat: fix incorrect update of stream entry in\n __exfat_truncate() (git-fixes).\n\n - exfat: fix memory leak in exfat_parse_param()\n (git-fixes).\n\n - exfat: move setting VOL_DIRTY over\n exfat_remove_entries() (git-fixes).\n\n - fbdev: Detect integer underflow at 'struct\n fbcon_ops'->clear_margins (git-fixes).\n\n - firmware: arm_scmi: Fix SCMI genpd domain probing\n (git-fixes).\n\n - firmware: arm_scmi: Keep the discrete clock rates sorted\n (git-fixes).\n\n - firmware: arm_sdei: use common SMCCC_CONDUIT_*\n (bsc#1174906).\n\n - firmware: Fix a reference count leak (git-fixes).\n\n - firmware_loader: fix memory leak for paged buffer\n (bsc#1175367).\n\n - firmware/psci: use common SMCCC_CONDUIT_* (bsc#1174906).\n\n - firmware: smccc: Add ARCH_SOC_ID support (bsc#1174906).\n\n - firmware: smccc: Add function to fetch SMCCC version\n (bsc#1174906).\n\n - firmware: smccc: Add HAVE_ARM_SMCCC_DISCOVERY to\n identify SMCCC v1.1 and above (bsc#1174906).\n\n - firmware: smccc: Add the definition for SMCCCv1.2\n version/error codes (bsc#1174906).\n\n - firmware: smccc: Drop smccc_version enum and use\n ARM_SMCCC_VERSION_1_x instead (bsc#1174906).\n\n - firmware: smccc: Refactor SMCCC specific bits into\n separate file (bsc#1174906).\n\n - firmware: smccc: Update link to latest SMCCC\n specification (bsc#1174906).\n\n - fpga: dfl: fix bug in port reset handshake (git-fixes).\n\n - fsl/fman: detect FMan erratum A050385 (bsc#1174396)\n Update arm64 config file\n\n - fuse: copy_file_range should truncate cache (git-fixes).\n\n - fuse: fix copy_file_range cache issues (git-fixes).\n\n - fuse: Fix parameter for FS_IOC_(GET,SET)FLAGS\n (bsc#1175176).\n\n - fuse: fix weird page warning (bsc#1175175).\n\n - geneve: fix an uninitialized value in\n geneve_changelink() (git-fixes).\n\n - genirq/affinity: Improve __irq_build_affinity_masks()\n (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Remove const qualifier from\n node_to_cpumask argument (bsc#1174897 ltc#187090).\n\n - genirq/affinity: Spread vectors on node according to\n nr_cpu ratio (bsc#1174897 ltc#187090).\n\n - gfs2: Another gfs2_find_jhead fix (bsc#1174824).\n\n - gfs2: fix gfs2_find_jhead that returns uninitialized\n jhead with seq 0 (bsc#1174825).\n\n - go7007: add sanity checking for endpoints (git-fixes).\n\n - gpio: arizona: handle pm_runtime_get_sync failure case\n (git-fixes).\n\n - gpio: arizona: put pm_runtime in case of failure\n (git-fixes).\n\n - gpio: max77620: Fix missing release of interrupt\n (git-fixes).\n\n - gpio: pca953x: disable regmap locking for automatic\n address incrementing (git-fixes).\n\n - gpio: pca953x: Fix GPIO resource leak on Intel Galileo\n Gen 2 (git-fixes).\n\n - gpio: pca953x: Override IRQ for one of the expanders on\n Galileo Gen 2 (git-fixes).\n\n - gpu: host1x: Detach driver on unregister (git-fixes).\n\n - habanalabs: increase timeout during reset (git-fixes).\n\n - HID: alps: support devices with report id 2 (git-fixes).\n\n - HID: apple: Disable Fn-key key-re-mapping on clone\n keyboards (git-fixes).\n\n - HID: i2c-hid: add Mediacom FlexBook edge13 to descriptor\n override (git-fixes).\n\n - HID: logitech-hidpp: avoid repeated 'multiplier = ' log\n messages (git-fixes).\n\n - HID: magicmouse: do not set up autorepeat (git-fixes).\n\n - HID: quirks: Always poll Obins Anne Pro 2 keyboard\n (git-fixes).\n\n - HID: quirks: Ignore Simply Automated UPB PIM\n (git-fixes).\n\n - HID: quirks: Remove ITE 8595 entry from\n hid_have_special_driver (git-fixes).\n\n - HID: steam: fixes race in handling device list\n (git-fixes).\n\n - hippi: Fix a size used in a 'pci_free_consistent()' in\n an error handling path (git-fixes).\n\n - hwmon: (adm1275) Make sure we are reading enough data\n for different chips (git-fixes).\n\n - hwmon: (aspeed-pwm-tacho) Avoid possible buffer overflow\n (git-fixes).\n\n - hwmon: (emc2103) fix unable to change fan pwm1_enable\n attribute (git-fixes).\n\n - hwmon: (nct6775) Accept PECI Calibration as temperature\n source for NCT6798D (git-fixes).\n\n - hwmon: (scmi) Fix potential buffer overflow in\n scmi_hwmon_probe() (git-fixes).\n\n - hwrng: ks-sa - Fix runtime PM imbalance on error\n (git-fixes).\n\n - i2c: also convert placeholder function to return errno\n (git-fixes).\n\n - i2c: eg20t: Load module automatically if ID matches\n (git-fixes).\n\n - i2c: i2c-qcom-geni: Fix DMA transfer race (git-fixes).\n\n - i2c: iproc: fix race between client unreg and isr\n (git-fixes).\n\n - i2c: rcar: always clear ICSAR to avoid side effects\n (git-fixes).\n\n - i2c: rcar: avoid race when unregistering slave\n (git-fixes).\n\n - i2c: rcar: slave: only send STOP event when we have been\n addressed (git-fixes).\n\n - i2c: slave: add sanity check when unregistering\n (git-fixes).\n\n - i2c: slave: improve sanity check when registering\n (git-fixes).\n\n - i40iw: Do an RCU lookup in i40iw_add_ipv4_addr\n (git-fixes).\n\n - i40iw: Fix error handling in i40iw_manage_arp_cache()\n (git-fixes).\n\n - i40iw: fix NULL pointer dereference on a null wqe\n pointer (git-fixes).\n\n - i40iw: Report correct firmware version (git-fixes).\n\n - IB/cma: Fix ports memory leak in cma_configfs\n (git-fixes).\n\n - IB/core: Fix potential NULL pointer dereference in pkey\n cache (git-fixes).\n\n - IB/hfi1: Do not destroy hfi1_wq when the device is shut\n down (bsc#1174409).\n\n - IB/hfi1: Do not destroy link_wq when the device is shut\n down (bsc#1174409).\n\n - IB/hfi1: Ensure pq is not left on waitlist (git-fixes).\n\n - IB/hfi1: Fix another case where pq is left on waitlist\n (bsc#1174411).\n\n - IB/hfi1: Fix memory leaks in sysfs registration and\n unregistration (git-fixes).\n\n - IB/hfi1: Fix module use count flaw due to leftover\n module put calls (bsc#1174407).\n\n - IB/hfi1, qib: Ensure RCU is locked when accessing list\n (git-fixes).\n\n - IB/ipoib: Fix double free of skb in case of multicast\n traffic in CM mode (git-fixes).\n\n - IB/mad: Fix use after free when destroying MAD agent\n (git-fixes).\n\n - IB/mlx4: Test return value of calls to\n ib_get_cached_pkey (git-fixes).\n\n - IB/mlx5: Fix 50G per lane indication (git-fixes).\n\n - IB/mlx5: Fix DEVX support for MLX5_CMD_OP_INIT2INIT_QP\n command (git-fixes).\n\n - IB/mlx5: Fix missing congestion control debugfs on rep\n rdma device (git-fixes).\n\n - IB/mlx5: Replace tunnel mpls capability bits for\n tunnel_offloads (git-fixes).\n\n - ibmvnic: Fix IRQ mapping disposal in error path\n (bsc#1175112 ltc#187459).\n\n - IB/qib: Call kobject_put() when kobject_init_and_add()\n fails (git-fixes).\n\n - IB/rdmavt: Always return ERR_PTR from\n rvt_create_mmap_info() (git-fixes).\n\n - IB/rdmavt: Delete unused routine (git-fixes).\n\n - IB/rdmavt: Fix RQ counting issues causing use of an\n invalid RWQE (bsc#1174770).\n\n - IB/sa: Resolv use-after-free in ib_nl_make_request()\n (git-fixes).\n\n - ide: Remove uninitialized_var() usage (git-fixes).\n\n - ieee802154: fix one possible memleak in adf7242_probe\n (git-fixes).\n\n - iio: adc: ad7780: Fix a resource handling path in\n 'ad7780_probe()' (git-fixes).\n\n - iio: core: add missing IIO_MOD_H2/ETHANOL string\n identifiers (git-fixes).\n\n - iio:health:afe4404 Fix timestamp alignment and prevent\n data leak (git-fixes).\n\n - iio:humidity:hdc100x Fix alignment and data leak issues\n (git-fixes).\n\n - iio:humidity:hts221 Fix alignment and data leak issues\n (git-fixes).\n\n - iio: improve IIO_CONCENTRATION channel type description\n (git-fixes).\n\n - iio:magnetometer:ak8974: Fix alignment and data leak\n issues (git-fixes).\n\n - iio: magnetometer: ak8974: Fix runtime PM imbalance on\n error (git-fixes).\n\n - iio: mma8452: Add missed iio_device_unregister() call in\n mma8452_probe() (git-fixes).\n\n - iio:pressure:ms5611 Fix buffer element alignment\n (git-fixes).\n\n - iio: pressure: zpa2326: handle pm_runtime_get_sync\n failure (git-fixes).\n\n - Input: elan_i2c - add more hardware ID for Lenovo\n laptops (git-fixes).\n\n - Input: elan_i2c - only increment wakeup count on touch\n (git-fixes).\n\n - Input: goodix - fix touch coordinates on Cube I15-TC\n (git-fixes).\n\n - Input: i8042 - add Lenovo XiaoXin Air 12 to i8042 nomux\n list (git-fixes).\n\n - Input: mms114 - add extra compatible for mms345l\n (git-fixes).\n\n - Input: sentelic - fix error return when fsp_reg_write\n fails (git-fixes).\n\n - Input: synaptics - enable InterTouch for ThinkPad X1E\n 1st gen (git-fixes).\n\n - integrity: remove redundant initialization of variable\n ret (git-fixes).\n\n - intel_th: Fix a NULL dereference when hub driver is not\n loaded (git-fixes).\n\n - intel_th: pci: Add Emmitsburg PCH support (git-fixes).\n\n - intel_th: pci: Add Jasper Lake CPU support (git-fixes).\n\n - intel_th: pci: Add Tiger Lake PCH-H support (git-fixes).\n\n - io-mapping: indicate mapping failure (git-fixes).\n\n - iommu/arm-smmu-v3: Do not reserve implementation defined\n register space (bsc#1174126).\n\n - iommu/vt-d: Enable PCI ACS for platform opt in hint\n (bsc#1174127).\n\n - iommu/vt-d: Update scalable mode paging structure\n coherency (bsc#1174128).\n\n - ionic: centralize queue reset code (bsc#1167773).\n\n - ionic: fix up filter locks and debug msgs (bsc#1167773).\n\n - ionic: keep rss hash after fw update (bsc#1167773).\n\n - ionic: unlock queue mutex in error path (bsc#1167773).\n\n - ionic: update filter id after replay (bsc#1167773).\n\n - ionic: update the queue count on open (bsc#1167773).\n\n - ionic: use mutex to protect queue operations\n (bsc#1167773).\n\n - ionic: use offset for ethtool regs data (bsc#1167773).\n\n - irqchip/gic: Atomically update affinity (bsc#1175195).\n\n - kabi fix for\n SUNRPC-dont-update-timeout-value-on-connection-reset.pat\n ch (bsc1174263).\n\n - kABI: reintroduce inet_hashtables.h include to l2tp_ip\n (kabi).\n\n - kABI: restore signature of xfrm_policy_bysel_ctx() and\n xfrm_policy_byid() (bsc#1174645).\n\n - kABI workaround for enum cpuhp_state (git-fixes).\n\n - kABI workaround for struct kvm_device (git-fixes). Just\n change an variable to 'const' type in kvm_device.\n\n - kABI workaround for struct kvm_vcpu_arch (git-fixes).\n\n - kernel.h: remove duplicate include of asm/div64.h\n (git-fixes).\n\n - keys: asymmetric: fix error return code in\n software_key_query() (git-fixes).\n\n - kobject: Avoid premature parent object freeing in\n kobject_cleanup() (git-fixes).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: Allow kvm_device_ops to be const (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Annotate hyp NMI-related functions as\n __always_inline (bsc#1175190).\n\n - KVM: arm64: Correct PSTATE on exception entry\n (bsc#1133021).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Document PV-time interface (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Fix 32bit PC wrap-around (bsc#1133021).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Implement PV_TIME_FEATURES call (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: arm64: Make vcpu_cp1x() work on Big Endian hosts\n (bsc#1133021).\n\n - KVM: arm64: Provide VCPU attributes for stolen time\n (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Provide VCPU attributes for stolen time\n (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than\n SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Select TASK_DELAY_ACCT+TASKSTATS rather than\n SCHEDSTATS (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Stop writing aarch32's CSSELR into ACTLR\n (bsc#1133021).\n\n - KVM: arm64: Support stolen time reporting via shared\n structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Support stolen time reporting via shared\n structure (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm64: Use the correct timer structure to access\n the physical counter (bsc#1133021).\n\n - KVM: arm/arm64: Correct AArch32 SPSR on exception entry\n (bsc#1133021).\n\n - KVM: arm/arm64: Correct CPSR on exception entry\n (bsc#1133021).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI\n code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm/arm64: Factor out hypercall handling from PSCI\n code (bsc#1172197 jsc#SLE-13593).\n\n - KVM: arm: vgic: Fix limit condition when writing to\n GICD_IACTIVER (bsc#1133021).\n\n - KVM: Implement kvm_put_guest() (bsc#1172197\n jsc#SLE-13593).\n\n - KVM: nVMX: always update CR3 in VMCS (git-fixes).\n\n - KVM: Play nice with read-only memslots when querying\n host page size (bsc#1133021).\n\n - KVM: s390: Remove false WARN_ON_ONCE for the PQAP\n instruction (bsc#1133021).\n\n - l2tp: add sk_family checks to l2tp_validate_socket\n (networking-stable-20_06_07).\n\n - l2tp: do not use inet_hash()/inet_unhash()\n (networking-stable-20_06_07).\n\n - leds: 88pm860x: fix use-after-free on unbind\n (git-fixes).\n\n - leds: core: Flush scheduled work for system suspend\n (git-fixes).\n\n - leds: da903x: fix use-after-free on unbind (git-fixes).\n\n - leds: gpio: Fix semantic error (git-fixes).\n\n - leds: lm3533: fix use-after-free on unbind (git-fixes).\n\n - leds: lm355x: avoid enum conversion warning (git-fixes).\n\n - leds: lm36274: fix use-after-free on unbind (git-fixes).\n\n - leds: wm831x-status: fix use-after-free on unbind\n (git-fixes).\n\n - libbpf: Wrap source argument of BPF_CORE_READ macro in\n parentheses (bsc#1155518).\n\n - lib: Reduce user_access_begin() boundaries in\n strncpy_from_user() and strnlen_user() (bsc#1174331).\n\n - liquidio: Fix wrong return value in cn23xx_get_pf_num()\n (git-fixes).\n\n - locktorture: Print ratio of acquisitions, not failures\n (bsc#1149032).\n\n - mac80211: allow rx of mesh eapol frames with default rx\n key (git-fixes).\n\n - mac80211: fix misplaced while instead of if (git-fixes).\n\n - mac80211: mesh: Free ie data when leaving mesh\n (git-fixes).\n\n - mac80211: mesh: Free pending skb when destroying a mpath\n (git-fixes).\n\n - media: cec: silence shift wrapping warning in\n __cec_s_log_addrs() (git-fixes).\n\n - media: cxusb-analog: fix V4L2 dependency (git-fixes).\n\n - media: exynos4-is: Add missed check for\n pinctrl_lookup_state() (git-fixes).\n\n - media: firewire: Using uninitialized values in\n node_probe() (git-fixes).\n\n - media: marvell-ccic: Add missed\n v4l2_async_notifier_cleanup() (git-fixes).\n\n - media: media-request: Fix crash if memory allocation\n fails (git-fixes).\n\n - media: nuvoton-cir: remove setting tx carrier functions\n (git-fixes).\n\n - media: omap3isp: Add missed v4l2_ctrl_handler_free() for\n preview_init_entities() (git-fixes).\n\n - media: sur40: Remove uninitialized_var() usage\n (git-fixes).\n\n - media: vsp1: dl: Fix NULL pointer dereference on unbind\n (git-fixes).\n\n - mei: bus: do not clean driver pointer (git-fixes).\n\n - mfd: arizona: Ensure 32k clock is put on driver unbind\n and error (git-fixes).\n\n - mfd: dln2: Run event handler loop under spinlock\n (git-fixes).\n\n - mfd: intel-lpss: Add Intel Jasper Lake PCI IDs\n (jsc#SLE-12602).\n\n - mlxsw: core: Fix wrong SFP EEPROM reading for upper\n pages 1-3 (bsc#1154488).\n\n - mlxsw: core: Use different get_trend() callbacks for\n different thermal zones (networking-stable-20_06_10).\n\n - mmc: meson-gx: limit segments to 1 when\n dram-access-quirk is needed (git-fixes).\n\n - mmc: sdhci: do not enable card detect interrupt for gpio\n cd type (git-fixes).\n\n - mm: Fix protection usage propagation (bsc#1174002).\n\n - mm/mmap.c: close race between munmap() and\n expand_upwards()/downwards() (bsc#1174527).\n\n - mtd: properly check all write ioctls for permissions\n (git-fixes).\n\n - mtd: rawnand: fsl_upm: Remove unused mtd var\n (git-fixes).\n\n - mtd: rawnand: qcom: avoid write to unavailable register\n (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8977 chipset\n (git-fixes).\n\n - mwifiex: Fix firmware filename for sd8997 chipset\n (git-fixes).\n\n - mwifiex: Prevent memory corruption handling keys\n (git-fixes).\n\n - nbd: Fix memory leak in nbd_add_socket (git-fixes).\n\n - ndctl/papr_scm,uapi: Add support for PAPR nvdimm\n specific methods (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - net: be more gentle about silly gso requests coming from\n user (networking-stable-20_06_07).\n\n - net/bpfilter: Initialize pos in\n __bpfilter_process_sockopt (bsc#1155518).\n\n - net/bpfilter: split __bpfilter_process_sockopt\n (bsc#1155518).\n\n - net: check untrusted gso_size at kernel entry\n (networking-stable-20_06_07).\n\n - netdevsim: fix unbalaced locking in nsim_create()\n (git-fixes).\n\n - net: dsa: bcm_sf2: Fix node reference count (git-fixes).\n\n - net: ena: add reserved PCI device ID (bsc#1174852).\n\n - net: ena: add support for reporting of packet drops\n (bsc#1174852).\n\n - net: ena: add support for the rx offset feature\n (bsc#1174852).\n\n - net: ena: add support for traffic mirroring\n (bsc#1174852).\n\n - net: ena: add unmask interrupts statistics to ethtool\n (bsc#1174852).\n\n - net: ena: allow setting the hash function without\n changing the key (bsc#1174852).\n\n - net: ena: avoid memory access violation by validating\n req_id properly (bsc#1174852).\n\n - net: ena: avoid unnecessary admin command when RSS\n function set fails (bsc#1174852).\n\n - net: ena: avoid unnecessary rearming of interrupt vector\n when busy-polling (bsc#1174852).\n\n - net: ena: change default RSS hash function to Toeplitz\n (bsc#1174852).\n\n - net: ena: changes to RSS hash key allocation\n (bsc#1174852).\n\n - net: ena: cosmetic: change ena_com_stats_admin stats to\n u64 (bsc#1174852).\n\n - net: ena: cosmetic: code reorderings (bsc#1174852).\n\n - net: ena: cosmetic: extract code to\n ena_indirection_table_set() (bsc#1174852).\n\n - net: ena: cosmetic: fix line break issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spacing issues (bsc#1174852).\n\n - net: ena: cosmetic: fix spelling and grammar mistakes in\n comments (bsc#1174852).\n\n - net: ena: cosmetic: minor code changes (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary code\n (bsc#1174852).\n\n - net: ena: cosmetic: remove unnecessary spaces and tabs\n in ena_com.h macros (bsc#1174852).\n\n - net: ena: cosmetic: rename\n ena_update_tx/rx_rings_intr_moderation() (bsc#1174852).\n\n - net: ena: cosmetic: satisfy gcc warning (bsc#1174852).\n\n - net: ena: cosmetic: set queue sizes to u32 for\n consistency (bsc#1174852).\n\n - net: ena: drop superfluous prototype (bsc#1174852).\n\n - net: ena: enable support of rss hash key and function\n changes (bsc#1174852).\n\n - net: ena: ethtool: clean up minor indentation issue\n (bsc#1174852).\n\n - net: ena: ethtool: remove redundant non-zero check on rc\n (bsc#1174852).\n\n - net/ena: Fix build warning in ena_xdp_set()\n (bsc#1174852).\n\n - net: ena: fix continuous keep-alive resets\n (bsc#1174852).\n\n - net: ena: fix ena_com_comp_status_to_errno() return\n value (bsc#1174852).\n\n - net: ena: fix error returning in\n ena_com_get_hash_function() (bsc#1174852).\n\n - net: ena: fix request of incorrect number of IRQ vectors\n (bsc#1174852).\n\n - net: ena: Fix using plain integer as NULL pointer in\n ena_init_napi_in_range (bsc#1174852).\n\n - net: ena: Make some functions static (bsc#1174852).\n\n - net: ena: move llq configuration from ena_probe to\n ena_device_init() (bsc#1174852).\n\n - net: ena: reduce driver load time (bsc#1174852).\n\n - net: ena: remove code that does nothing (bsc#1174852).\n\n - net: ena: remove set but not used variable 'hash_key'\n (bsc#1174852).\n\n - net: ena: rename ena_com_free_desc to make API more\n uniform (bsc#1174852).\n\n - net: ena: simplify\n ena_com_update_intr_delay_resolution() (bsc#1174852).\n\n - net: ena: support new LLQ acceleration mode\n (bsc#1174852).\n\n - net: ena: use explicit variable size for clarity\n (bsc#1174852).\n\n - net: ena: use SHUTDOWN as reset reason when closing\n interface (bsc#1174852).\n\n - net_failover: fixed rollback in net_failover_open()\n (networking-stable-20_06_10).\n\n - netfilter: ip6tables: Add a .pre_exit hook in all\n ip6table_foo.c (bsc#1171857).\n\n - netfilter: ip6tables: Split ip6t_unregister_table() into\n pre_exit and exit helpers (bsc#1171857).\n\n - netfilter: iptables: Add a .pre_exit hook in all\n iptable_foo.c (bsc#1171857).\n\n - netfilter: iptables: Split ipt_unregister_table() into\n pre_exit and exit helpers (bsc#1171857).\n\n - net: Fix a documentation bug wrt.\n ip_unprivileged_port_start (git-fixes). (SLES tuning\n guide refers to ip-sysctl.txt.)\n\n - net: fsl/fman: treat all RGMII modes in\n memac_adjust_link() (bsc#1174398).\n\n - net: hns3: check reset pending after FLR prepare\n (bsc#1154353).\n\n - net: hns3: fix error handling for desc filling\n (git-fixes).\n\n - net: hns3: fix for not calculating TX BD send size\n correctly (git-fixes).\n\n - net: hns3: fix return value error when query MAC link\n status fail (git-fixes).\n\n - net: ipv4: Fix wrong type conversion from hint to rt in\n ip_route_use_hint() (bsc#1154353).\n\n - net: lan78xx: add missing endpoint sanity check\n (git-fixes).\n\n - net: lan78xx: fix transfer-buffer memory leak\n (git-fixes).\n\n - net: lan78xx: replace bogus endpoint lookup (git-fixes).\n\n - net: macb: call pm_runtime_put_sync on failure path\n (git-fixes).\n\n - net/mlx5: drain health workqueue in case of driver load\n error (networking-stable-20_06_16).\n\n - net/mlx5e: Fix CPU mapping after function reload to\n avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix CPU mapping after function reload to\n avoid aRFS RX crash (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a\n VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix kernel crash when setting vf VLANID on a\n VF dev (jsc#SLE-8464).\n\n - net/mlx5e: Fix repeated XSK usage on one channel\n (networking-stable-20_06_16).\n\n - net/mlx5e: Fix VXLAN configuration restore after\n function reload (jsc#SLE-8464).\n\n - net/mlx5e: Fix VXLAN configuration restore after\n function reload (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the\n mode (jsc#SLE-8464).\n\n - net/mlx5: E-switch, Destroy TSAR when fail to enable the\n mode (jsc#SLE-8464).\n\n - net/mlx5: Fix fatal error handling during device load\n (networking-stable-20_06_16).\n\n - net: phy: Check harder for errors in get_phy_id()\n (git-fixes).\n\n - net: phy: fix memory leak in device-create error path\n (git-fixes).\n\n - net: phy: realtek: add support for configuring the RX\n delay on RTL8211F (bsc#1174398).\n\n - net, sk_msg: Clear sk_user_data pointer on clone if\n tagged (bsc#1155518).\n\n - net, sk_msg: Do not use RCU_INIT_POINTER on sk_user_data\n (bsc#1155518).\n\n - net/smc: fix restoring of fallback changes (git-fixes).\n\n - net: stmmac: do not attach interface until resume\n finishes (bsc#1174072).\n\n - net: stmmac: dwc-qos: avoid clk and reset for acpi\n device (bsc#1174072).\n\n - net: stmmac: dwc-qos: use generic device api\n (bsc#1174072).\n\n - net: stmmac: enable timestamp snapshot for required PTP\n packets in dwmac v5.10a (networking-stable-20_06_07).\n\n - net: stmmac: platform: fix probe for ACPI devices\n (bsc#1174072).\n\n - net/tls: fix encryption error checking (git-fixes).\n\n - net/tls: free record only on encryption error\n (git-fixes).\n\n - net: usb: qmi_wwan: add Telit LE910C1-EUX composition\n (networking-stable-20_06_07).\n\n - nfc: nci: add missed destroy_workqueue in\n nci_register_device (git-fixes).\n\n - nfc: s3fwrn5: add missing release on skb in\n s3fwrn5_recv_frame (git-fixes).\n\n - nfp: flower: fix used time of merge flow statistics\n (networking-stable-20_06_07).\n\n - NFS: Fix interrupted slots by sending a solo SEQUENCE\n operation (bsc#1174264).\n\n - NTB: Fix static check warning in perf_clear_test\n (git-fixes).\n\n - NTB: Fix the default port and peer numbers for legacy\n drivers (git-fixes).\n\n - ntb: hw: remove the code that sets the DMA mask\n (git-fixes).\n\n - NTB: ntb_pingpong: Choose doorbells based on port number\n (git-fixes).\n\n - NTB: ntb_test: Fix bug when counting remote files\n (git-fixes).\n\n - NTB: ntb_tool: reading the link file should not end in a\n NULL byte (git-fixes).\n\n - NTB: perf: Do not require one more memory window than\n number of peers (git-fixes).\n\n - NTB: perf: Fix race condition when run with ntb_test\n (git-fixes).\n\n - NTB: perf: Fix support for hardware that does not have\n port numbers (git-fixes).\n\n - ntb_perf: pass correct struct device to\n dma_alloc_coherent (git-fixes).\n\n - NTB: Revert the change to use the NTB device dev for DMA\n allocations (git-fixes).\n\n - ntb_tool: pass correct struct device to\n dma_alloc_coherent (git-fixes).\n\n - ocfs2: avoid inode removal while nfsd is accessing it\n (bsc#1172963).\n\n - ocfs2: fix panic on nfs server over ocfs2 (bsc#1172963).\n\n - ocfs2: fix remounting needed after setfacl command\n (bsc#1173954).\n\n - ocfs2: load global_inode_alloc (bsc#1172963).\n\n - omapfb: dss: Fix max fclk divider for omap36xx\n (git-fixes).\n\n - ovl: inode reference leak in ovl_is_inuse true case\n (git-fixes).\n\n - padata: add separate cpuhp node for CPUHP_PADATA_DEAD\n (git-fixes).\n\n - padata: kABI fixup for struct padata_instance splitting\n nodes (git-fixes).\n\n - PCI/AER: Remove HEST/FIRMWARE_FIRST parsing for AER\n ownership (bsc#1174356).\n\n - PCI/AER: Use only _OSC to determine AER ownership\n (bsc#1174356).\n\n - PCI/ASPM: Add missing newline in sysfs 'policy'\n (git-fixes).\n\n - PCI/ASPM: Disable ASPM on ASMedia ASM1083/1085\n PCIe-to-PCI bridge (git-fixes).\n\n - PCI: cadence: Fix updating Vendor ID and Subsystem\n Vendor ID register (git-fixes).\n\n - PCI/EDR: Log only ACPI_NOTIFY_DISCONNECT_RECOVER events\n (bsc#1174513).\n\n - PCI: Fix pci_cfg_wait queue locking problem (git-fixes).\n\n - PCI: hotplug: ACPI: Fix context refcounting in\n acpiphp_grab_context() (git-fixes).\n\n - PCI: hv: Add support for protocol 1.3 and support\n PCI_BUS_RELATIONS2 (bsc#1172201).\n\n - PCI: qcom: Add missing ipq806x clocks in PCIe driver\n (git-fixes).\n\n - PCI: qcom: Add missing reset for ipq806x (git-fixes).\n\n - PCI: qcom: Add support for tx term offset for rev 2.1.0\n (git-fixes).\n\n - PCI: qcom: Define some PARF params needed for ipq8064\n SoC (git-fixes).\n\n - PCI: rcar: Fix runtime PM imbalance on error\n (git-fixes).\n\n - PCI: Release IVRS table in AMD ACS quirk (git-fixes).\n\n - pci: Revive pci_dev __aer_firmware_first* fields for\n kABI (bsc#1174356).\n\n - PCI: switchtec: Add missing __iomem and __user tags to\n fix sparse warnings (git-fixes).\n\n - PCI: switchtec: Add missing __iomem tag to fix sparse\n warnings (git-fixes).\n\n - PCI: tegra: Revert tegra124 raw_violation_fixup\n (git-fixes).\n\n - percpu: Separate decrypted varaibles anytime encryption\n can be enabled (bsc#1174332).\n\n - phy: armada-38x: fix NETA lockup when repeatedly\n switching speeds (git-fixes).\n\n - phy: exynos5-usbdrd: Calibrating makes sense only for\n USB2.0 PHY (git-fixes).\n\n - phy: renesas: rcar-gen3-usb2: move irq registration to\n init (git-fixes).\n\n - phy: sun4i-usb: fix dereference of pointer phy0 before\n it is null checked (git-fixes).\n\n - pinctrl: amd: fix npins for uart0 in kerncz_groups\n (git-fixes).\n\n - pinctrl: ingenic: Enhance support for IRQ_TYPE_EDGE_BOTH\n (git-fixes).\n\n - pinctrl: single: fix function name in documentation\n (git-fixes).\n\n - pinctrl-single: fix pcs_parse_pinconf() return value\n (git-fixes).\n\n - platform/chrome: cros_ec_ishtp: Fix a double-unlock\n issue (git-fixes).\n\n - platform/x86: intel-hid: Fix return value check in\n check_acpi_dev() (git-fixes).\n\n - platform/x86: intel-vbtn: Fix return value check in\n check_acpi_dev() (git-fixes).\n\n - platform/x86: ISST: Increase timeout (bsc#1174185).\n\n - PM: wakeup: Show statistics for deleted wakeup sources\n again (git-fixes).\n\n - powerpc/64s: Fix early_init_mmu section mismatch\n (bsc#1065729).\n\n - powerpc: Allow 4224 bytes of stack expansion for the\n signal frame (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Fix pkey_access_permitted() for\n execute disable pkey (bsc#1065729).\n\n - powerpc/book3s64/pkeys: Use PVR check instead of cpu\n feature (bsc#1065729).\n\n - powerpc/boot: Fix CONFIG_PPC_MPC52XX references\n (bsc#1065729).\n\n - powerpc: Document details on H_SCM_HEALTH hcall\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/eeh: Fix pseries_eeh_configure_bridge()\n (bsc#1174689).\n\n - powerpc/fadump: fix race between pstore write and fadump\n crash trigger (bsc#1168959 ltc#185010).\n\n - powerpc/kasan: Fix issues by lowering KASAN_SHADOW_END\n (git-fixes).\n\n - powerpc/nvdimm: Use HCALL error as the return value\n (bsc#1175284).\n\n - powerpc/nvdimm: use H_SCM_QUERY hcall on H_OVERLAP error\n (bsc#1175284).\n\n - powerpc/papr_scm: Add support for fetching nvdimm\n 'fuel-gauge' metric (bsc#1175052 jsc#SLE-13823\n bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm health information from\n PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - powerpc/papr_scm: Fetch nvdimm performance stats from\n PHYP (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - powerpc/papr_scm: Implement support for PAPR_PDSM_HEALTH\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/papr_scm: Improve error logging and handling\n papr_scm_ndctl() (bsc#1175052 jsc#SLE-13823 bsc#1174969\n jsc#SLE-12769).\n\n - powerpc/papr_scm: Mark papr_scm_ndctl() as static\n (bsc#1175052 jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - powerpc/pseries/hotplug-cpu: Remove double free in error\n path (bsc#1065729).\n\n - powerpc/pseries: PCIE PHB reset (bsc#1174689).\n\n - powerpc/pseries: remove cede offline state for CPUs\n (bsc#1065729).\n\n - powerpc/rtas: do not online CPUs for partition suspend\n (bsc#1065729).\n\n - powerpc/vdso: Fix vdso cpu truncation (bsc#1065729).\n\n - powerpc/xmon: Reset RCU and soft lockup watchdogs\n (bsc#1065729).\n\n - power: supply: check if calc_soc succeeded in\n pm860x_init_battery (git-fixes).\n\n - pwm: bcm-iproc: handle clk_get_rate() return\n (git-fixes).\n\n - qed: suppress 'do not support RoCE & iWARP' flooding on\n HW init (git-fixes).\n\n - qed: suppress false-positives interrupt error messages\n on HW init (git-fixes).\n\n - r8169: fix jumbo configuration for RTL8168evl\n (bsc#1175296).\n\n - r8169: fix jumbo packet handling on resume from suspend\n (bsc#1175296).\n\n - r8169: fix resume on cable plug-in (bsc#1175296).\n\n - r8169: fix rtl_hw_jumbo_disable for RTL8168evl\n (bsc#1175296).\n\n - r8169: move disabling interrupt coalescing to\n RTL8169/RTL8168 init (bsc#1175296).\n\n - r8169: read common register for PCI commit\n (bsc#1175296).\n\n - random32: move the pseudo-random 32-bit definitions to\n prandom.h (git-fixes).\n\n - random32: remove net_rand_state from the latent entropy\n gcc plugin (git-fixes).\n\n - random: fix circular include dependency on arm64 after\n addition of percpu.h (git-fixes).\n\n - RDMA/cm: Add missing locking around id.state in\n cm_dup_req_handler (git-fixes).\n\n - RDMA/cma: Protect bind_list and listen_list while\n finding matching cm id (git-fixes).\n\n - RDMA/cm: Fix an error check in cm_alloc_id_priv()\n (git-fixes).\n\n - RDMA/cm: Fix checking for allowed duplicate listens\n (git-fixes).\n\n - RDMA/cm: Fix ordering of xa_alloc_cyclic() in\n ib_create_cm_id() (git-fixes).\n\n - RDMA/cm: Read id.state under lock when doing pr_debug()\n (git-fixes).\n\n - RDMA/cm: Remove a race freeing timewait_info\n (git-fixes).\n\n - RDMA/cm: Update num_paths in cma_resolve_iboe_route\n error flow (git-fixes).\n\n - RDMA/core: Fix double destruction of uobject\n (git-fixes).\n\n - RDMA/core: Fix double put of resource (git-fixes).\n\n - RDMA/core: Fix missing error check on dev_set_name()\n (git-fixes).\n\n - RDMA/core: Fix protection fault in ib_mr_pool_destroy\n (git-fixes).\n\n - RDMA/core: Fix race between destroy and release FD\n object (git-fixes).\n\n - RDMA/core: Fix race in rdma_alloc_commit_uobject()\n (git-fixes).\n\n - RDMA/core: Prevent mixed use of FDs between shared\n ufiles (git-fixes).\n\n - RDMA/counter: Query a counter before release\n (git-fixes).\n\n - RDMA/efa: Set maximum pkeys device attribute\n (git-fixes).\n\n - RDMA/hns: Bugfix for querying qkey (git-fixes).\n\n - RDMA/hns: Fix cmdq parameter of querying pf timer\n resource (git-fixes).\n\n - RDMA/iwcm: Fix iwcm work deallocation (git-fixes).\n\n - RDMA/iw_cxgb4: Fix incorrect function parameters\n (git-fixes).\n\n - RDMA/mad: Do not crash if the rdma device does not have\n a umad interface (git-fixes).\n\n - RDMA/mad: Fix possible memory leak in\n ib_mad_post_receive_mads() (git-fixes).\n\n - RDMA/mlx4: Initialize ib_spec on the stack (git-fixes).\n\n - RDMA/mlx5: Add init2init as a modify command\n (git-fixes).\n\n - RDMA/mlx5: Fix access to wrong pointer while performing\n flush due to error (git-fixes).\n\n - RDMA/mlx5: Fix prefetch memory leak if\n get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix prefetch memory leak if\n get_prefetchable_mr fails (jsc#SLE-8446).\n\n - RDMA/mlx5: Fix the number of hwcounters of a dynamic\n counter (git-fixes).\n\n - RDMA/mlx5: Fix udata response upon SRQ creation\n (git-fixes).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit\n destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Prevent prefetch from racing with implicit\n destruction (jsc#SLE-8446).\n\n - RDMA/mlx5: Set GRH fields in query QP on RoCE\n (git-fixes).\n\n - RDMA/mlx5: Use xa_lock_irq when access to SRQ table\n (git-fixes).\n\n - RDMA/mlx5: Verify that QP is created with RQ or SQ\n (git-fixes).\n\n - RDMA/nldev: Fix crash when set a QP to a new counter but\n QPN is missing (git-fixes).\n\n - RDMA/pvrdma: Fix missing pci disable in\n pvrdma_pci_probe() (git-fixes).\n\n - RDMA/qedr: Fix KASAN: use-after-free in\n ucma_event_handler+0x532 (git-fixes).\n\n - RDMA/rvt: Fix potential memory leak caused by\n rvt_alloc_rq (git-fixes).\n\n - RDMA/rxe: Always return ERR_PTR from\n rxe_create_mmap_info() (git-fixes).\n\n - RDMA/rxe: Fix configuration of atomic queue pair\n attributes (git-fixes).\n\n - RDMA/rxe: Set default vendor ID (git-fixes).\n\n - RDMA/rxe: Set sys_image_guid to be aligned with HW IB\n devices (git-fixes).\n\n - RDMA/siw: Fix failure handling during device creation\n (git-fixes).\n\n - RDMA/siw: Fix passive connection establishment\n (git-fixes).\n\n - RDMA/siw: Fix pointer-to-int-cast warning in\n siw_rx_pbl() (git-fixes).\n\n - RDMA/siw: Fix potential siw_mem refcnt leak in\n siw_fastreg_mr() (git-fixes).\n\n - RDMA/siw: Fix reporting vendor_part_id (git-fixes).\n\n - RDMA/siw: Fix setting active_mtu attribute (git-fixes).\n\n - RDMA/siw: Fix setting active_(speed, width) attributes\n (git-fixes).\n\n - RDMA/ucma: Put a lock around every call to the rdma_cm\n layer (git-fixes).\n\n - RDMA/uverbs: Fix create WQ to use the given user handle\n (git-fixes).\n\n - regmap: debugfs: check count when read regmap file\n (git-fixes).\n\n - regmap: debugfs: Do not sleep while atomic for fast_io\n regmaps (git-fixes).\n\n - regmap: dev_get_regmap_match(): fix string comparison\n (git-fixes).\n\n - regmap: fix alignment issue (git-fixes).\n\n - regmap: Fix memory leak from regmap_register_patch\n (git-fixes).\n\n - regulator: gpio: Honor regulator-boot-on property\n (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate MBA firmware size\n before load (git-fixes).\n\n - remoteproc: qcom_q6v5_mss: Validate modem blob firmware\n size before load (git-fixes).\n\n - remoteproc: qcom: q6v5: Update running state before\n requesting stop (git-fixes).\n\n - Revert 'ALSA: hda: call runtime_allow() for all hda\n controllers' (git-fixes).\n\n - Revert 'drm/amd/display: Expose connector VRR range via\n debugfs' (bsc#1152489) 	* refreshed for context\n changes\n\n - Revert 'drm/amdgpu: Fix NULL dereference in dpm sysfs\n handlers' (git-fixes).\n\n - Revert 'i2c: cadence: Fix the hold bit setting'\n (git-fixes).\n\n - Revert 'RDMA/cma: Simplify rdma_resolve_addr() error\n flow' (git-fixes).\n\n - Revert 'thermal: mediatek: fix register index error'\n (git-fixes).\n\n - rhashtable: Document the right function parameters\n (bsc#1174880).\n\n - rhashtable: drop duplicated word in <linux/rhashtable.h>\n (bsc#1174880).\n\n - rhashtable: Drop raw RCU deref in nested_table_free\n (bsc#1174880).\n\n - rhashtable: Fix unprotected RCU dereference in __rht_ptr\n (bsc#1174880).\n\n - rhashtable: Restore RCU marking on rhash_lock_head\n (bsc#1174880).\n\n - RMDA/cm: Fix missing ib_cm_destroy_id() in\n ib_cm_insert_listen() (git-fixes).\n\n - rpm/kernel-obs-build.spec.in: Enable overlayfs Overlayfs\n is needed for podman or docker builds when no more\n specific driver can be used (like lvm or btrfs). As the\n default build fs is ext4 currently, we need overlayfs\n kernel modules to be available.\n\n - rpm/modules.fips: add ecdh_generic (boo#1173813)\n\n - rtlwifi: rtl8192cu: Remove uninitialized_var() usage\n (git-fixes).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink\n fails (bsc#1154353).\n\n - rtnetlink: Fix memory(net_device) leak when ->newlink\n fails (git-fixes).\n\n - rtw88: fix LDPC field for RA info (git-fixes).\n\n - rtw88: fix short GI capability based on current\n bandwidth (git-fixes).\n\n - s390: fix syscall_get_error for compat processes\n (git-fixes).\n\n - s390/ism: fix error return code in ism_probe()\n (git-fixes).\n\n - s390/kaslr: add support for R_390_JMP_SLOT relocation\n type (git-fixes).\n\n - s390/pci: Fix s390_mmio_read/write with MIO (git-fixes).\n\n - s390/qdio: consistently restore the IRQ handler\n (git-fixes).\n\n - s390/qdio: put thinint indicator after early error\n (git-fixes).\n\n - s390/qdio: tear down thinint indicator after early error\n (git-fixes).\n\n - s390/qeth: fix error handling for isolation mode cmds\n (git-fixes).\n\n - sched/fair: handle case of task_h_load() returning 0\n (bnc#1155798 (CPU scheduler functional and performance\n backports)).\n\n - scsi: ipr: Fix softlockup when rescanning devices in\n petitboot (jsc#SLE-13654).\n\n - scsi: ipr: Fix softlockup when rescanning devices in\n petitboot (jsc#SLE-13654).\n\n - scsi: ipr: remove unneeded semicolon (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer\n overflow (jsc#SLE-13654).\n\n - scsi: ipr: Use scnprintf() for avoiding potential buffer\n overflow (jsc#SLE-13654).\n\n - scsi: libfc: free response frame from GPN_ID\n (bsc#1173849).\n\n - scsi: libfc: Handling of extra kref (bsc#1173849).\n\n - scsi: libfc: If PRLI rejected, move rport to PLOGI state\n (bsc#1173849).\n\n - scsi: libfc: rport state move to PLOGI if all PRLI retry\n exhausted (bsc#1173849).\n\n - scsi: libfc: Skip additional kref updating work event\n (bsc#1173849).\n\n - scsi: ufs-bsg: Fix runtime PM imbalance on error\n (git-fixes).\n\n - scsi: zfcp: Fix panic on ERP timeout for previously\n dismissed ERP action (git-fixes).\n\n - selftests/net: in rxtimestamp getopt_long needs\n terminating null entry (networking-stable-20_06_16).\n\n - selinux: fall back to ref-walk if audit is required\n (bsc#1174333).\n\n - selinux: revert 'stop passing MAY_NOT_BLOCK to the AVC\n upon follow_link' (bsc#1174333).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - seq_buf: Export seq_buf_printf (bsc#1175052\n jsc#SLE-13823 bsc#1174969 jsc#SLE-12769).\n\n - serial: 8250: fix null-ptr-deref in\n serial8250_start_tx() (git-fixes).\n\n - serial: 8250_mtk: Fix high-speed baud rates clamping\n (git-fixes).\n\n - serial: 8250_pci: Move Pericom IDs to pci_ids.h\n (git-fixes).\n\n - serial: 8250_tegra: Create Tegra specific 8250 driver\n (bsc#1173941).\n\n - serial: amba-pl011: Make sure we initialize the\n port.lock spinlock (git-fixes).\n\n - serial: exar: Fix GPIO configuration for Sealevel cards\n based on XR17V35X (git-fixes).\n\n - serial: mxs-auart: add missed iounmap() in probe failure\n and remove (git-fixes).\n\n - serial: tegra: fix CREAD handling for PIO (git-fixes).\n\n - SMB3: Honor lease disabling for multiuser mounts\n (git-fixes).\n\n - soc/tegra: pmc: Enable PMIC wake event on Tegra210\n (bsc#1175116).\n\n - soundwire: intel: fix memory leak with devm_kasprintf\n (git-fixes).\n\n - spi: davinci: Remove uninitialized_var() usage\n (git-fixes).\n\n - spi: lantiq: fix: Rx overflow error in full duplex mode\n (git-fixes).\n\n - spi: lantiq-ssc: Fix warning by using WQ_MEM_RECLAIM\n (git-fixes).\n\n - spi: mediatek: use correct SPI_CFG2_REG MACRO\n (git-fixes).\n\n - spi: rockchip: Fix error in SPI slave pio read\n (git-fixes).\n\n - spi: spidev: fix a potential use-after-free in\n spidev_release() (git-fixes).\n\n - spi: spidev: fix a race between spidev_release and\n spidev_remove (git-fixes).\n\n - spi: spi-geni-qcom: Actually use our FIFO (git-fixes).\n\n - spi: spi-sun6i: sun6i_spi_transfer_one(): fix setting of\n clock rate (git-fixes).\n\n - spi: sun4i: update max transfer size reported\n (git-fixes).\n\n - staging: comedi: addi_apci_1032: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1500: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: addi_apci_1564: check\n INSN_CONFIG_DIGITAL_TRIG shift (git-fixes).\n\n - staging: comedi: ni_6527: fix INSN_CONFIG_DIGITAL_TRIG\n support (git-fixes).\n\n - staging: comedi: verify array index is correct before\n using it (git-fixes).\n\n - Staging: rtl8188eu: rtw_mlme: Fix uninitialized variable\n authmode (git-fixes).\n\n - staging: rtl8192u: fix a dubious looking mask before a\n shift (git-fixes).\n\n - staging: rtl8712: handle firmware load failure\n (git-fixes).\n\n - staging: vchiq_arm: Add a matching unregister call\n (git-fixes).\n\n - staging: wlan-ng: properly check endpoint types\n (git-fixes).\n\n - SUNRPC dont update timeout value on connection reset\n (bsc#1174263).\n\n - sunrpc: Fix gss_unwrap_resp_integ() again (bsc#1174116).\n\n - tcp: md5: allow changing MD5 keys in all socket states\n (git-fixes).\n\n - thermal/drivers: imx: Fix missing of_node_put() at probe\n time (git-fixes).\n\n - thermal: int3403_thermal: Downgrade error message\n (git-fixes).\n\n - thermal: ti-soc-thermal: Fix reversed condition in\n ti_thermal_expose_sensor() (git-fixes).\n\n - tpm_crb: fix fTPM on AMD Zen+ CPUs (bsc#1174362).\n\n - tpm: Require that all digests are present in\n TCG_PCR_EVENT2 structures (git-fixes).\n\n - tpm_tis: extra chip->ops check on error path in\n tpm_tis_core_init (git-fixes).\n\n - tty: hvc_console, fix crashes on parallel open/close\n (git-fixes).\n\n - ubsan: check panic_on_warn (bsc#1174805).\n\n - udp: Copy has_conns in reuseport_grow() (git-fixes).\n\n - udp: Improve load balancing for SO_REUSEPORT\n (git-fixes).\n\n - uio_pdrv_genirq: Remove warning when irq is not\n specified (bsc#1174762).\n\n - USB: c67x00: fix use after free in c67x00_giveback_urb\n (git-fixes).\n\n - usb: chipidea: core: add wakeup support for extcon\n (git-fixes).\n\n - usb: core: fix quirks_param_set() writing to a const\n pointer (git-fixes).\n\n - usb: dwc2: Fix shutdown callback in platform\n (git-fixes).\n\n - usb: dwc2: gadget: Make use of GINTMSK2 (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Jasper Lake\n (git-fixes).\n\n - usb: dwc3: pci: add support for the Intel Tiger Lake PCH\n -H variant (git-fixes).\n\n - usb: dwc3: pci: Fix reference count leak in\n dwc3_pci_resume_work (git-fixes).\n\n - usb: gadget: Fix issue with config_ep_by_speed function\n (git-fixes).\n\n - usb: gadget: f_uac2: fix AC Interface Header Descriptor\n wTotalLength (git-fixes).\n\n - usb: gadget: function: fix missing spinlock in\n f_uac1_legacy (git-fixes).\n\n - usb: gadget: udc: atmel: fix uninitialized read in debug\n printk (git-fixes).\n\n - usb: gadget: udc: atmel: remove outdated comment in\n usba_ep_disable() (git-fixes).\n\n - usb: gadget: udc: gr_udc: fix memleak on error handling\n path in gr_ep_init() (git-fixes).\n\n - usb: hso: check for return value in\n hso_serial_common_create() (git-fixes).\n\n - usb: hso: Fix debug compile warning on sparc32\n (git-fixes).\n\n - USB: iowarrior: fix up report size handling for some\n devices (git-fixes).\n\n - usbip: tools: fix module name in man page (git-fixes).\n\n - usbnet: smsc95xx: Fix use-after-free after removal\n (git-fixes).\n\n - USB: serial: ch341: add new Product ID for CH340\n (git-fixes).\n\n - USB: serial: cp210x: enable usb generic\n throttle/unthrottle (git-fixes).\n\n - USB: serial: cp210x: re-enable auto-RTS on open\n (git-fixes).\n\n - USB: serial: cypress_m8: enable Simply Automated UPB PIM\n (git-fixes).\n\n - USB: serial: iuu_phoenix: fix led-activity helpers\n (git-fixes).\n\n - USB: serial: iuu_phoenix: fix memory corruption\n (git-fixes).\n\n - USB: serial: option: add GosunCn GM500 series\n (git-fixes).\n\n - USB: serial: option: add Quectel EG95 LTE modem\n (git-fixes).\n\n - USB: serial: qcserial: add EM7305 QDL product ID\n (git-fixes).\n\n - usb: tegra: Fix allocation for the FPCI context\n (git-fixes).\n\n - usb: xhci: define IDs for various ASMedia host\n controllers (git-fixes).\n\n - usb: xhci: Fix ASM2142/ASM3142 DMA addressing\n (git-fixes).\n\n - usb: xhci: Fix ASMedia ASM1142 DMA addressing\n (git-fixes).\n\n - usb: xhci-mtk: fix the failure of bandwidth allocation\n (git-fixes).\n\n - vfio/pci: Fix SR-IOV VF handling with MMIO blocking\n (bsc#1174129).\n\n - video: fbdev: sm712fb: fix an issue about iounmap for a\n wrong address (git-fixes).\n\n - video: pxafb: Fix the function used to balance a\n 'dma_alloc_coherent()' call (git-fixes).\n\n - virtio: virtio_console: add missing\n MODULE_DEVICE_TABLE() for rproc serial (git-fixes).\n\n - virt: vbox: Fix guest capabilities mask check\n (git-fixes).\n\n - virt: vbox: Fix VBGL_IOCTL_VMMDEV_REQUEST_BIG and _LOG\n req numbers to match upstream (git-fixes).\n\n - vsock: fix timeout in vsock_accept()\n (networking-stable-20_06_07).\n\n - vt: Reject zero-sized screen buffer size (git-fixes).\n\n - vxlan: Avoid infinite loop when suppressing NS messages\n with invalid options (networking-stable-20_06_10).\n\n - watchdog: f71808e_wdt: clear watchdog timeout occurred\n flag (git-fixes).\n\n - watchdog: f71808e_wdt: indicate WDIOF_CARDRESET support\n in watchdog_info.options (git-fixes).\n\n - watchdog: f71808e_wdt: remove use of wrong watchdog_info\n option (git-fixes).\n\n - watchdog: initialize device before misc_register\n (git-fixes).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO\n (jsc#SLE-13202).\n\n - watchdog: iTCO: Add support for Cannon Lake PCH iTCO\n (jsc#SLE-13202).\n\n - wireless: Use linux/stddef.h instead of stddef.h\n (git-fixes).\n\n - wireless: Use offsetof instead of custom macro\n (git-fixes).\n\n - wl1251: fix always return 0 error (git-fixes).\n\n - workqueue: Remove unnecessary kfree() call in\n rcu_free_wq() (git-fixes).\n\n - xen/pvcalls-back: test for errors when calling\n backend_connect() (bsc#1065600).\n\n - xfrm: fix a warning in xfrm_policy_insert_list\n (bsc#1174645).\n\n - xfrm: policy: match with both mark and mask on user\n interfaces (bsc#1174645).\n\n - xfs: do not eat an EIO/ENOSPC writeback error when\n scrubbing data fork (git-fixes).\n\n - xfs: fix inode allocation block res calculation\n precedence (git-fixes).\n\n - xfs: fix reflink quota reservation accounting error\n (git-fixes).\n\n - xfs: preserve rmapbt swapext block reservation from\n freed blocks (git-fixes).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1149032\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152472\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1152489\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1153274\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154353\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1154488\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155518\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1155798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1165933\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1167773\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1168959\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1169771\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171857\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1171988\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172197\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172201\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173468\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173573\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173813\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173849\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173941\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174002\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174072\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174116\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174126\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174127\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174129\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174264\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174331\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174332\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174362\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174396\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174398\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174407\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174409\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174411\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174438\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174462\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174513\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174527\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174625\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174627\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174689\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174737\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174757\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174762\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174770\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174824\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174852\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174865\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174880\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174897\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1174969\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175009\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175010\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175011\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175012\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175013\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175014\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175015\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175016\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175017\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175019\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175020\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175052\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175112\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175116\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175149\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175175\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175176\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175180\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175182\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175183\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175184\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175185\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175187\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175188\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175190\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175191\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175192\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175195\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175213\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175296\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175344\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175345\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175346\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175347\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175367\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1175377\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-15780\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:bbswitch-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-eppic-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-gcore-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:crash-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-examples\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-examples-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:dpdk-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:drbd-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:hdjmod-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-preempt-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdpdk-20_0\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:libdpdk-20_0-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:mhvtl-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-authlibs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-authlibs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-authlibs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-fuse_client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-fuse_client-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-server\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:openafs-server-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:pcfclock-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python3-virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:python3-virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:rtl8812au-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:sysdig-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:v4l2loopback-utils\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:vhba-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-desktop-icons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-tools-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-guest-x11-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-host-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-qt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-vnc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:virtualbox-websrv-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:xtables-addons-kmp-preempt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/19\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/08/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/08/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.2)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.2\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-0.8-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-debugsource-0.8-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-default-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-default-debuginfo-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-preempt-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"bbswitch-kmp-preempt-debuginfo-0.8_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-debuginfo-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-debugsource-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-devel-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-eppic-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-eppic-debuginfo-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-gcore-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-gcore-debuginfo-7.2.8-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-default-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-default-debuginfo-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-preempt-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"crash-kmp-preempt-debuginfo-7.2.8_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-debugsource-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-devel-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-devel-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-examples-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-examples-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-default-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-default-debuginfo-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-preempt-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-kmp-preempt-debuginfo-19.11.1_k5.3.18_lp152.36-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-tools-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"dpdk-tools-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-9.0.22~1+git.fe2b5983-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-debugsource-9.0.22~1+git.fe2b5983-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-default-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-default-debuginfo-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-preempt-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"drbd-kmp-preempt-debuginfo-9.0.22~1+git.fe2b5983_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-debugsource-1.28-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-default-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-default-debuginfo-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-preempt-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"hdjmod-kmp-preempt-debuginfo-1.28_k5.3.18_lp152.36-lp152.6.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-debug-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-default-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-docs-html-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-kvmsmall-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-macros-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-build-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-obs-qa-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-debugsource-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-preempt-devel-debuginfo-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-source-vanilla-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"kernel-syms-5.3.18-lp152.36.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libdpdk-20_0-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"libdpdk-20_0-debuginfo-19.11.1-lp152.2.5.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-1.62-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-debuginfo-1.62-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-debugsource-1.62-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-default-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-default-debuginfo-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-preempt-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"mhvtl-kmp-preempt-debuginfo-1.62_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-authlibs-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-authlibs-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-authlibs-devel-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-client-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-client-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-debugsource-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-devel-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-devel-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-fuse_client-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-fuse_client-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kernel-source-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-default-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-default-debuginfo-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-preempt-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-kmp-preempt-debuginfo-1.8.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-server-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"openafs-server-debuginfo-1.8.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-0.44-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-debuginfo-0.44-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-debugsource-0.44-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-default-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-default-debuginfo-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-preempt-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"pcfclock-kmp-preempt-debuginfo-0.44_k5.3.18_lp152.36-lp152.4.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"python3-virtualbox-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"python3-virtualbox-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-5.6.4.2+git20200318.49e98ff-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-debugsource-5.6.4.2+git20200318.49e98ff-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-default-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-default-debuginfo-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-preempt-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"rtl8812au-kmp-preempt-debuginfo-5.6.4.2+git20200318.49e98ff_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-0.26.5-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-debuginfo-0.26.5-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-debugsource-0.26.5-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-default-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-default-debuginfo-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-preempt-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"sysdig-kmp-preempt-debuginfo-0.26.5_k5.3.18_lp152.36-lp152.3.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-debugsource-0.12.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-default-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-default-debuginfo-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-preempt-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-kmp-preempt-debuginfo-0.12.5_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"v4l2loopback-utils-0.12.5-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-default-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-default-debuginfo-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-preempt-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"vhba-kmp-preempt-debuginfo-20200106_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-debugsource-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-devel-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-desktop-icons-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-source-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-tools-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-tools-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-x11-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-guest-x11-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-host-source-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-default-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-default-debuginfo-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-preempt-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-kmp-preempt-debuginfo-6.1.10_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-qt-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-qt-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-vnc-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-websrv-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"virtualbox-websrv-debuginfo-6.1.10-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-3.9-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-debuginfo-3.9-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-default-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-default-debuginfo-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-preempt-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.2\", reference:\"xtables-addons-kmp-preempt-debuginfo-3.9_k5.3.18_lp152.36-lp152.2.2.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"bbswitch / bbswitch-debugsource / bbswitch-kmp-default / etc\");\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-28T14:15:12", "description": "The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup (bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split() (bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem which could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling (bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed remote attackers to make observations that help to obtain sensitive information about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions on new filesystem objects when the filesystem lacks ACL support (bsc#1175518).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via memory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {}, "published": "2020-09-09T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2574-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-14314", "CVE-2020-14331", "CVE-2020-14356", "CVE-2020-14386", "CVE-2020-16166", "CVE-2020-1749", "CVE-2020-24394"], "modified": "2020-09-29T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2020-2574-1.NASL", "href": "https://www.tenable.com/plugins/nessus/140449", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2020:2574-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(140449);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/29\");\n\n script_cve_id(\"CVE-2020-14314\", \"CVE-2020-14331\", \"CVE-2020-14356\", \"CVE-2020-14386\", \"CVE-2020-16166\", \"CVE-2020-1749\", \"CVE-2020-24394\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2020:2574-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2020-1749: Use ip6_dst_lookup_flow instead of ip6_dst_lookup\n(bsc#1165629).\n\nCVE-2020-14314: Fixed a potential negative array index in do_split()\n(bsc#1173798).\n\nCVE-2020-14356: Fixed a NULL pointer dereference in cgroupv2 subsystem\nwhich could have led to privilege escalation (bsc#1175213).\n\nCVE-2020-14331: Fixed a missing check in vgacon scrollback handling\n(bsc#1174205).\n\nCVE-2020-16166: Fixed a potential issue which could have allowed\nremote attackers to make observations that help to obtain sensitive\ninformation about the internal state of the network RNG (bsc#1174757).\n\nCVE-2020-24394: Fixed an issue which could set incorrect permissions\non new filesystem objects when the filesystem lacks ACL support\n(bsc#1175518).\n\nCVE-2020-14386: Fixed a potential local privilege escalation via\nmemory corruption (bsc#1176069).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1058115\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071995\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1074701\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083548\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085030\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085235\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1087078\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1087082\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094912\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100394\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102640\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113956\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120163\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1133021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1136666\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1144333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1152148\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1163524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1165629\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1166965\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1169790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1170232\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171558\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1171688\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172073\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172108\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172418\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172871\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172872\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172873\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1172963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173485\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1173954\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174003\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174026\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174161\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174205\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174387\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1174484\"\n );\n script_set_attribute(\n