The openSUSE Leap 42.3 kernel was updated to 4.4.162 to receive various
security and bugfixes.
The following security bugs were fixed:
- CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping
pagetable locks. If a syscall such as ftruncate() removes entries from
the pagetables of a task that is in the middle of mremap(), a stale TLB
entry can remain for a short time that permits access to a physical page
after it has been released back to the page allocator and reused.
(bnc#1113769).
- CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in
drivers/cdrom/cdrom.c could be used by local attackers to read kernel
memory because a cast from unsigned long to int interferes with bounds
checking. This is similar to CVE-2018-10940 and CVE-2018-16658
(bnc#1113751).
- CVE-2018-18690: A local attacker able to set attributes on an xfs
filesystem could make this filesystem non-operational until the next
mount by triggering an unchecked error condition during an xfs attribute
change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c
mishandled ATTR_REPLACE operations with conversion of an attr from short
to long form (bnc#1105025).
- CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are
able to access pseudo terminals) to hang/block further usage of any
pseudo terminal devices due to an EXTPROC versus ICANON confusion in
TIOCINQ (bnc#1094825).
- CVE-2018-9516: A lack of certain checks in the hid_debug_events_read()
function in the drivers/hid/hid-debug.c file might have resulted in
receiving userspace buffer overflow and an out-of-bounds write or to the
infinite loop. (bnc#1108498).
The following non-security bugs were fixed:
- 6lowpan: iphc: reset mac_header after decompress to fix panic
(bnc#1012382).
- Add azure kernel description.
- Add bug reference to
patches.suse/x86-entry-64-use-a-per-cpu-trampoline-stack-fix1.patch
- Add graphviz to buildreq for image conversion
- Add reference to bsc#1104124 to
patches.fixes/fs-aio-fix-the-increment-of-aio-nr-and-counting-agai.patch
- ALSA: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).
- ALSA: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760
(bnc#1012382).
- apparmor: remove no-op permission check in policy_unpack (git-fixes).
- ARC: build: Get rid of toolchain check (bnc#1012382).
- ARC: clone syscall to setp r25 as thread pointer (bnc#1012382).
- arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).
- arch-symbols: use bash as interpreter since the script uses bashism.
- arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).
- arm64: jump_label.h: use asm_volatile_goto macro instead of "asm goto"
(bnc#1012382).
- arm64: KVM: Sanitize PSTATE.M when being set from userspace
(bnc#1012382).
- arm64: KVM: Tighten guest core register access from userspace
(bnc#1012382).
- ARM: dts: at91: add new compatibility string for macb on sama5d3
(bnc#1012382).
- ARM: dts: dra7: fix DCAN node addresses (bnc#1012382).
- ARM: mvebu: declare asm symbols as character arrays in pmsu.c
(bnc#1012382).
- ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs
(bnc#1012382).
- ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).
- ASoC: wm8804: Add ACPI support (bnc#1012382).
- ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).
- ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).
- ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).
- Bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).
- bnxt_en: Fix TX timeout during netpoll (bnc#1012382).
- bonding: avoid possible dead-lock (bnc#1012382).
- bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).
- bpf: fix map not being uncharged during map creation failure
(bsc#1012382).
- bpf, s390: fix potential memleak when later bpf_jit_prog fails
(git-fixes).
- bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).
- bsc#1106913: Replace with upstream variants Delete
patches.suse/11-x86-mm-only-set-ibpb-when-the-new-thread-cannot-ptrace-curr
ent-thread.patch.
- bs-upload-kernel: do not set %opensuse_bs Since SLE15 it is not set in
the distribution project so do not set it for kernel projects either.
- btrfs: add a comp_refs() helper (dependency for bsc#1031392).
- btrfs: add missing initialization in btrfs_check_shared (Git-fixes
bsc#1112262).
- btrfs: add tracepoints for outstanding extents mods (dependency for
bsc#1031392).
- btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for
bsc#1031392).
- btrfs: cleanup extent locking sequence (dependency for bsc#1031392).
- btrfs: defrag: use btrfs_mod_outstanding_extents in
cluster_pages_for_defrag (Follow up fixes for bsc#1031392).
- btrfs: delayed-inode: Remove wrong qgroup meta reservation calls
(bsc#1031392).
- btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item
(bsc#1031392).
- btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency
for bsc#1113667).
- btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).
- btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).
- Btrfs: fix invalid attempt to free reserved space on failure to cow
range (dependency for bsc#1031392).
- btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes
bsc#1109919).
- btrfs: Fix race condition between delayed refs and blockgroup removal
(Git-fixes bsc#1112263).
- btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).
- Btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist
(dependency for bsc#1031392).
- btrfs: make the delalloc block rsv per inode (dependency for
bsc#1031392).
- Btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head
(dependency for bsc#1031392).
- btrfs: qgroup: Add quick exit for non-fs extents (dependency for
bsc#1031392).
- btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function
(dependency for bsc#1031392).
- btrfs: qgroup: Cleanup the remaining old reservation counters
(bsc#1031392).
- btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT
(bsc#1031392).
- btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).
- btrfs: qgroup: Fix wrong qgroup reservation update for relationship
modification (bsc#1031392).
- btrfs: qgroup: Introduce function to convert META_PREALLOC into
META_PERTRANS (bsc#1031392).
- btrfs: qgroup: Introduce helpers to update and access new qgroup rsv
(bsc#1031392).
- btrfs: qgroup: Make qgroup_reserve and its callers to use separate
reservation type (bsc#1031392).
- btrfs: qgroup: Skeleton to support separate qgroup reservation type
(bsc#1031392).
- btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).
- btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans
(bsc#1031392).
- btrfs: qgroup: Update trace events for metadata reservation
(bsc#1031392).
- btrfs: qgroup: Update trace events to use new separate rsv types
(bsc#1031392).
- btrfs: qgroup: Use independent and accurate per inode qgroup rsv
(bsc#1031392).
- btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta
reserved space (bsc#1031392).
- btrfs: qgroup: Use separate meta reservation type for delalloc
(bsc#1031392).
- btrfs: remove type argument from comp_tree_refs (dependency for
bsc#1031392).
- Btrfs: rework outstanding_extents (dependency for bsc#1031392).
- btrfs: switch args for comp_*_refs (dependency for bsc#1031392).
- btrfs: Take trans lock before access running trans in check_delayed_ref
(Follow up fixes for bsc#1031392).
- ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).
- cfg80211: fix a type issue in ieee80211_chandef_to_operating_class()
(bnc#1012382).
- cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE
(bnc#1012382).
- cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).
- cgroup, netclassid: add a preemption point to write_classid
(bnc#1098996).
- CIFS: check for STATUS_USER_SESSION_DELETED (bsc#1112902).
- cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).
- cifs: fix memory leak in SMB2_open() (bsc#1112894).
- cifs: Fix use after free of a mid_q_entry (bsc#1112903).
- cifs: read overflow in is_valid_oplock_break() (bnc#1012382).
- clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for
non-am43 SoCs (bnc#1012382).
- config.sh: set BUGZILLA_PRODUCT for SLE12-SP3
- crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).
- crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).
- Define dependencies of in-kernel KMPs statically This allows us to use
rpm's internal dependency generator (bsc#981083).
- dm cache: fix resize crash if user does not reload cache table
(bnc#1012382).
- dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).
- dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).
- Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware
instead.
- drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).
- drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).
- drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from
VBIOS (bnc#1012382).
- drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)
- Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)
- Drop multiversion(kernel) from the KMP template ()
- e1000: check on netif_running() before calling e1000_up() (bnc#1012382).
- e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).
- ebtables: arpreply: Add the standard target sanity check (bnc#1012382).
- EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr()
(bsc#1114648).
- Enable kernel-obs-{build,qa} also in the vanilla branches
- ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).
- fbdev: fix broken menu dependencies (bsc#1106929)
- fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).
- Fix file list to remove REPORTING-BUGS
- Fix html and pdf creation in Documetation/media/*
- floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl
(bnc#1012382).
- fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).
- fs/cifs: suppress a string overflow warning (bnc#1012382).
- gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).
- hexagon: modify ffs() and fls() to return int (bnc#1012382).
- HID: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).
- housekeeping: btrfs selftests: fold backport fix into backport patch
- housekeeping: move btrfs patches to sorted section. No code changes.
- hv: avoid crash in vmbus sysfs files (bnc#1108377).
- hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).
- hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).
- hwrng: core - document the quality field (git-fixes).
- i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).
- i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus
(bnc#1012382).
- i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP
(bnc#1012382).
- i2c: uniphier: issue STOP only for last message or I2C_M_STOP
(bnc#1012382).
- IB/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop
(bnc#1012382).
- Input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).
- Input: atakbd - fix Atari keymap (bnc#1012382).
- Input: elantech - enable middle button of touchpad on ThinkPad P72
(bnc#1012382).
- ip6_tunnel: be careful when accessing the inner header (bnc#1012382).
- ip_tunnel: be careful when accessing the inner header (bnc#1012382).
- ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).
- ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes
bsc#1109923).
- jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).
- KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function
(bnc#1012382).
- KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).
- lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).
- mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: fix a race between restart and CSA flows (bnc#1012382).
- mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys
(bnc#1012382).
- mac80211: Fix station bandwidth setting after channel switch
(bnc#1012382).
- mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).
- mac80211: mesh: fix HWMP sequence numbering to follow standard
(bnc#1012382).
- mac80211: shorten the IBSS debug messages (bnc#1012382).
- mach64: detect the dot clock divider correctly on sparc (bnc#1012382).
- md-cluster: clear another node's suspend_area after the copy is finished
(bnc#1012382).
- media: af9035: prevent buffer overflow on write (bnc#1012382).
- media: exynos4-is: Prevent NULL pointer dereference in
__isp_video_try_fmt() (bnc#1012382).
- media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).
- media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data
(bnc#1012382).
- media: omap_vout: Fix a possible null pointer dereference in
omap_vout_open() (bsc#1050431).
- media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power
(bnc#1012382).
- media: soc_camera: ov772x: correct setting of banding filter
(bnc#1012382).
- media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).
- media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).
- media: v4l: event: Prevent freeing event subscriptions while accessed
(bnc#1012382).
- media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).
- memory_hotplug: cond_resched in __remove_pages (bnc#1114178).
- mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).
- mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).
- mm: /proc/pid/pagemap: hide swap entries from unprivileged users
(Git-fixes bsc#1109907).
- mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).
- mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).
- module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).
- move changes without Git-commit out of sorted section
- net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx()
(bnc#1012382).
- net: hns: fix length and page_offset overflow when
CONFIG_ARM64_64K_PAGES (bnc#1012382).
- net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).
- net/ipv6: Display all addresses in output of /proc/net/if_inet6
(bnc#1012382).
- netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).
- net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).
- net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).
- net: mvpp2: Extract the correct ethtype from the skb for tx csum offload
(bnc#1012382).
- net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).
- net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).
- NFS: add nostatflush mount option (bsc#1065726).
- NFS: Avoid quadratic search when freeing delegations (bsc#1084760).
- nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).
- ocfs2: fix locking for res->tracking and dlm->tracking_list
(bnc#1012382).
- of: unittest: Disable interrupt node tests for old world MAC systems
(bnc#1012382).
- ovl: Copy inode attributes after setting xattr (bsc#1107299).
- Pass x86 as architecture on x86_64 and i386 (bsc#1093118).
- PCI: hv: Use effective affinity mask (bsc#1109772).
- PCI: Reprogram bridge prefetch registers on resume (bnc#1012382).
- perf probe powerpc: Ignore SyS symbols irrespective of endianness
(bnc#1012382).
- perf script python: Fix export-to-postgresql.py occasional failure
(bnc#1012382).
- PM / core: Clear the direct_complete flag on errors (bnc#1012382).
- powerpc/kdump: Handle crashkernel memory reservation failure
(bnc#1012382).
- powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).
- powerpc/perf/hv-24x7: Fix passing of catalog version number
(bsc#1053043).
- powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug
(bsc#1079524, git-fixes).
- powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).
- powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).
- powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).
- powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).
- powerpc/rtas: Fix a potential race between CPU-Offline & Migration
(bsc#1111870).
- power: vexpress: fix corruption in notifier registration (bnc#1012382).
- proc: restrict kernel stack dumps to root (bnc#1012382).
- qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).
- r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED
(bnc#1012382).
- RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0
(bnc#1012382).
- rculist: add list_for_each_entry_from_rcu() (bsc#1084760).
- rculist: Improve documentation for list_for_each_entry_from_rcu()
(bsc#1084760).
- RDMA/ucma: check fd type in ucma_migrate_id() (bnc#1012382).
- README: Clean-up trailing whitespace
- reiserfs: add check to detect corrupted directory entry (bsc#1109818).
- reiserfs: do not panic on bad directory entries (bsc#1109818).
- resource: Include resource end in walk_*() interfaces (bsc#1114648).
- Revert "btrfs: qgroups: Retry after commit on getting EDQUOT"
(bsc#1031392).
- Revert "drm: Do not pass negative delta to ktime_sub_ns()" (bsc#1106929)
- Revert "drm/i915: Initialize HWS page address after GPU reset"
(bsc#1106929)
- Revert "KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch" (kabi).
- Revert "media: v4l: event: Prevent freeing event subscriptions while
accessed" (kabi).
- Revert "proc: restrict kernel stack dumps to root" (kabi).
- Revert "rpm/constraints.in: Lower default disk space requirement from
25G to 24G" This reverts commit
406abda1467c038842febffe264faae1fa2e3c1d. ok, did not wait long enough
to see the failure.
- Revert "Skip intel_crt_init for Dell XPS 8700" (bsc#1106929)
- Revert "tcp: add tcp_ooo_try_coalesce() helper" (kabi).
- Revert "tcp: call tcp_drop() from tcp_data_queue_ofo()" (kabi).
- Revert "tcp: fix a stale ooo_last_skb after a replace" (kabi).
- Revert "tcp: free batches of packets in tcp_prune_ofo_queue()" (kabi).
- Revert "tcp: use an RB tree for ooo receive queue" (kabi).
- Revert "usb: cdc-wdm: Fix a sleep-in-atomic-context bug in
service_outstanding_interrupt()" (bnc#1012382).
- Revert "x86/fpu: Finish excising 'eagerfpu'" (kabi).
- Revert "x86/fpu: Remove struct fpu::counter" (kabi).
- Revert "x86/fpu: Remove use_eager_fpu()" (kabi).
- rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication()
(bnc#1012382).
- rpm/apply-patches: Fix failure if there are no vanilla patches The grep
command returns 1 if there are no patches and we are using pipefail.
- rpm/constraints.in: build ARM on at least 2 cpus
- rpm/constraints.in: Lower default disk space requirement from 25G to 24G
25G is rejected by the build service on ARM.
- rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096
(bnc#1012382).
- s390/chsc: Add exception handler for CHSC instruction (git-fixes).
- s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).
- s390/kdump: Fix elfcorehdr size calculation (git-fixes).
- s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).
- s390/mm: correct allocate_pgste proc_handler callback (git-fixes).
- s390/qeth: do not dump past end of unknown HW header (bnc#1012382).
- s390/qeth: handle failure on workqueue creation (git-fixes).
- s390: revert ELF_ET_DYN_BASE base changes (git-fixes).
- s390/stacktrace: fix address ranges for asynchronous and panic stack
(git-fixes).
- scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).
- scsi: ibmvscsi: Improve strings handling (bnc#1012382).
- scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).
- scsi: target/iscsi: Make iscsit_ta_authentication() respect the output
buffer size (bnc#1012382).
- selftests/efivarfs: add required kernel configs (bnc#1012382).
- serial: cpm_uart: return immediately from console poll (bnc#1012382).
- serial: imx: restore handshaking irq for imx1 (bnc#1012382).
- signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).
- slub: make ->cpu_partial unsigned int (bnc#1012382).
- smb2: fix missing files in root share directory listing (bnc#1012382).
- smb3: fill in statfs fsid and correct namelen (bsc#1112905).
- sound: enable interrupt after dma buffer initialization (bnc#1012382).
- spi: rspi: Fix interrupted DMA transfers (bnc#1012382).
- spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: sh-msiof: Fix handling of write value for SISTR register
(bnc#1012382).
- spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).
- spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).
- staging: android: ashmem: Fix mmap size validation (bnc#1012382).
- staging: rts5208: fix missing error check on call to rtsx_write_register
(bnc#1012382).
- stmmac: fix valid numbers of unicast filter entries (bnc#1012382).
- target: log Data-Out timeouts as errors (bsc#1095805).
- target: log NOP ping timeouts as errors (bsc#1095805).
- target: split out helper for cxn timeout error stashing (bsc#1095805).
- target: stash sess_err_stats on Data-Out timeout (bsc#1095805).
- target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).
- tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).
- tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).
- tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).
- tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).
- tcp: increment sk_drops for dropped rx packets (bnc#1012382).
- tcp: use an RB tree for ooo receive queue (bnc#1012382).
- team: Forbid enslaving team device to itself (bnc#1012382).
- thermal: of-thermal: disable passive polling when thermal zone is
disabled (bnc#1012382).
- tools/vm/page-types.c: fix "defined but not used" warning (bnc#1012382).
- tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).
- tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).
- tsl2550: fix lux1_input error in low light (bnc#1012382).
- ubifs: Check for name being NULL while mounting (bnc#1012382).
- ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).
- USB: fix error handling in usb_driver_claim_interface() (bnc#1012382).
- usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i]
(bnc#1012382).
- usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).
- USB: handle NULL config in usb_find_alt_setting() (bnc#1012382).
- USB: remove LPM management from usb_driver_claim_interface()
(bnc#1012382).
- USB: serial: kobil_sct: fix modem-status error handling (bnc#1012382).
- USB: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).
- USB: usbdevfs: restore warning for nonsensical flags (bnc#1012382).
- USB: usbdevfs: sanitize flags more (bnc#1012382).
- usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).
- USB: yurex: Check for truncation in yurex_read() (bnc#1012382).
- Use make --output-sync feature when available (bsc#1012422). The mesages
in make output can interleave making it impossible to extract warnings
reliably. Since version 4 GNU Make supports --output-sync flag that
prints output of each sub-command atomically preventing this issue.
Detect the flag and use it if available. SLE11 has make 3.81 so it is
required to include make 4 in the kernel OBS projects to take advantege
of this.
- Use upstream version of pci-hyperv change 35a88a18d7
- uwb: hwa-rc: fix memory leak at probe (bnc#1012382).
- vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).
- wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()
(bnc#1012382).
- wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout
(git-fixes).
- x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).
- x86/entry/64: Add two more instruction suffixes (bnc#1012382).
- x86/entry/64: Clear registers for exceptions/interrupts, to reduce
speculation attack surface (bsc#1105931).
- x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).
- x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).
- x86/fpu: Remove second definition of fpu in __fpu__restore_sig()
(bsc#1110006).
- x86/fpu: Remove struct fpu::counter (bnc#1012382).
- x86/fpu: Remove use_eager_fpu() (bnc#1012382).
- x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12
(bsc#1109772).
- x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).
- x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).
- x86/paravirt: Fix some warning messages (bnc#1065600).
- x86/percpu: Fix this_cpu_read() (bsc#1110006).
- x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158,
bsc#1101555).
- x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).
- x86/speculation: Apply IBPB more strictly to avoid cross-process data
leak (bsc#1106913).
- x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation
(bsc#1106913).
- x86/speculation: Propagate information about RSB filling mitigation to
sysfs (bsc#1106913).
- x86/time: Correct the attribute on jiffies' definition (bsc#1110006).
- x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).
- xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594
bsc#1042422).
- xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage
(bnc#1012382).
- xen/manage: do not complain about an empty value in control/sysrq node
(bnc#1012382).
- xhci: Add missing CAS workaround for Intel Sunrise Point xHCI
(bnc#1012382).
- xhci: Do not print a warning when setting link state for disabled ports
(bnc#1012382).
- rpm/kernel-binary.spec.in: Add missing export BRP_SIGN_FILES
(bsc#1115587) The export line was accidentally dropped at merging
scripts branch, which resulted in the invalid module signature.
{"id": "OPENSUSE-SU-2018:3817-1", "type": "suse", "bulletinFamily": "unix", "title": "Security update for the Linux Kernel (important)", "description": "The openSUSE Leap 42.3 kernel was updated to 4.4.162 to receive various\n security and bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping\n pagetable locks. If a syscall such as ftruncate() removes entries from\n the pagetables of a task that is in the middle of mremap(), a stale TLB\n entry can remain for a short time that permits access to a physical page\n after it has been released back to the page allocator and reused.\n (bnc#1113769).\n - CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in\n drivers/cdrom/cdrom.c could be used by local attackers to read kernel\n memory because a cast from unsigned long to int interferes with bounds\n checking. This is similar to CVE-2018-10940 and CVE-2018-16658\n (bnc#1113751).\n - CVE-2018-18690: A local attacker able to set attributes on an xfs\n filesystem could make this filesystem non-operational until the next\n mount by triggering an unchecked error condition during an xfs attribute\n change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c\n mishandled ATTR_REPLACE operations with conversion of an attr from short\n to long form (bnc#1105025).\n - CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are\n able to access pseudo terminals) to hang/block further usage of any\n pseudo terminal devices due to an EXTPROC versus ICANON confusion in\n TIOCINQ (bnc#1094825).\n - CVE-2018-9516: A lack of certain checks in the hid_debug_events_read()\n function in the drivers/hid/hid-debug.c file might have resulted in\n receiving userspace buffer overflow and an out-of-bounds write or to the\n infinite loop. (bnc#1108498).\n\n The following non-security bugs were fixed:\n\n - 6lowpan: iphc: reset mac_header after decompress to fix panic\n (bnc#1012382).\n - Add azure kernel description.\n - Add bug reference to\n patches.suse/x86-entry-64-use-a-per-cpu-trampoline-stack-fix1.patch\n - Add graphviz to buildreq for image conversion\n - Add reference to bsc#1104124 to\n patches.fixes/fs-aio-fix-the-increment-of-aio-nr-and-counting-agai.patch\n - ALSA: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).\n - ALSA: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760\n (bnc#1012382).\n - apparmor: remove no-op permission check in policy_unpack (git-fixes).\n - ARC: build: Get rid of toolchain check (bnc#1012382).\n - ARC: clone syscall to setp r25 as thread pointer (bnc#1012382).\n - arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).\n - arch-symbols: use bash as interpreter since the script uses bashism.\n - arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).\n - arm64: jump_label.h: use asm_volatile_goto macro instead of "asm goto"\n (bnc#1012382).\n - arm64: KVM: Sanitize PSTATE.M when being set from userspace\n (bnc#1012382).\n - arm64: KVM: Tighten guest core register access from userspace\n (bnc#1012382).\n - ARM: dts: at91: add new compatibility string for macb on sama5d3\n (bnc#1012382).\n - ARM: dts: dra7: fix DCAN node addresses (bnc#1012382).\n - ARM: mvebu: declare asm symbols as character arrays in pmsu.c\n (bnc#1012382).\n - ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs\n (bnc#1012382).\n - ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).\n - ASoC: wm8804: Add ACPI support (bnc#1012382).\n - ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).\n - ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).\n - ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).\n - Bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).\n - bnxt_en: Fix TX timeout during netpoll (bnc#1012382).\n - bonding: avoid possible dead-lock (bnc#1012382).\n - bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).\n - bpf: fix map not being uncharged during map creation failure\n (bsc#1012382).\n - bpf, s390: fix potential memleak when later bpf_jit_prog fails\n (git-fixes).\n - bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).\n - bsc#1106913: Replace with upstream variants Delete\n patches.suse/11-x86-mm-only-set-ibpb-when-the-new-thread-cannot-ptrace-curr\n ent-thread.patch.\n - bs-upload-kernel: do not set %opensuse_bs Since SLE15 it is not set in\n the distribution project so do not set it for kernel projects either.\n - btrfs: add a comp_refs() helper (dependency for bsc#1031392).\n - btrfs: add missing initialization in btrfs_check_shared (Git-fixes\n bsc#1112262).\n - btrfs: add tracepoints for outstanding extents mods (dependency for\n bsc#1031392).\n - btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for\n bsc#1031392).\n - btrfs: cleanup extent locking sequence (dependency for bsc#1031392).\n - btrfs: defrag: use btrfs_mod_outstanding_extents in\n cluster_pages_for_defrag (Follow up fixes for bsc#1031392).\n - btrfs: delayed-inode: Remove wrong qgroup meta reservation calls\n (bsc#1031392).\n - btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item\n (bsc#1031392).\n - btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency\n for bsc#1113667).\n - btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n - btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).\n - Btrfs: fix invalid attempt to free reserved space on failure to cow\n range (dependency for bsc#1031392).\n - btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes\n bsc#1109919).\n - btrfs: Fix race condition between delayed refs and blockgroup removal\n (Git-fixes bsc#1112263).\n - btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).\n - Btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist\n (dependency for bsc#1031392).\n - btrfs: make the delalloc block rsv per inode (dependency for\n bsc#1031392).\n - Btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head\n (dependency for bsc#1031392).\n - btrfs: qgroup: Add quick exit for non-fs extents (dependency for\n bsc#1031392).\n - btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function\n (dependency for bsc#1031392).\n - btrfs: qgroup: Cleanup the remaining old reservation counters\n (bsc#1031392).\n - btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT\n (bsc#1031392).\n - btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).\n - btrfs: qgroup: Fix wrong qgroup reservation update for relationship\n modification (bsc#1031392).\n - btrfs: qgroup: Introduce function to convert META_PREALLOC into\n META_PERTRANS (bsc#1031392).\n - btrfs: qgroup: Introduce helpers to update and access new qgroup rsv\n (bsc#1031392).\n - btrfs: qgroup: Make qgroup_reserve and its callers to use separate\n reservation type (bsc#1031392).\n - btrfs: qgroup: Skeleton to support separate qgroup reservation type\n (bsc#1031392).\n - btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).\n - btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans\n (bsc#1031392).\n - btrfs: qgroup: Update trace events for metadata reservation\n (bsc#1031392).\n - btrfs: qgroup: Update trace events to use new separate rsv types\n (bsc#1031392).\n - btrfs: qgroup: Use independent and accurate per inode qgroup rsv\n (bsc#1031392).\n - btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta\n reserved space (bsc#1031392).\n - btrfs: qgroup: Use separate meta reservation type for delalloc\n (bsc#1031392).\n - btrfs: remove type argument from comp_tree_refs (dependency for\n bsc#1031392).\n - Btrfs: rework outstanding_extents (dependency for bsc#1031392).\n - btrfs: switch args for comp_*_refs (dependency for bsc#1031392).\n - btrfs: Take trans lock before access running trans in check_delayed_ref\n (Follow up fixes for bsc#1031392).\n - ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).\n - cfg80211: fix a type issue in ieee80211_chandef_to_operating_class()\n (bnc#1012382).\n - cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE\n (bnc#1012382).\n - cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).\n - cgroup, netclassid: add a preemption point to write_classid\n (bnc#1098996).\n - CIFS: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n - cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).\n - cifs: fix memory leak in SMB2_open() (bsc#1112894).\n - cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n - cifs: read overflow in is_valid_oplock_break() (bnc#1012382).\n - clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for\n non-am43 SoCs (bnc#1012382).\n - config.sh: set BUGZILLA_PRODUCT for SLE12-SP3\n - crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).\n - crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).\n - Define dependencies of in-kernel KMPs statically This allows us to use\n rpm's internal dependency generator (bsc#981083).\n - dm cache: fix resize crash if user does not reload cache table\n (bnc#1012382).\n - dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).\n - dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).\n - Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware\n instead.\n - drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).\n - drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).\n - drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from\n VBIOS (bnc#1012382).\n - drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)\n - Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)\n - Drop multiversion(kernel) from the KMP template ()\n - e1000: check on netif_running() before calling e1000_up() (bnc#1012382).\n - e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).\n - ebtables: arpreply: Add the standard target sanity check (bnc#1012382).\n - EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr()\n (bsc#1114648).\n - Enable kernel-obs-{build,qa} also in the vanilla branches\n - ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).\n - fbdev: fix broken menu dependencies (bsc#1106929)\n - fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).\n - Fix file list to remove REPORTING-BUGS\n - Fix html and pdf creation in Documetation/media/*\n - floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl\n (bnc#1012382).\n - fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).\n - fs/cifs: suppress a string overflow warning (bnc#1012382).\n - gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).\n - hexagon: modify ffs() and fls() to return int (bnc#1012382).\n - HID: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).\n - housekeeping: btrfs selftests: fold backport fix into backport patch\n - housekeeping: move btrfs patches to sorted section. No code changes.\n - hv: avoid crash in vmbus sysfs files (bnc#1108377).\n - hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).\n - hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).\n - hwrng: core - document the quality field (git-fixes).\n - i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).\n - i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus\n (bnc#1012382).\n - i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP\n (bnc#1012382).\n - i2c: uniphier: issue STOP only for last message or I2C_M_STOP\n (bnc#1012382).\n - IB/srp: Avoid that sg_reset -d ${srp_device} triggers an infinite loop\n (bnc#1012382).\n - Input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).\n - Input: atakbd - fix Atari keymap (bnc#1012382).\n - Input: elantech - enable middle button of touchpad on ThinkPad P72\n (bnc#1012382).\n - ip6_tunnel: be careful when accessing the inner header (bnc#1012382).\n - ip_tunnel: be careful when accessing the inner header (bnc#1012382).\n - ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).\n - ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes\n bsc#1109923).\n - jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).\n - KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function\n (bnc#1012382).\n - KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).\n - lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).\n - mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n - mac80211: fix a race between restart and CSA flows (bnc#1012382).\n - mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys\n (bnc#1012382).\n - mac80211: Fix station bandwidth setting after channel switch\n (bnc#1012382).\n - mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n - mac80211: mesh: fix HWMP sequence numbering to follow standard\n (bnc#1012382).\n - mac80211: shorten the IBSS debug messages (bnc#1012382).\n - mach64: detect the dot clock divider correctly on sparc (bnc#1012382).\n - md-cluster: clear another node's suspend_area after the copy is finished\n (bnc#1012382).\n - media: af9035: prevent buffer overflow on write (bnc#1012382).\n - media: exynos4-is: Prevent NULL pointer dereference in\n __isp_video_try_fmt() (bnc#1012382).\n - media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).\n - media: omap3isp: zero-initialize the isp cam_xclk{a,b} initial data\n (bnc#1012382).\n - media: omap_vout: Fix a possible null pointer dereference in\n omap_vout_open() (bsc#1050431).\n - media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power\n (bnc#1012382).\n - media: soc_camera: ov772x: correct setting of banding filter\n (bnc#1012382).\n - media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).\n - media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).\n - media: v4l: event: Prevent freeing event subscriptions while accessed\n (bnc#1012382).\n - media: videobuf-dma-sg: Fix dma_{sync,unmap}_sg() calls (bsc#1050431).\n - memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n - mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).\n - mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).\n - mm: /proc/pid/pagemap: hide swap entries from unprivileged users\n (Git-fixes bsc#1109907).\n - mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).\n - mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).\n - mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).\n - module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).\n - move changes without Git-commit out of sorted section\n - net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx()\n (bnc#1012382).\n - net: hns: fix length and page_offset overflow when\n CONFIG_ARM64_64K_PAGES (bnc#1012382).\n - net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).\n - net/ipv6: Display all addresses in output of /proc/net/if_inet6\n (bnc#1012382).\n - netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).\n - net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).\n - net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).\n - net: mvpp2: Extract the correct ethtype from the skb for tx csum offload\n (bnc#1012382).\n - net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).\n - net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).\n - NFS: add nostatflush mount option (bsc#1065726).\n - NFS: Avoid quadratic search when freeing delegations (bsc#1084760).\n - nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).\n - ocfs2: fix locking for res->tracking and dlm->tracking_list\n (bnc#1012382).\n - of: unittest: Disable interrupt node tests for old world MAC systems\n (bnc#1012382).\n - ovl: Copy inode attributes after setting xattr (bsc#1107299).\n - Pass x86 as architecture on x86_64 and i386 (bsc#1093118).\n - PCI: hv: Use effective affinity mask (bsc#1109772).\n - PCI: Reprogram bridge prefetch registers on resume (bnc#1012382).\n - perf probe powerpc: Ignore SyS symbols irrespective of endianness\n (bnc#1012382).\n - perf script python: Fix export-to-postgresql.py occasional failure\n (bnc#1012382).\n - PM / core: Clear the direct_complete flag on errors (bnc#1012382).\n - powerpc/kdump: Handle crashkernel memory reservation failure\n (bnc#1012382).\n - powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).\n - powerpc/perf/hv-24x7: Fix passing of catalog version number\n (bsc#1053043).\n - powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug\n (bsc#1079524, git-fixes).\n - powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n - powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).\n - powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).\n - powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).\n - powerpc/rtas: Fix a potential race between CPU-Offline & Migration\n (bsc#1111870).\n - power: vexpress: fix corruption in notifier registration (bnc#1012382).\n - proc: restrict kernel stack dumps to root (bnc#1012382).\n - qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).\n - r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED\n (bnc#1012382).\n - RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0\n (bnc#1012382).\n - rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n - rculist: Improve documentation for list_for_each_entry_from_rcu()\n (bsc#1084760).\n - RDMA/ucma: check fd type in ucma_migrate_id() (bnc#1012382).\n - README: Clean-up trailing whitespace\n - reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n - reiserfs: do not panic on bad directory entries (bsc#1109818).\n - resource: Include resource end in walk_*() interfaces (bsc#1114648).\n - Revert "btrfs: qgroups: Retry after commit on getting EDQUOT"\n (bsc#1031392).\n - Revert "drm: Do not pass negative delta to ktime_sub_ns()" (bsc#1106929)\n - Revert "drm/i915: Initialize HWS page address after GPU reset"\n (bsc#1106929)\n - Revert "KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch" (kabi).\n - Revert "media: v4l: event: Prevent freeing event subscriptions while\n accessed" (kabi).\n - Revert "proc: restrict kernel stack dumps to root" (kabi).\n - Revert "rpm/constraints.in: Lower default disk space requirement from\n 25G to 24G" This reverts commit\n 406abda1467c038842febffe264faae1fa2e3c1d. ok, did not wait long enough\n to see the failure.\n - Revert "Skip intel_crt_init for Dell XPS 8700" (bsc#1106929)\n - Revert "tcp: add tcp_ooo_try_coalesce() helper" (kabi).\n - Revert "tcp: call tcp_drop() from tcp_data_queue_ofo()" (kabi).\n - Revert "tcp: fix a stale ooo_last_skb after a replace" (kabi).\n - Revert "tcp: free batches of packets in tcp_prune_ofo_queue()" (kabi).\n - Revert "tcp: use an RB tree for ooo receive queue" (kabi).\n - Revert "usb: cdc-wdm: Fix a sleep-in-atomic-context bug in\n service_outstanding_interrupt()" (bnc#1012382).\n - Revert "x86/fpu: Finish excising 'eagerfpu'" (kabi).\n - Revert "x86/fpu: Remove struct fpu::counter" (kabi).\n - Revert "x86/fpu: Remove use_eager_fpu()" (kabi).\n - rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication()\n (bnc#1012382).\n - rpm/apply-patches: Fix failure if there are no vanilla patches The grep\n command returns 1 if there are no patches and we are using pipefail.\n - rpm/constraints.in: build ARM on at least 2 cpus\n - rpm/constraints.in: Lower default disk space requirement from 25G to 24G\n 25G is rejected by the build service on ARM.\n - rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096\n (bnc#1012382).\n - s390/chsc: Add exception handler for CHSC instruction (git-fixes).\n - s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).\n - s390/kdump: Fix elfcorehdr size calculation (git-fixes).\n - s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).\n - s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n - s390/qeth: do not dump past end of unknown HW header (bnc#1012382).\n - s390/qeth: handle failure on workqueue creation (git-fixes).\n - s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n - s390/stacktrace: fix address ranges for asynchronous and panic stack\n (git-fixes).\n - scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).\n - scsi: ibmvscsi: Improve strings handling (bnc#1012382).\n - scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).\n - scsi: target/iscsi: Make iscsit_ta_authentication() respect the output\n buffer size (bnc#1012382).\n - selftests/efivarfs: add required kernel configs (bnc#1012382).\n - serial: cpm_uart: return immediately from console poll (bnc#1012382).\n - serial: imx: restore handshaking irq for imx1 (bnc#1012382).\n - signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n - slub: make ->cpu_partial unsigned int (bnc#1012382).\n - smb2: fix missing files in root share directory listing (bnc#1012382).\n - smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n - sound: enable interrupt after dma buffer initialization (bnc#1012382).\n - spi: rspi: Fix interrupted DMA transfers (bnc#1012382).\n - spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).\n - spi: sh-msiof: Fix handling of write value for SISTR register\n (bnc#1012382).\n - spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).\n - spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).\n - staging: android: ashmem: Fix mmap size validation (bnc#1012382).\n - staging: rts5208: fix missing error check on call to rtsx_write_register\n (bnc#1012382).\n - stmmac: fix valid numbers of unicast filter entries (bnc#1012382).\n - target: log Data-Out timeouts as errors (bsc#1095805).\n - target: log NOP ping timeouts as errors (bsc#1095805).\n - target: split out helper for cxn timeout error stashing (bsc#1095805).\n - target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n - target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n - tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).\n - tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).\n - tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).\n - tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).\n - tcp: increment sk_drops for dropped rx packets (bnc#1012382).\n - tcp: use an RB tree for ooo receive queue (bnc#1012382).\n - team: Forbid enslaving team device to itself (bnc#1012382).\n - thermal: of-thermal: disable passive polling when thermal zone is\n disabled (bnc#1012382).\n - tools/vm/page-types.c: fix "defined but not used" warning (bnc#1012382).\n - tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).\n - tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).\n - tsl2550: fix lux1_input error in low light (bnc#1012382).\n - ubifs: Check for name being NULL while mounting (bnc#1012382).\n - ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).\n - USB: fix error handling in usb_driver_claim_interface() (bnc#1012382).\n - usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i]\n (bnc#1012382).\n - usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).\n - USB: handle NULL config in usb_find_alt_setting() (bnc#1012382).\n - USB: remove LPM management from usb_driver_claim_interface()\n (bnc#1012382).\n - USB: serial: kobil_sct: fix modem-status error handling (bnc#1012382).\n - USB: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).\n - USB: usbdevfs: restore warning for nonsensical flags (bnc#1012382).\n - USB: usbdevfs: sanitize flags more (bnc#1012382).\n - usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).\n - USB: yurex: Check for truncation in yurex_read() (bnc#1012382).\n - Use make --output-sync feature when available (bsc#1012422). The mesages\n in make output can interleave making it impossible to extract warnings\n reliably. Since version 4 GNU Make supports --output-sync flag that\n prints output of each sub-command atomically preventing this issue.\n Detect the flag and use it if available. SLE11 has make 3.81 so it is\n required to include make 4 in the kernel OBS projects to take advantege\n of this.\n - Use upstream version of pci-hyperv change 35a88a18d7\n - uwb: hwa-rc: fix memory leak at probe (bnc#1012382).\n - vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).\n - wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout()\n (bnc#1012382).\n - wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout\n (git-fixes).\n - x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).\n - x86/entry/64: Add two more instruction suffixes (bnc#1012382).\n - x86/entry/64: Clear registers for exceptions/interrupts, to reduce\n speculation attack surface (bsc#1105931).\n - x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).\n - x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).\n - x86/fpu: Remove second definition of fpu in __fpu__restore_sig()\n (bsc#1110006).\n - x86/fpu: Remove struct fpu::counter (bnc#1012382).\n - x86/fpu: Remove use_eager_fpu() (bnc#1012382).\n - x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12\n (bsc#1109772).\n - x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).\n - x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).\n - x86/paravirt: Fix some warning messages (bnc#1065600).\n - x86/percpu: Fix this_cpu_read() (bsc#1110006).\n - x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158,\n bsc#1101555).\n - x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).\n - x86/speculation: Apply IBPB more strictly to avoid cross-process data\n leak (bsc#1106913).\n - x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation\n (bsc#1106913).\n - x86/speculation: Propagate information about RSB filling mitigation to\n sysfs (bsc#1106913).\n - x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n - x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).\n - xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594\n bsc#1042422).\n - xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage\n (bnc#1012382).\n - xen/manage: do not complain about an empty value in control/sysrq node\n (bnc#1012382).\n - xhci: Add missing CAS workaround for Intel Sunrise Point xHCI\n (bnc#1012382).\n - xhci: Do not print a warning when setting link state for disabled ports\n (bnc#1012382).\n - rpm/kernel-binary.spec.in: Add missing export BRP_SIGN_FILES\n (bsc#1115587) The export line was accidentally dropped at merging\n scripts branch, which resulted in the invalid module signature.\n\n", "published": "2018-11-20T21:08:45", "modified": "2018-11-20T21:08:45", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}, "href": "http://lists.opensuse.org/opensuse-security-announce/2018-11/msg00028.html", "reporter": "Suse", "references": ["https://bugzilla.suse.com/1012422", "https://bugzilla.suse.com/1011920", "https://bugzilla.suse.com/1112263", "https://bugzilla.suse.com/1113769", "https://bugzilla.suse.com/1112007", "https://bugzilla.suse.com/1078788", "https://bugzilla.suse.com/1112902", "https://bugzilla.suse.com/1098050", "https://bugzilla.suse.com/1093118", "https://bugzilla.suse.com/1057199", "https://bugzilla.suse.com/1054239", "https://bugzilla.suse.com/1110006", "https://bugzilla.suse.com/1079524", "https://bugzilla.suse.com/1107870", "https://bugzilla.suse.com/1098996", "https://bugzilla.suse.com/1053043", "https://bugzilla.suse.com/1107060", "https://bugzilla.suse.com/1109784", "https://bugzilla.suse.com/1106913", "https://bugzilla.suse.com/1114648", "https://bugzilla.suse.com/1108377", "https://bugzilla.suse.com/1020645", "https://bugzilla.suse.com/1101555", "https://bugzilla.suse.com/1050431", "https://bugzilla.suse.com/1109919", "https://bugzilla.suse.com/1012382", "https://bugzilla.suse.com/1111870", "https://bugzilla.suse.com/1109907", "https://bugzilla.suse.com/1112903", "https://bugzilla.suse.com/1109772", "https://bugzilla.suse.com/1065726", "https://bugzilla.suse.com/1073579", "https://bugzilla.suse.com/1109923", "https://bugzilla.suse.com/1065600", "https://bugzilla.suse.com/1106110", "https://bugzilla.suse.com/1042422", "https://bugzilla.suse.com/1112262", "https://bugzilla.suse.com/1113667", "https://bugzilla.suse.com/1083527", "https://bugzilla.suse.com/1035053", "https://bugzilla.suse.com/1048129", "https://bugzilla.suse.com/1062303", "https://bugzilla.suse.com/1111516", "https://bugzilla.suse.com/981083", "https://bugzilla.suse.com/1105025", "https://bugzilla.suse.com/1112905", "https://bugzilla.suse.com/1106929", "https://bugzilla.suse.com/1094825", "https://bugzilla.suse.com/1109818", "https://bugzilla.suse.com/1083215", "https://bugzilla.suse.com/1114229", "https://bugzilla.suse.com/1091158", "https://bugzilla.suse.com/1105931", "https://bugzilla.suse.com/1104124", "https://bugzilla.suse.com/1115587", "https://bugzilla.suse.com/1031392", "https://bugzilla.suse.com/1113751", "https://bugzilla.suse.com/1106359", "https://bugzilla.suse.com/1112894", "https://bugzilla.suse.com/1106594", "https://bugzilla.suse.com/1095805", "https://bugzilla.suse.com/1043591", "https://bugzilla.suse.com/1114178", "https://bugzilla.suse.com/1108498", "https://bugzilla.suse.com/1107535", "https://bugzilla.suse.com/1076393", "https://bugzilla.suse.com/1109158", "https://bugzilla.suse.com/1107299", "https://bugzilla.suse.com/997172", "https://bugzilla.suse.com/1084760", "https://bugzilla.suse.com/1067906"], "cvelist": ["CVE-2018-10940", "CVE-2018-18690", "CVE-2018-18710", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-16658", "CVE-2018-9516"], "immutableFields": [], "lastseen": "2018-11-21T01:33:01", "viewCount": 252, "enchantments": {"score": {"value": 6.8, "vector": "NONE"}, "dependencies": {"references": [{"type": "amazon", "idList": ["ALAS-2018-1086", "ALAS-2018-1133", "ALAS-2019-1278", "ALAS2-2018-1086", "ALAS2-2018-1133", "ALAS2-2019-1278"]}, {"type": "androidsecurity", "idList": ["ANDROID:2019-01-01"]}, {"type": "centos", "idList": ["CESA-2018:3083", "CESA-2019:2029"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:0C99BDFDCDE2F48CF8EC42CB26558A0B", "CFOUNDRY:131A4556633D91C9BF0AE72696FADB89", "CFOUNDRY:292CE3FF25BE7F67EFA36C82DF2DFC90", "CFOUNDRY:61ADF14D6FEC14FA5E06A7684B091D19", "CFOUNDRY:ACBE18A36EB39832526C9AA3F7A3E9CE", "CFOUNDRY:B4B97B81301258FB8DE2E5FB29E0A418"]}, {"type": "cve", "idList": ["CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-18690", "CVE-2018-18710", "CVE-2018-9516"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1392-1:883BE", "DEBIAN:DLA-1422-1:EBC6F", "DEBIAN:DLA-1422-2:DC70E", "DEBIAN:DLA-1423-1:B239D", "DEBIAN:DLA-1531-1:834CC", "DEBIAN:DLA-1715-1:4A3F9", "DEBIAN:DLA-1731-1:D19BD", "DEBIAN:DLA-1731-2:E6E1E", "DEBIAN:DSA-4308-1:A5A75", "DEBIAN:DSA-4308-1:D561A"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-10940", "DEBIANCVE:CVE-2018-16658", "DEBIANCVE:CVE-2018-18281", "DEBIANCVE:CVE-2018-18386", "DEBIANCVE:CVE-2018-18690", "DEBIANCVE:CVE-2018-18710", "DEBIANCVE:CVE-2018-9516"]}, {"type": "f5", "idList": ["F5:K11165942", "F5:K28280935", "F5:K40523020"]}, {"type": "fedora", "idList": ["FEDORA:00FDB6087AA0", "FEDORA:122AE604D3F9", "FEDORA:1CAC0608E6F2", "FEDORA:1EEE86087AA1", "FEDORA:1EFAB60ACFB0", "FEDORA:20DCB60779B2", "FEDORA:22D77604972B", "FEDORA:250CB6087A80", "FEDORA:28CF260C68EC", "FEDORA:296826040AED", "FEDORA:2CDD76006271", "FEDORA:3266960F0E44", "FEDORA:3C2FF6014B8C", "FEDORA:3C394606D98F", "FEDORA:41B546014626", "FEDORA:4A22960A514A", "FEDORA:4CF35608BFEA", "FEDORA:4D5AD601FDAC", "FEDORA:5B68260A5858", "FEDORA:690DE6022BA8", "FEDORA:6B39A60C690C", "FEDORA:6B66A6047312", "FEDORA:6B6B360567FC", "FEDORA:79EAC605FC25", "FEDORA:7E7A360ACFB3", "FEDORA:85FBF6076011", "FEDORA:89C9C6051B3A", "FEDORA:8FD3E60491BA", "FEDORA:95A686085F81", "FEDORA:9CD7A622281F", "FEDORA:9DF7060ACFA9", "FEDORA:9E3D9606D195", "FEDORA:B395E6087A9D", "FEDORA:B87B460876BA", "FEDORA:BBFE360460D0", "FEDORA:BD35260BC96F", "FEDORA:C49D061F375F", "FEDORA:C64AE6007F37", "FEDORA:C68476222B32", "FEDORA:DBB1B659CBE0", "FEDORA:E178F6217CD7", "FEDORA:E37FD60924F1", "FEDORA:E819660C68EA", "FEDORA:E88866014636", "FEDORA:E93AE6077DCD", "FEDORA:F417F60477C5"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:60F2E118E85CB34AAEEAED9DE88D51AF"]}, {"type": "ibm", "idList": ["4BB2759DF5CBB6BF54A7D60BF1046942C755D661255DAAC4EF3C0614D1A3AF9A", "6F75059EBDF719D84C8DC0CA4BAADF9428544BDAFCEEAE62F4225A55CA1E8AF0", "718AA276AD1F96507AD1B17F8A42616C949B63DCC5D86816603BF65C698FACB0"]}, {"type": "lenovo", "idList": ["LENOVO:PS500321-NOSID"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2018-18281/", "MSF:ILITIES/REDHAT_LINUX-CVE-2018-18281/", "MSF:ILITIES/UBUNTU-CVE-2018-18281/"]}, {"type": "nessus", "idList": ["AL2_ALAS-2018-1086.NASL", "AL2_ALAS-2018-1133.NASL", "AL2_ALAS-2019-1278.NASL", "ALA_ALAS-2018-1086.NASL", "ALA_ALAS-2018-1133.NASL", "ALA_ALAS-2019-1278.NASL", "CENTOS_RHSA-2018-3083.NASL", "CENTOS_RHSA-2019-2029.NASL", "DEBIAN_DLA-1392.NASL", "DEBIAN_DLA-1422.NASL", "DEBIAN_DLA-1423.NASL", "DEBIAN_DLA-1531.NASL", "DEBIAN_DLA-1715.NASL", "DEBIAN_DLA-1731.NASL", "DEBIAN_DSA-4308.NASL", "EULEROS_SA-2018-1263.NASL", "EULEROS_SA-2018-1297.NASL", "EULEROS_SA-2018-1373.NASL", "EULEROS_SA-2018-1407.NASL", "EULEROS_SA-2018-1432.NASL", "EULEROS_SA-2019-1027.NASL", "EULEROS_SA-2019-1028.NASL", "EULEROS_SA-2019-1062.NASL", "EULEROS_SA-2019-1076.NASL", "EULEROS_SA-2019-1108.NASL", "EULEROS_SA-2019-1131.NASL", "EULEROS_SA-2019-1156.NASL", "EULEROS_SA-2019-1178.NASL", "EULEROS_SA-2019-1181.NASL", "EULEROS_SA-2019-1188.NASL", "EULEROS_SA-2019-1189.NASL", "EULEROS_SA-2019-1197.NASL", "EULEROS_SA-2019-1204.NASL", "EULEROS_SA-2019-1220.NASL", "EULEROS_SA-2019-1223.NASL", "EULEROS_SA-2019-1244.NASL", "EULEROS_SA-2019-1253.NASL", "EULEROS_SA-2019-1259.NASL", "EULEROS_SA-2019-1471.NASL", "EULEROS_SA-2019-1484.NASL", "EULEROS_SA-2019-1500.NASL", "EULEROS_SA-2019-1507.NASL", "EULEROS_SA-2019-1511.NASL", "EULEROS_SA-2019-1512.NASL", "EULEROS_SA-2019-1515.NASL", "EULEROS_SA-2019-1518.NASL", "EULEROS_SA-2019-1522.NASL", "EULEROS_SA-2019-1536.NASL", "EULEROS_SA-2019-1586.NASL", "EULEROS_SA-2019-1587.NASL", "EULEROS_SA-2019-2353.NASL", "F5_BIGIP_SOL40523020.NASL", "FEDORA_2018-1621B2204A.NASL", "FEDORA_2018-59E4747E0F.NASL", "FEDORA_2018-B68776E5B0.NASL", "FEDORA_2018-F55C305488.NASL", "NEWSTART_CGSL_NS-SA-2019-0070_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0074_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2019-0180_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0183_KERNEL-RT.NASL", "NEWSTART_CGSL_NS-SA-2019-0247_KERNEL.NASL", "NEWSTART_CGSL_NS-SA-2019-0253_KERNEL-RT.NASL", "OPENSUSE-2018-1016.NASL", "OPENSUSE-2018-1140.NASL", "OPENSUSE-2018-1342.NASL", "OPENSUSE-2018-1427.NASL", "OPENSUSE-2018-1548.NASL", "OPENSUSE-2019-769.NASL", "OPENSUSE-2019-893.NASL", "OPENSUSE-2019-974.NASL", "ORACLELINUX_ELSA-2018-3083.NASL", "ORACLELINUX_ELSA-2018-4227.NASL", "ORACLELINUX_ELSA-2018-4242.NASL", "ORACLELINUX_ELSA-2018-4245.NASL", "ORACLELINUX_ELSA-2018-4250.NASL", "ORACLELINUX_ELSA-2018-4288.NASL", "ORACLELINUX_ELSA-2018-4299.NASL", "ORACLELINUX_ELSA-2018-4300.NASL", "ORACLELINUX_ELSA-2018-4301.NASL", "ORACLELINUX_ELSA-2018-4304.NASL", "ORACLELINUX_ELSA-2018-4307.NASL", "ORACLELINUX_ELSA-2019-4315.NASL", "ORACLELINUX_ELSA-2019-4316.NASL", "ORACLELINUX_ELSA-2020-5706.NASL", "ORACLELINUX_ELSA-2020-5708.NASL", "ORACLEVM_OVMSA-2018-0258.NASL", "ORACLEVM_OVMSA-2018-0284.NASL", "ORACLEVM_OVMSA-2018-0286.NASL", "ORACLEVM_OVMSA-2019-0002.NASL", "ORACLEVM_OVMSA-2020-0020.NASL", "REDHAT-RHSA-2018-2948.NASL", "REDHAT-RHSA-2018-3083.NASL", "REDHAT-RHSA-2018-3096.NASL", "REDHAT-RHSA-2019-0831.NASL", "REDHAT-RHSA-2019-2029.NASL", "REDHAT-RHSA-2019-2043.NASL", "REDHAT-RHSA-2019-4154.NASL", "REDHAT-RHSA-2020-0036.NASL", "REDHAT-RHSA-2020-0100.NASL", "REDHAT-RHSA-2020-0103.NASL", "REDHAT-RHSA-2020-0179.NASL", "SLACKWARE_SSA_2019-030-01.NASL", "SL_20181030_KERNEL_ON_SL7_X.NASL", "SL_20190806_KERNEL_ON_SL7_X.NASL", "SUSE_SU-2018-2776-1.NASL", "SUSE_SU-2018-2858-1.NASL", "SUSE_SU-2018-2879-1.NASL", "SUSE_SU-2018-2907-1.NASL", "SUSE_SU-2018-2908-1.NASL", "SUSE_SU-2018-2980-1.NASL", "SUSE_SU-2018-3083-1.NASL", "SUSE_SU-2018-3084-1.NASL", "SUSE_SU-2018-3589-1.NASL", "SUSE_SU-2018-3689-1.NASL", "SUSE_SU-2018-3746-1.NASL", "SUSE_SU-2018-3772-1.NASL", "SUSE_SU-2018-3787-1.NASL", "SUSE_SU-2018-3934-1.NASL", "SUSE_SU-2018-4069-1.NASL", "SUSE_SU-2019-0095-1.NASL", "SUSE_SU-2019-0222-1.NASL", "SUSE_SU-2019-0224-1.NASL", "SUSE_SU-2019-0439-1.NASL", "SUSE_SU-2019-1289-1.NASL", "SUSE_SU-2019-13937-1.NASL", "UBUNTU_USN-3676-1.NASL", "UBUNTU_USN-3676-2.NASL", "UBUNTU_USN-3695-1.NASL", "UBUNTU_USN-3695-2.NASL", "UBUNTU_USN-3718-1.NASL", "UBUNTU_USN-3718-2.NASL", "UBUNTU_USN-3754-1.NASL", "UBUNTU_USN-3797-1.NASL", "UBUNTU_USN-3797-2.NASL", "UBUNTU_USN-3820-1.NASL", "UBUNTU_USN-3820-2.NASL", "UBUNTU_USN-3820-3.NASL", "UBUNTU_USN-3822-1.NASL", "UBUNTU_USN-3832-1.NASL", "UBUNTU_USN-3835-1.NASL", "UBUNTU_USN-3846-1.NASL", "UBUNTU_USN-3847-1.NASL", "UBUNTU_USN-3847-2.NASL", "UBUNTU_USN-3847-3.NASL", "UBUNTU_USN-3848-1.NASL", "UBUNTU_USN-3848-2.NASL", "UBUNTU_USN-3849-1.NASL", "UBUNTU_USN-3871-1.NASL", "UBUNTU_USN-3871-2.NASL", "UBUNTU_USN-3871-3.NASL", "UBUNTU_USN-3871-4.NASL", "UBUNTU_USN-3871-5.NASL", "UBUNTU_USN-3880-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704308", "OPENVAS:1361412562310814563", "OPENVAS:1361412562310843547", "OPENVAS:1361412562310843551", "OPENVAS:1361412562310843576", "OPENVAS:1361412562310843577", "OPENVAS:1361412562310843595", "OPENVAS:1361412562310843596", "OPENVAS:1361412562310843628", "OPENVAS:1361412562310843663", "OPENVAS:1361412562310843666", "OPENVAS:1361412562310843820", "OPENVAS:1361412562310843821", "OPENVAS:1361412562310843824", "OPENVAS:1361412562310843825", "OPENVAS:1361412562310843840", "OPENVAS:1361412562310843841", "OPENVAS:1361412562310843856", "OPENVAS:1361412562310843857", "OPENVAS:1361412562310843858", "OPENVAS:1361412562310843859", "OPENVAS:1361412562310843860", "OPENVAS:1361412562310843861", "OPENVAS:1361412562310843862", "OPENVAS:1361412562310843884", "OPENVAS:1361412562310843891", "OPENVAS:1361412562310843892", "OPENVAS:1361412562310843896", "OPENVAS:1361412562310843897", "OPENVAS:1361412562310843904", "OPENVAS:1361412562310851895", "OPENVAS:1361412562310852091", "OPENVAS:1361412562310852108", "OPENVAS:1361412562310852140", "OPENVAS:1361412562310852195", "OPENVAS:1361412562310875066", "OPENVAS:1361412562310875067", "OPENVAS:1361412562310875072", "OPENVAS:1361412562310875297", "OPENVAS:1361412562310875302", "OPENVAS:1361412562310875303", "OPENVAS:1361412562310875310", "OPENVAS:1361412562310875311", "OPENVAS:1361412562310875330", "OPENVAS:1361412562310875334", "OPENVAS:1361412562310875349", "OPENVAS:1361412562310875369", "OPENVAS:1361412562310875407", "OPENVAS:1361412562310875414", "OPENVAS:1361412562310875423", "OPENVAS:1361412562310875438", "OPENVAS:1361412562310875443", "OPENVAS:1361412562310875459", "OPENVAS:1361412562310875476", "OPENVAS:1361412562310875506", "OPENVAS:1361412562310875559", "OPENVAS:1361412562310875566", "OPENVAS:1361412562310875577", "OPENVAS:1361412562310875628", "OPENVAS:1361412562310875629", "OPENVAS:1361412562310875681", "OPENVAS:1361412562310875786", "OPENVAS:1361412562310875801", "OPENVAS:1361412562310875834", "OPENVAS:1361412562310875913", "OPENVAS:1361412562310875923", "OPENVAS:1361412562310875946", "OPENVAS:1361412562310876049", "OPENVAS:1361412562310876095", "OPENVAS:1361412562310876105", "OPENVAS:1361412562310876177", "OPENVAS:1361412562310876322", "OPENVAS:1361412562310876361", "OPENVAS:1361412562310876377", "OPENVAS:1361412562310876423", "OPENVAS:1361412562310876445", "OPENVAS:1361412562310891392", "OPENVAS:1361412562310891422", "OPENVAS:1361412562310891531", "OPENVAS:1361412562310891715", "OPENVAS:1361412562310891731", "OPENVAS:1361412562311220181263", "OPENVAS:1361412562311220181297", "OPENVAS:1361412562311220181373", "OPENVAS:1361412562311220181407", "OPENVAS:1361412562311220181432", "OPENVAS:1361412562311220191027", "OPENVAS:1361412562311220191028", "OPENVAS:1361412562311220191062", "OPENVAS:1361412562311220191076", "OPENVAS:1361412562311220191108", "OPENVAS:1361412562311220191131", "OPENVAS:1361412562311220191156", "OPENVAS:1361412562311220191178", "OPENVAS:1361412562311220191181", "OPENVAS:1361412562311220191188", "OPENVAS:1361412562311220191189", "OPENVAS:1361412562311220191197", "OPENVAS:1361412562311220191204", "OPENVAS:1361412562311220191220", "OPENVAS:1361412562311220191223", "OPENVAS:1361412562311220191244", "OPENVAS:1361412562311220191253", "OPENVAS:1361412562311220191259", "OPENVAS:1361412562311220191471", "OPENVAS:1361412562311220191484", "OPENVAS:1361412562311220191500", "OPENVAS:1361412562311220191507", "OPENVAS:1361412562311220191511", "OPENVAS:1361412562311220191512", "OPENVAS:1361412562311220191515", "OPENVAS:1361412562311220191518", "OPENVAS:1361412562311220191522", "OPENVAS:1361412562311220191536", "OPENVAS:1361412562311220191586", "OPENVAS:1361412562311220191587", "OPENVAS:1361412562311220192353"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-3083", "ELSA-2018-4227", "ELSA-2018-4242", "ELSA-2018-4245", "ELSA-2018-4246", "ELSA-2018-4250", "ELSA-2018-4288", "ELSA-2018-4299", "ELSA-2018-4300", "ELSA-2018-4301", "ELSA-2018-4304", "ELSA-2018-4307", "ELSA-2019-2029", "ELSA-2019-4315", "ELSA-2019-4316", "ELSA-2019-4317", "ELSA-2020-5706", "ELSA-2020-5708"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:150001"]}, {"type": "photon", "idList": ["PHSA-2018-0041", "PHSA-2018-0101", "PHSA-2018-0113", "PHSA-2018-0116", "PHSA-2018-0132", "PHSA-2018-0150", "PHSA-2018-0190", "PHSA-2018-0198", "PHSA-2018-1.0-0198", "PHSA-2019-0122", "PHSA-2019-0128", "PHSA-2019-0212", "PHSA-2019-1.0-0212"]}, {"type": "redhat", "idList": ["RHSA-2018:2948", "RHSA-2018:3083", "RHSA-2018:3096", "RHSA-2019:0831", "RHSA-2019:2029", "RHSA-2019:2043", "RHSA-2019:4154", "RHSA-2020:0036", "RHSA-2020:0100", "RHSA-2020:0103", "RHSA-2020:0179"]}, {"type": "redhatcve", "idList": ["RH:CVE-2018-16658"]}, {"type": "slackware", "idList": ["SSA-2019-030-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:2738-1", "OPENSUSE-SU-2018:3071-1", "OPENSUSE-SU-2018:3658-1", "OPENSUSE-SU-2018:4133-1"]}, {"type": "ubuntu", "idList": ["USN-3676-1", "USN-3676-2", "USN-3695-1", "USN-3695-2", "USN-3718-1", "USN-3718-2", "USN-3754-1", "USN-3797-1", "USN-3797-2", "USN-3820-1", "USN-3820-2", "USN-3820-3", "USN-3822-1", "USN-3822-2", "USN-3832-1", "USN-3835-1", "USN-3846-1", "USN-3847-1", "USN-3847-2", "USN-3847-3", "USN-3848-1", "USN-3848-2", "USN-3849-1", "USN-3849-2", "USN-3871-1", "USN-3871-2", "USN-3871-3", "USN-3871-4", "USN-3871-5", "USN-3880-1", "USN-3880-2"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-10940", "UB:CVE-2018-16658", "UB:CVE-2018-18281", "UB:CVE-2018-18386", "UB:CVE-2018-18690", "UB:CVE-2018-18710", "UB:CVE-2018-9516"]}], "rev": 4}, "backreferences": {"references": [{"type": "amazon", "idList": ["ALAS-2018-1086", "ALAS-2019-1278"]}, {"type": "androidsecurity", "idList": ["ANDROID:2019-01-01"]}, {"type": "centos", "idList": ["CESA-2019:2029"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:0C99BDFDCDE2F48CF8EC42CB26558A0B", "CFOUNDRY:131A4556633D91C9BF0AE72696FADB89", "CFOUNDRY:61ADF14D6FEC14FA5E06A7684B091D19", "CFOUNDRY:ACBE18A36EB39832526C9AA3F7A3E9CE"]}, {"type": "cve", "idList": ["CVE-2018-10940", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-18690", "CVE-2018-18710"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1392-1:883BE", "DEBIAN:DLA-1422-1:EBC6F", "DEBIAN:DLA-1422-2:DC70E", "DEBIAN:DLA-1423-1:B239D", "DEBIAN:DLA-1531-1:834CC", "DEBIAN:DSA-4308-1:D561A"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2018-10940", "DEBIANCVE:CVE-2018-16658", "DEBIANCVE:CVE-2018-18281", "DEBIANCVE:CVE-2018-18386", "DEBIANCVE:CVE-2018-18690", "DEBIANCVE:CVE-2018-18710", "DEBIANCVE:CVE-2018-9516"]}, {"type": "f5", "idList": ["F5:K11165942", "F5:K28280935", "F5:K40523020"]}, {"type": "fedora", "idList": ["FEDORA:00FDB6087AA0", "FEDORA:122AE604D3F9", "FEDORA:1EEE86087AA1", "FEDORA:1EFAB60ACFB0", "FEDORA:20DCB60779B2", "FEDORA:22D77604972B", "FEDORA:250CB6087A80", "FEDORA:28CF260C68EC", "FEDORA:296826040AED", "FEDORA:2CDD76006271", "FEDORA:3266960F0E44", "FEDORA:3C2FF6014B8C", "FEDORA:41B546014626", "FEDORA:4A22960A514A", "FEDORA:4CF35608BFEA", "FEDORA:4D5AD601FDAC", "FEDORA:5B68260A5858", "FEDORA:6B39A60C690C", "FEDORA:6B66A6047312", "FEDORA:6B6B360567FC", "FEDORA:7E7A360ACFB3", "FEDORA:8FD3E60491BA", "FEDORA:95A686085F81", "FEDORA:9CD7A622281F", "FEDORA:9DF7060ACFA9", "FEDORA:9E3D9606D195", "FEDORA:B395E6087A9D", "FEDORA:BBFE360460D0", "FEDORA:BD35260BC96F", "FEDORA:C49D061F375F", "FEDORA:C64AE6007F37", "FEDORA:C68476222B32", "FEDORA:DBB1B659CBE0", "FEDORA:E178F6217CD7", "FEDORA:E819660C68EA", "FEDORA:E88866014636", "FEDORA:E93AE6077DCD", "FEDORA:F417F60477C5"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:60F2E118E85CB34AAEEAED9DE88D51AF"]}, {"type": "ibm", "idList": ["718AA276AD1F96507AD1B17F8A42616C949B63DCC5D86816603BF65C698FACB0"]}, {"type": "metasploit", "idList": ["MSF:ILITIES/HUAWEI-EULEROS-2_0_SP5-CVE-2018-18281/", "MSF:ILITIES/REDHAT_LINUX-CVE-2018-18281/", "MSF:ILITIES/UBUNTU-CVE-2018-18281/"]}, {"type": "nessus", "idList": ["AL2_ALAS-2018-1086.NASL", "ALA_ALAS-2018-1086.NASL", "DEBIAN_DLA-1392.NASL", "DEBIAN_DLA-1531.NASL", "DEBIAN_DSA-4308.NASL", "EULEROS_SA-2018-1263.NASL", "EULEROS_SA-2018-1297.NASL", "EULEROS_SA-2019-1027.NASL", "EULEROS_SA-2019-1028.NASL", "OPENSUSE-2018-1016.NASL", "OPENSUSE-2018-1140.NASL", "ORACLELINUX_ELSA-2018-4227.NASL", "ORACLELINUX_ELSA-2018-4242.NASL", "ORACLELINUX_ELSA-2018-4245.NASL", "ORACLELINUX_ELSA-2018-4250.NASL", "ORACLEVM_OVMSA-2018-0258.NASL", "ORACLEVM_OVMSA-2019-0002.NASL", "REDHAT-RHSA-2018-2948.NASL", "SLACKWARE_SSA_2019-030-01.NASL", "SUSE_SU-2018-2776-1.NASL", "SUSE_SU-2018-2858-1.NASL", "SUSE_SU-2018-2879-1.NASL", "SUSE_SU-2018-2907-1.NASL", "SUSE_SU-2018-2908-1.NASL", "SUSE_SU-2018-3083-1.NASL", "SUSE_SU-2018-3084-1.NASL", "SUSE_SU-2019-0222-1.NASL", "SUSE_SU-2019-0224-1.NASL", "SUSE_SU-2019-0439-1.NASL", "SUSE_SU-2019-13937-1.NASL", "UBUNTU_USN-3676-1.NASL", "UBUNTU_USN-3676-2.NASL", "UBUNTU_USN-3871-1.NASL", "UBUNTU_USN-3871-2.NASL", "UBUNTU_USN-3871-3.NASL", "UBUNTU_USN-3871-4.NASL", "UBUNTU_USN-3871-5.NASL", "UBUNTU_USN-3880-1.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310704308", "OPENVAS:1361412562310843547", "OPENVAS:1361412562310843551", "OPENVAS:1361412562310843884", "OPENVAS:1361412562310843891", "OPENVAS:1361412562310843892", "OPENVAS:1361412562310843896", "OPENVAS:1361412562310843897", "OPENVAS:1361412562310843904", "OPENVAS:1361412562310851895", "OPENVAS:1361412562310852091", "OPENVAS:1361412562310875066", "OPENVAS:1361412562310875067", "OPENVAS:1361412562310875072", "OPENVAS:1361412562310875407", "OPENVAS:1361412562310875414", "OPENVAS:1361412562310875423", "OPENVAS:1361412562310875438", "OPENVAS:1361412562310875443", "OPENVAS:1361412562310891392", "OPENVAS:1361412562310891531", "OPENVAS:1361412562311220191500", "OPENVAS:1361412562311220191522"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-4227", "ELSA-2018-4242", "ELSA-2018-4245", "ELSA-2018-4246", "ELSA-2018-4250"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:150001"]}, {"type": "photon", "idList": ["PHSA-2018-1.0-0198", "PHSA-2019-1.0-0212"]}, {"type": "redhat", "idList": ["RHSA-2020:0103"]}, {"type": "redhatcve", "idList": ["RH:CVE-2018-16658"]}, {"type": "slackware", "idList": ["SSA-2019-030-01"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:2738-1", "OPENSUSE-SU-2018:3071-1"]}, {"type": "ubuntu", "idList": ["USN-3676-1", "USN-3676-2", "USN-3797-1", "USN-3797-2", "USN-3871-1", "USN-3871-2", "USN-3871-3", "USN-3871-4", "USN-3871-5", "USN-3880-1", "USN-3880-2"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2018-10940", "UB:CVE-2018-16658", "UB:CVE-2018-18281", "UB:CVE-2018-18386", "UB:CVE-2018-18690", "UB:CVE-2018-18710", "UB:CVE-2018-9516"]}]}, "exploitation": null, "vulnersScore": 6.8}, "affectedPackage": [{"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-syms-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-syms", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-debug-debuginfo-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-debug-debuginfo", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-debug-debugsource-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-debug-debugsource", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-obs-build-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-obs-build", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-vanilla-debugsource-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-vanilla-debugsource", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-obs-qa-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-obs-qa", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-debug-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-debug", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-devel-4.4.162-78.1.noarch.rpm", "packageName": "kernel-devel", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-docs-pdf-4.4.162-78.1.noarch.rpm", "packageName": "kernel-docs-pdf", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-macros-4.4.162-78.1.noarch.rpm", "packageName": "kernel-macros", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-default-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-default", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-default-debuginfo-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-default-debuginfo", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-default-base-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-default-base", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-debug-base-debuginfo-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-debug-base-debuginfo", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-docs-4.4.162-78.1.noarch.rpm", "packageName": "kernel-docs", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-obs-build-debugsource-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-obs-build-debugsource", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-default-debugsource-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-default-debugsource", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-debug-base-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-debug-base", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-vanilla-base-debuginfo-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-vanilla-base-debuginfo", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-debug-devel-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-debug-devel", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-source-4.4.162-78.1.noarch.rpm", "packageName": "kernel-source", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-source-vanilla-4.4.162-78.1.noarch.rpm", "packageName": "kernel-source-vanilla", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-vanilla-base-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-vanilla-base", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-vanilla-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-vanilla", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-debug-devel-debuginfo-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-debug-devel-debuginfo", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-vanilla-devel-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-vanilla-devel", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-default-base-debuginfo-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-default-base-debuginfo", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-default-devel-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-default-devel", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "x86_64", "operator": "lt", "packageFilename": "kernel-vanilla-debuginfo-4.4.162-78.1.x86_64.rpm", "packageName": "kernel-vanilla-debuginfo", "packageVersion": "4.4.162-78.1"}, {"OS": "openSUSE Leap", "OSVersion": "42.3", "arch": "noarch", "operator": "lt", "packageFilename": "kernel-docs-html-4.4.162-78.1.noarch.rpm", "packageName": "kernel-docs-html", "packageVersion": "4.4.162-78.1"}], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647589307, "score": 0}}
{"nessus": [{"lastseen": "2021-08-19T12:30:14", "description": "The openSUSE Leap 42.3 kernel was updated to 4.4.162 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n\n - CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\n - CVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n\n - CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\n - CVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).\n\nThe following non-security bugs were fixed :\n\n - 6lowpan: iphc: reset mac_header after decompress to fix panic (bnc#1012382).\n\n - Add azure kernel description.\n\n - Add bug reference to patches.suse/x86-entry-64-use-a-per-cpu-trampoline-stack\n -fix1.patch\n\n - Add graphviz to buildreq for image conversion\n\n - Add reference to bsc#1104124 to patches.fixes/fs-aio-fix-the-increment-of-aio-nr-and-cou nting-agai.patch\n\n - ALSA: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge (bnc#1012382).\n\n - ALSA: hda/realtek - Cannot adjust speaker's volume on Dell XPS 27 7760 (bnc#1012382).\n\n - apparmor: remove no-op permission check in policy_unpack (git-fixes).\n\n - ARC: build: Get rid of toolchain check (bnc#1012382).\n\n - ARC: clone syscall to setp r25 as thread pointer (bnc#1012382).\n\n - arch/hexagon: fix kernel/dma.c build warning (bnc#1012382).\n\n - arch-symbols: use bash as interpreter since the script uses bashism.\n\n - arm64: cpufeature: Track 32bit EL0 support (bnc#1012382).\n\n - arm64: jump_label.h: use asm_volatile_goto macro instead of 'asm goto' (bnc#1012382).\n\n - arm64: KVM: Sanitize PSTATE.M when being set from userspace (bnc#1012382).\n\n - arm64: KVM: Tighten guest core register access from userspace (bnc#1012382).\n\n - ARM: dts: at91: add new compatibility string for macb on sama5d3 (bnc#1012382).\n\n - ARM: dts: dra7: fix DCAN node addresses (bnc#1012382).\n\n - ARM: mvebu: declare asm symbols as character arrays in pmsu.c (bnc#1012382).\n\n - ASoC: dapm: Fix potential DAI widget pointer deref when linking DAIs (bnc#1012382).\n\n - ASoC: sigmadsp: safeload should not have lower byte limit (bnc#1012382).\n\n - ASoC: wm8804: Add ACPI support (bnc#1012382).\n\n - ath10k: fix scan crash due to incorrect length calculation (bnc#1012382).\n\n - ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bnc#1012382).\n\n - ath10k: protect ath10k_htt_rx_ring_free with rx_ring.lock (bnc#1012382).\n\n - Bluetooth: Add a new Realtek 8723DE ID 0bda:b009 (bnc#1012382).\n\n - bnxt_en: Fix TX timeout during netpoll (bnc#1012382).\n\n - bonding: avoid possible dead-lock (bnc#1012382).\n\n - bpf: fix cb access in socket filter programs on tail calls (bsc#1012382).\n\n - bpf: fix map not being uncharged during map creation failure (bsc#1012382).\n\n - bpf, s390: fix potential memleak when later bpf_jit_prog fails (git-fixes).\n\n - bpf, s390x: do not reload skb pointers in non-skb context (git-fixes).\n\n - bsc#1106913: Replace with upstream variants Delete patches.suse/11-x86-mm-only-set-ibpb-when-the-new-thread\n -cannot-ptrace-current-thread.patch.\n\n - bs-upload-kernel: do not set %opensuse_bs Since SLE15 it is not set in the distribution project so do not set it for kernel projects either.\n\n - btrfs: add a comp_refs() helper (dependency for bsc#1031392).\n\n - btrfs: add missing initialization in btrfs_check_shared (Git-fixes bsc#1112262).\n\n - btrfs: add tracepoints for outstanding extents mods (dependency for bsc#1031392).\n\n - btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE (dependency for bsc#1031392).\n\n - btrfs: cleanup extent locking sequence (dependency for bsc#1031392).\n\n - btrfs: defrag: use btrfs_mod_outstanding_extents in cluster_pages_for_defrag (Follow up fixes for bsc#1031392).\n\n - btrfs: delayed-inode: Remove wrong qgroup meta reservation calls (bsc#1031392).\n\n - btrfs: delayed-inode: Use new qgroup meta rsv for delayed inode and item (bsc#1031392).\n\n - btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n\n - btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n\n - btrfs: fix error handling in btrfs_dev_replace_start (bsc#1107535).\n\n - Btrfs: fix invalid attempt to free reserved space on failure to cow range (dependency for bsc#1031392).\n\n - btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n\n - btrfs: Fix race condition between delayed refs and blockgroup removal (Git-fixes bsc#1112263).\n\n - btrfs: Fix wrong btrfs_delalloc_release_extents parameter (bsc#1031392).\n\n - Btrfs: kill trans in run_delalloc_nocow and btrfs_cross_ref_exist (dependency for bsc#1031392).\n\n - btrfs: make the delalloc block rsv per inode (dependency for bsc#1031392).\n\n - Btrfs: pass delayed_refs directly to btrfs_find_delayed_ref_head (dependency for bsc#1031392).\n\n - btrfs: qgroup: Add quick exit for non-fs extents (dependency for bsc#1031392).\n\n - btrfs: qgroup: Cleanup btrfs_qgroup_prepare_account_extents function (dependency for bsc#1031392).\n\n - btrfs: qgroup: Cleanup the remaining old reservation counters (bsc#1031392).\n\n - btrfs: qgroup: Commit transaction in advance to reduce early EDQUOT (bsc#1031392).\n\n - btrfs: qgroup: Do not use root->qgroup_meta_rsv for qgroup (bsc#1031392).\n\n - btrfs: qgroup: Fix wrong qgroup reservation update for relationship modification (bsc#1031392).\n\n - btrfs: qgroup: Introduce function to convert META_PREALLOC into META_PERTRANS (bsc#1031392).\n\n - btrfs: qgroup: Introduce helpers to update and access new qgroup rsv (bsc#1031392).\n\n - btrfs: qgroup: Make qgroup_reserve and its callers to use separate reservation type (bsc#1031392).\n\n - btrfs: qgroup: Skeleton to support separate qgroup reservation type (bsc#1031392).\n\n - btrfs: qgroups: opencode qgroup_free helper (dependency for bsc#1031392).\n\n - btrfs: qgroup: Split meta rsv type into meta_prealloc and meta_pertrans (bsc#1031392).\n\n - btrfs: qgroup: Update trace events for metadata reservation (bsc#1031392).\n\n - btrfs: qgroup: Update trace events to use new separate rsv types (bsc#1031392).\n\n - btrfs: qgroup: Use independent and accurate per inode qgroup rsv (bsc#1031392).\n\n - btrfs: qgroup: Use root::qgroup_meta_rsv_* to record qgroup meta reserved space (bsc#1031392).\n\n - btrfs: qgroup: Use separate meta reservation type for delalloc (bsc#1031392).\n\n - btrfs: remove type argument from comp_tree_refs (dependency for bsc#1031392).\n\n - Btrfs: rework outstanding_extents (dependency for bsc#1031392).\n\n - btrfs: switch args for comp_*_refs (dependency for bsc#1031392).\n\n - btrfs: Take trans lock before access running trans in check_delayed_ref (Follow up fixes for bsc#1031392).\n\n - ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1112007).\n\n - cfg80211: fix a type issue in ieee80211_chandef_to_operating_class() (bnc#1012382).\n\n - cfg80211: nl80211_update_ft_ies() to validate NL80211_ATTR_IE (bnc#1012382).\n\n - cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).\n\n - cgroup, netclassid: add a preemption point to write_classid (bnc#1098996).\n\n - CIFS: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n\n - cifs: connect to servername instead of IP for IPC$ share (bsc#1106359).\n\n - cifs: fix memory leak in SMB2_open() (bsc#1112894).\n\n - cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n\n - cifs: read overflow in is_valid_oplock_break() (bnc#1012382).\n\n - clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bnc#1012382).\n\n - config.sh: set BUGZILLA_PRODUCT for SLE12-SP3\n\n - crypto: mxs-dcp - Fix wait logic on chan threads (bnc#1012382).\n\n - crypto: skcipher - Fix -Wstringop-truncation warnings (bnc#1012382).\n\n - Define dependencies of in-kernel KMPs statically This allows us to use rpm's internal dependency generator (bsc#981083).\n\n - dm cache: fix resize crash if user does not reload cache table (bnc#1012382).\n\n - dm thin metadata: fix __udivdi3 undefined on 32-bit (bnc#1012382).\n\n - dm thin metadata: try to avoid ever aborting transactions (bnc#1012382).\n\n - Do not ship firmware (bsc#1054239). Pull firmware from kernel-firmware instead.\n\n - drivers/tty: add error handling for pcmcia_loop_config (bnc#1012382).\n\n - drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bnc#1012382).\n\n - drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is missing from VBIOS (bnc#1012382).\n\n - drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1106929)\n\n - Drop dtb-source.spec and move the sources to kernel-source (bsc#1011920)\n\n - Drop multiversion(kernel) from the KMP template ()\n\n - e1000: check on netif_running() before calling e1000_up() (bnc#1012382).\n\n - e1000: ensure to free old tx/rx rings in set_ringparam() (bnc#1012382).\n\n - ebtables: arpreply: Add the standard target sanity check (bnc#1012382).\n\n - EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114648).\n\n - Enable kernel-obs-(build,qa) also in the vanilla branches\n\n - ethtool: restore erroneously removed break in dev_ethtool (bsc#1114229).\n\n - fbdev: fix broken menu dependencies (bsc#1106929)\n\n - fbdev/omapfb: fix omapfb_memory_read infoleak (bnc#1012382).\n\n - Fix file list to remove REPORTING-BUGS\n\n - Fix html and pdf creation in Documetation/media/*\n\n - floppy: Do not copy a kernel pointer to user memory in FDGETPRM ioctl (bnc#1012382).\n\n - fs/cifs: do not translate SFM_SLASH (U+F026) to backslash (bnc#1012382).\n\n - fs/cifs: suppress a string overflow warning (bnc#1012382).\n\n - gpio: adp5588: Fix sleep-in-atomic-context bug (bnc#1012382).\n\n - hexagon: modify ffs() and fls() to return int (bnc#1012382).\n\n - HID: hid-ntrig: add error handling for sysfs_create_group (bnc#1012382).\n\n - housekeeping: btrfs selftests: fold backport fix into backport patch\n\n - housekeeping: move btrfs patches to sorted section. No code changes.\n\n - hv: avoid crash in vmbus sysfs files (bnc#1108377).\n\n - hwmon: (adt7475) Make adt7475_read_word() return errors (bnc#1012382).\n\n - hwmon: (ina2xx) fix sysfs shunt resistor read access (bnc#1012382).\n\n - hwrng: core - document the quality field (git-fixes).\n\n - i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bnc#1012382).\n\n - i2c: i801: Allow ACPI AML access I/O ports not reserved for SMBus (bnc#1012382).\n\n - i2c: uniphier-f: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n\n - i2c: uniphier: issue STOP only for last message or I2C_M_STOP (bnc#1012382).\n\n - IB/srp: Avoid that sg_reset -d $(srp_device) triggers an infinite loop (bnc#1012382).\n\n - Input: atakbd - fix Atari CapsLock behaviour (bnc#1012382).\n\n - Input: atakbd - fix Atari keymap (bnc#1012382).\n\n - Input: elantech - enable middle button of touchpad on ThinkPad P72 (bnc#1012382).\n\n - ip6_tunnel: be careful when accessing the inner header (bnc#1012382).\n\n - ip_tunnel: be careful when accessing the inner header (bnc#1012382).\n\n - ipv4: fix use-after-free in ip_cmsg_recv_dstaddr() (bnc#1012382).\n\n - ixgbe: pci_set_drvdata must be called before register_netdev (Git-fixes bsc#1109923).\n\n - jffs2: return -ERANGE when xattr buffer is too small (bnc#1012382).\n\n - KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bnc#1012382).\n\n - KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch (bnc#1012382).\n\n - lib/test_hexdump.c: fix failure on big endian cpu (bsc#1106110).\n\n - mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n\n - mac80211: fix a race between restart and CSA flows (bnc#1012382).\n\n - mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP mode keys (bnc#1012382).\n\n - mac80211: Fix station bandwidth setting after channel switch (bnc#1012382).\n\n - mac80211_hwsim: correct use of IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n\n - mac80211: mesh: fix HWMP sequence numbering to follow standard (bnc#1012382).\n\n - mac80211: shorten the IBSS debug messages (bnc#1012382).\n\n - mach64: detect the dot clock divider correctly on sparc (bnc#1012382).\n\n - md-cluster: clear another node's suspend_area after the copy is finished (bnc#1012382).\n\n - media: af9035: prevent buffer overflow on write (bnc#1012382).\n\n - media: exynos4-is: Prevent NULL pointer dereference in\n __isp_video_try_fmt() (bnc#1012382).\n\n - media: fsl-viu: fix error handling in viu_of_probe() (bnc#1012382).\n\n - media: omap3isp: zero-initialize the isp cam_xclk(a,b) initial data (bnc#1012382).\n\n - media: omap_vout: Fix a possible NULL pointer dereference in omap_vout_open() (bsc#1050431).\n\n - media: s3c-camif: ignore -ENOIOCTLCMD from v4l2_subdev_call for s_power (bnc#1012382).\n\n - media: soc_camera: ov772x: correct setting of banding filter (bnc#1012382).\n\n - media: tm6000: add error handling for dvb_register_adapter (bnc#1012382).\n\n - media: uvcvideo: Support realtek's UVC 1.5 device (bnc#1012382).\n\n - media: v4l: event: Prevent freeing event subscriptions while accessed (bnc#1012382).\n\n - media: videobuf-dma-sg: Fix dma_(sync,unmap)_sg() calls (bsc#1050431).\n\n - memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n\n - mfd: omap-usb-host: Fix dts probe of children (bnc#1012382).\n\n - mm: madvise(MADV_DODUMP): allow hugetlbfs pages (bnc#1012382).\n\n - mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n\n - mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).\n\n - mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (bnc#1012382).\n\n - mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git fixes).\n\n - module: exclude SHN_UNDEF symbols from kallsyms api (bnc#1012382).\n\n - move changes without Git-commit out of sorted section\n\n - net: cadence: Fix a sleep-in-atomic-context bug in macb_halt_tx() (bnc#1012382).\n\n - net: hns: fix length and page_offset overflow when CONFIG_ARM64_64K_PAGES (bnc#1012382).\n\n - net: ipv4: update fnhe_pmtu when first hop's MTU changes (bnc#1012382).\n\n - net/ipv6: Display all addresses in output of /proc/net/if_inet6 (bnc#1012382).\n\n - netlabel: check for IPV4MASK in addrinfo_get (bnc#1012382).\n\n - net: macb: disable scatter-gather for macb on sama5d3 (bnc#1012382).\n\n - net/mlx4: Use cpumask_available for eq->affinity_mask (bnc#1012382).\n\n - net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (bnc#1012382).\n\n - net: systemport: Fix wake-up interrupt race during resume (bnc#1012382).\n\n - net/usb: cancel pending work when unbinding smsc75xx (bnc#1012382).\n\n - NFS: add nostatflush mount option (bsc#1065726).\n\n - NFS: Avoid quadratic search when freeing delegations (bsc#1084760).\n\n - nfsd: fix corrupted reply to badly ordered compound (bnc#1012382).\n\n - ocfs2: fix locking for res->tracking and dlm->tracking_list (bnc#1012382).\n\n - of: unittest: Disable interrupt node tests for old world MAC systems (bnc#1012382).\n\n - ovl: Copy inode attributes after setting xattr (bsc#1107299).\n\n - Pass x86 as architecture on x86_64 and i386 (bsc#1093118).\n\n - PCI: hv: Use effective affinity mask (bsc#1109772).\n\n - PCI: Reprogram bridge prefetch registers on resume (bnc#1012382).\n\n - perf probe powerpc: Ignore SyS symbols irrespective of endianness (bnc#1012382).\n\n - perf script python: Fix export-to-postgresql.py occasional failure (bnc#1012382).\n\n - PM / core: Clear the direct_complete flag on errors (bnc#1012382).\n\n - powerpc/kdump: Handle crashkernel memory reservation failure (bnc#1012382).\n\n - powerpc/numa: Skip onlining a offline node in kdump path (bsc#1109784).\n\n - powerpc/perf/hv-24x7: Fix passing of catalog version number (bsc#1053043).\n\n - powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n\n - powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n\n - powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).\n\n - powerpc/pseries/mm: factorize PTE slot computation (bsc#1109158).\n\n - powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE (bsc#1109158).\n\n - powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).\n\n - power: vexpress: fix corruption in notifier registration (bnc#1012382).\n\n - proc: restrict kernel stack dumps to root (bnc#1012382).\n\n - qlcnic: fix Tx descriptor corruption on 82xx devices (bnc#1012382).\n\n - r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bnc#1012382).\n\n - RAID10 BUG_ON in raise_barrier when force is true and conf->barrier is 0 (bnc#1012382).\n\n - rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n\n - rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n\n - RDMA/ucma: check fd type in ucma_migrate_id() (bnc#1012382).\n\n - README: Clean-up trailing whitespace\n\n - reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n\n - reiserfs: do not panic on bad directory entries (bsc#1109818).\n\n - resource: Include resource end in walk_*() interfaces (bsc#1114648).\n\n - Revert 'btrfs: qgroups: Retry after commit on getting EDQUOT' (bsc#1031392).\n\n - Revert 'drm: Do not pass negative delta to ktime_sub_ns()' (bsc#1106929)\n\n - Revert 'drm/i915: Initialize HWS page address after GPU reset' (bsc#1106929)\n\n - Revert 'KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch' (kabi).\n\n - Revert 'media: v4l: event: Prevent freeing event subscriptions while accessed' (kabi).\n\n - Revert 'proc: restrict kernel stack dumps to root' (kabi).\n\n - Revert 'rpm/constraints.in: Lower default disk space requirement from 25G to 24G' This reverts commit 406abda1467c038842febffe264faae1fa2e3c1d. ok, did not wait long enough to see the failure.\n\n - Revert 'Skip intel_crt_init for Dell XPS 8700' (bsc#1106929)\n\n - Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).\n\n - Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()' (kabi).\n\n - Revert 'tcp: fix a stale ooo_last_skb after a replace' (kabi).\n\n - Revert 'tcp: free batches of packets in tcp_prune_ofo_queue()' (kabi).\n\n - Revert 'tcp: use an RB tree for ooo receive queue' (kabi).\n\n - Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug in service_outstanding_interrupt()' (bnc#1012382).\n\n - Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).\n\n - Revert 'x86/fpu: Remove struct fpu::counter' (kabi).\n\n - Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).\n\n - rndis_wlan: potential buffer overflow in rndis_wlan_auth_indication() (bnc#1012382).\n\n - rpm/apply-patches: Fix failure if there are no vanilla patches The grep command returns 1 if there are no patches and we are using pipefail.\n\n - rpm/constraints.in: build ARM on at least 2 cpus\n\n - rpm/constraints.in: Lower default disk space requirement from 25G to 24G 25G is rejected by the build service on ARM.\n\n - rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (bnc#1012382).\n\n - s390/chsc: Add exception handler for CHSC instruction (git-fixes).\n\n - s390/extmem: fix gcc 8 stringop-overflow warning (bnc#1012382).\n\n - s390/kdump: Fix elfcorehdr size calculation (git-fixes).\n\n - s390/kdump: Make elfcorehdr size calculation ABI compliant (git-fixes).\n\n - s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n\n - s390/qeth: do not dump past end of unknown HW header (bnc#1012382).\n\n - s390/qeth: handle failure on workqueue creation (git-fixes).\n\n - s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n\n - s390/stacktrace: fix address ranges for asynchronous and panic stack (git-fixes).\n\n - scsi: bnx2i: add error handling for ioremap_nocache (bnc#1012382).\n\n - scsi: ibmvscsi: Improve strings handling (bnc#1012382).\n\n - scsi: klist: Make it safe to use klists in atomic context (bnc#1012382).\n\n - scsi: target/iscsi: Make iscsit_ta_authentication() respect the output buffer size (bnc#1012382).\n\n - selftests/efivarfs: add required kernel configs (bnc#1012382).\n\n - serial: cpm_uart: return immediately from console poll (bnc#1012382).\n\n - serial: imx: restore handshaking irq for imx1 (bnc#1012382).\n\n - signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n\n - slub: make ->cpu_partial unsigned int (bnc#1012382).\n\n - smb2: fix missing files in root share directory listing (bnc#1012382).\n\n - smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n\n - sound: enable interrupt after dma buffer initialization (bnc#1012382).\n\n - spi: rspi: Fix interrupted DMA transfers (bnc#1012382).\n\n - spi: rspi: Fix invalid SPI use during system suspend (bnc#1012382).\n\n - spi: sh-msiof: Fix handling of write value for SISTR register (bnc#1012382).\n\n - spi: sh-msiof: Fix invalid SPI use during system suspend (bnc#1012382).\n\n - spi: tegra20-slink: explicitly enable/disable clock (bnc#1012382).\n\n - staging: android: ashmem: Fix mmap size validation (bnc#1012382).\n\n - staging: rts5208: fix missing error check on call to rtsx_write_register (bnc#1012382).\n\n - stmmac: fix valid numbers of unicast filter entries (bnc#1012382).\n\n - target: log Data-Out timeouts as errors (bsc#1095805).\n\n - target: log NOP ping timeouts as errors (bsc#1095805).\n\n - target: split out helper for cxn timeout error stashing (bsc#1095805).\n\n - target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n\n - target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n\n - tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).\n\n - tcp: call tcp_drop() from tcp_data_queue_ofo() (bnc#1012382).\n\n - tcp: fix a stale ooo_last_skb after a replace (bnc#1012382).\n\n - tcp: free batches of packets in tcp_prune_ofo_queue() (bnc#1012382).\n\n - tcp: increment sk_drops for dropped rx packets (bnc#1012382).\n\n - tcp: use an RB tree for ooo receive queue (bnc#1012382).\n\n - team: Forbid enslaving team device to itself (bnc#1012382).\n\n - thermal: of-thermal: disable passive polling when thermal zone is disabled (bnc#1012382).\n\n - tools/vm/page-types.c: fix 'defined but not used' warning (bnc#1012382).\n\n - tools/vm/slabinfo.c: fix sign-compare warning (bnc#1012382).\n\n - tpm: Restore functionality to xen vtpm driver (bsc#1020645, git-fixes).\n\n - tsl2550: fix lux1_input error in low light (bnc#1012382).\n\n - ubifs: Check for name being NULL while mounting (bnc#1012382).\n\n - ucma: fix a use-after-free in ucma_resolve_ip() (bnc#1012382).\n\n - USB: fix error handling in usb_driver_claim_interface() (bnc#1012382).\n\n - usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bnc#1012382).\n\n - usb: gadget: serial: fix oops when data rx'd after close (bnc#1012382).\n\n - USB: handle NULL config in usb_find_alt_setting() (bnc#1012382).\n\n - USB: remove LPM management from usb_driver_claim_interface() (bnc#1012382).\n\n - USB: serial: kobil_sct: fix modem-status error handling (bnc#1012382).\n\n - USB: serial: simple: add Motorola Tetra MTP6550 id (bnc#1012382).\n\n - USB: usbdevfs: restore warning for nonsensical flags (bnc#1012382).\n\n - USB: usbdevfs: sanitize flags more (bnc#1012382).\n\n - usb: wusbcore: security: cast sizeof to int for comparison (bnc#1012382).\n\n - USB: yurex: Check for truncation in yurex_read() (bnc#1012382).\n\n - Use make --output-sync feature when available (bsc#1012422). The mesages in make output can interleave making it impossible to extract warnings reliably. Since version 4 GNU Make supports --output-sync flag that prints output of each sub-command atomically preventing this issue. Detect the flag and use it if available.\n SLE11 has make 3.81 so it is required to include make 4 in the kernel OBS projects to take advantege of this.\n\n - Use upstream version of pci-hyperv change 35a88a18d7\n\n - uwb: hwa-rc: fix memory leak at probe (bnc#1012382).\n\n - vmci: type promotion bug in qp_host_get_user_memory() (bnc#1012382).\n\n - wlcore: Add missing PM call for wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).\n\n - wlcore: Fix memory leak in wlcore_cmd_wait_for_event_or_timeout (git-fixes).\n\n - x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV (kabi).\n\n - x86/entry/64: Add two more instruction suffixes (bnc#1012382).\n\n - x86/entry/64: Clear registers for exceptions/interrupts, to reduce speculation attack surface (bsc#1105931).\n\n - x86/entry/64: sanitize extra registers on syscall entry (bsc#1105931).\n\n - x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).\n\n - x86/fpu: Remove second definition of fpu in\n __fpu__restore_sig() (bsc#1110006).\n\n - x86/fpu: Remove struct fpu::counter (bnc#1012382).\n\n - x86/fpu: Remove use_eager_fpu() (bnc#1012382).\n\n - x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n\n - x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114648).\n\n - x86/numa_emulation: Fix emulated-to-physical node mapping (bnc#1012382).\n\n - x86/paravirt: Fix some warning messages (bnc#1065600).\n\n - x86/percpu: Fix this_cpu_read() (bsc#1110006).\n\n - x86,sched: Allow topologies where NUMA nodes share an LLC (bsc#1091158, bsc#1101555).\n\n - x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913, bsc#1111516).\n\n - x86/speculation: Apply IBPB more strictly to avoid cross-process data leak (bsc#1106913).\n\n - x86/speculation: Enable cross-hyperthread spectre v2 STIBP mitigation (bsc#1106913).\n\n - x86/speculation: Propagate information about RSB filling mitigation to sysfs (bsc#1106913).\n\n - x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n\n - x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).\n\n - xen: avoid crash in disable_hotplug_cpu (bnc#1012382 bsc#1106594 bsc#1042422).\n\n - xen: fix GCC warning and remove duplicate EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).\n\n - xen/manage: do not complain about an empty value in control/sysrq node (bnc#1012382).\n\n - xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bnc#1012382).\n\n - xhci: Do not print a warning when setting link state for disabled ports (bnc#1012382).\n\n - rpm/kernel-binary.spec.in: Add missing export BRP_SIGN_FILES (bsc#1115587) The export line was accidentally dropped at merging scripts branch, which resulted in the invalid module signature.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-11-21T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2018-1427)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-18690", "CVE-2018-18710", "CVE-2018-9516"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-docs-pdf", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "cpe:/o:novell:opensuse:42.3"], "id": "OPENSUSE-2018-1427.NASL", "href": "https://www.tenable.com/plugins/nessus/119077", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2018-1427.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(119077);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2018-10940\", \"CVE-2018-16658\", \"CVE-2018-18281\", \"CVE-2018-18386\", \"CVE-2018-18690\", \"CVE-2018-18710\", \"CVE-2018-9516\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2018-1427)\");\n script_summary(english:\"Check for the openSUSE-2018-1427 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE Leap 42.3 kernel was updated to 4.4.162 to receive\nvarious security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-18281: The mremap() syscall performs TLB\n flushes after dropping pagetable locks. If a syscall\n such as ftruncate() removes entries from the pagetables\n of a task that is in the middle of mremap(), a stale TLB\n entry can remain for a short time that permits access to\n a physical page after it has been released back to the\n page allocator and reused. (bnc#1113769).\n\n - CVE-2018-18710: An information leak in\n cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could\n be used by local attackers to read kernel memory because\n a cast from unsigned long to int interferes with bounds\n checking. This is similar to CVE-2018-10940 and\n CVE-2018-16658 (bnc#1113751).\n\n - CVE-2018-18690: A local attacker able to set attributes\n on an xfs filesystem could make this filesystem\n non-operational until the next mount by triggering an\n unchecked error condition during an xfs attribute\n change, because xfs_attr_shortform_addname in\n fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE\n operations with conversion of an attr from short to long\n form (bnc#1105025).\n\n - CVE-2018-18386: drivers/tty/n_tty.c allowed local\n attackers (who are able to access pseudo terminals) to\n hang/block further usage of any pseudo terminal devices\n due to an EXTPROC versus ICANON confusion in TIOCINQ\n (bnc#1094825).\n\n - CVE-2018-9516: A lack of certain checks in the\n hid_debug_events_read() function in the\n drivers/hid/hid-debug.c file might have resulted in\n receiving userspace buffer overflow and an out-of-bounds\n write or to the infinite loop. (bnc#1108498).\n\nThe following non-security bugs were fixed :\n\n - 6lowpan: iphc: reset mac_header after decompress to fix\n panic (bnc#1012382).\n\n - Add azure kernel description.\n\n - Add bug reference to\n patches.suse/x86-entry-64-use-a-per-cpu-trampoline-stack\n -fix1.patch\n\n - Add graphviz to buildreq for image conversion\n\n - Add reference to bsc#1104124 to\n patches.fixes/fs-aio-fix-the-increment-of-aio-nr-and-cou\n nting-agai.patch\n\n - ALSA: hda: Add AZX_DCAPS_PM_RUNTIME for AMD Raven Ridge\n (bnc#1012382).\n\n - ALSA: hda/realtek - Cannot adjust speaker's volume on\n Dell XPS 27 7760 (bnc#1012382).\n\n - apparmor: remove no-op permission check in policy_unpack\n (git-fixes).\n\n - ARC: build: Get rid of toolchain check (bnc#1012382).\n\n - ARC: clone syscall to setp r25 as thread pointer\n (bnc#1012382).\n\n - arch/hexagon: fix kernel/dma.c build warning\n (bnc#1012382).\n\n - arch-symbols: use bash as interpreter since the script\n uses bashism.\n\n - arm64: cpufeature: Track 32bit EL0 support\n (bnc#1012382).\n\n - arm64: jump_label.h: use asm_volatile_goto macro instead\n of 'asm goto' (bnc#1012382).\n\n - arm64: KVM: Sanitize PSTATE.M when being set from\n userspace (bnc#1012382).\n\n - arm64: KVM: Tighten guest core register access from\n userspace (bnc#1012382).\n\n - ARM: dts: at91: add new compatibility string for macb on\n sama5d3 (bnc#1012382).\n\n - ARM: dts: dra7: fix DCAN node addresses (bnc#1012382).\n\n - ARM: mvebu: declare asm symbols as character arrays in\n pmsu.c (bnc#1012382).\n\n - ASoC: dapm: Fix potential DAI widget pointer deref when\n linking DAIs (bnc#1012382).\n\n - ASoC: sigmadsp: safeload should not have lower byte\n limit (bnc#1012382).\n\n - ASoC: wm8804: Add ACPI support (bnc#1012382).\n\n - ath10k: fix scan crash due to incorrect length\n calculation (bnc#1012382).\n\n - ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait\n (bnc#1012382).\n\n - ath10k: protect ath10k_htt_rx_ring_free with\n rx_ring.lock (bnc#1012382).\n\n - Bluetooth: Add a new Realtek 8723DE ID 0bda:b009\n (bnc#1012382).\n\n - bnxt_en: Fix TX timeout during netpoll (bnc#1012382).\n\n - bonding: avoid possible dead-lock (bnc#1012382).\n\n - bpf: fix cb access in socket filter programs on tail\n calls (bsc#1012382).\n\n - bpf: fix map not being uncharged during map creation\n failure (bsc#1012382).\n\n - bpf, s390: fix potential memleak when later bpf_jit_prog\n fails (git-fixes).\n\n - bpf, s390x: do not reload skb pointers in non-skb\n context (git-fixes).\n\n - bsc#1106913: Replace with upstream variants Delete\n patches.suse/11-x86-mm-only-set-ibpb-when-the-new-thread\n -cannot-ptrace-current-thread.patch.\n\n - bs-upload-kernel: do not set %opensuse_bs Since SLE15 it\n is not set in the distribution project so do not set it\n for kernel projects either.\n\n - btrfs: add a comp_refs() helper (dependency for\n bsc#1031392).\n\n - btrfs: add missing initialization in btrfs_check_shared\n (Git-fixes bsc#1112262).\n\n - btrfs: add tracepoints for outstanding extents mods\n (dependency for bsc#1031392).\n\n - btrfs: add wrapper for counting BTRFS_MAX_EXTENT_SIZE\n (dependency for bsc#1031392).\n\n - btrfs: cleanup extent locking sequence (dependency for\n bsc#1031392).\n\n - btrfs: defrag: use btrfs_mod_outstanding_extents in\n cluster_pages_for_defrag (Follow up fixes for\n bsc#1031392).\n\n - btrfs: delayed-inode: Remove wrong qgroup meta\n reservation calls (bsc#1031392).\n\n - btrfs: delayed-inode: Use new qgroup meta rsv for\n delayed inode and item (bsc#1031392).\n\n - btrfs: Enhance btrfs_trim_fs function to handle error\n better (Dependency for bsc#1113667).\n\n - btrfs: Ensure btrfs_trim_fs can trim the whole\n filesystem (bsc#1113667).\n\n - btrfs: fix error handling in btrfs_dev_replace_start\n (bsc#1107535).\n\n - Btrfs: fix invalid attempt to free reserved space on\n failure to cow range (dependency for bsc#1031392).\n\n - btrfs: fix missing error return in btrfs_drop_snapshot\n (Git-fixes bsc#1109919).\n\n - btrfs: Fix race condition between delayed refs and\n blockgroup removal (Git-fixes bsc#1112263).\n\n - btrfs: Fix wrong btrfs_delalloc_release_extents\n parameter (bsc#1031392).\n\n - Btrfs: kill trans in run_delalloc_nocow and\n btrfs_cross_ref_exist (dependency for bsc#1031392).\n\n - btrfs: make the delalloc block rsv per inode (dependency\n for bsc#1031392).\n\n - Btrfs: pass delayed_refs directly to\n btrfs_find_delayed_ref_head (dependency for\n bsc#1031392).\n\n - btrfs: qgroup: Add quick exit for non-fs extents\n (dependency for bsc#1031392).\n\n - btrfs: qgroup: Cleanup\n btrfs_qgroup_prepare_account_extents function\n (dependency for bsc#1031392).\n\n - btrfs: qgroup: Cleanup the remaining old reservation\n counters (bsc#1031392).\n\n - btrfs: qgroup: Commit transaction in advance to reduce\n early EDQUOT (bsc#1031392).\n\n - btrfs: qgroup: Do not use root->qgroup_meta_rsv for\n qgroup (bsc#1031392).\n\n - btrfs: qgroup: Fix wrong qgroup reservation update for\n relationship modification (bsc#1031392).\n\n - btrfs: qgroup: Introduce function to convert\n META_PREALLOC into META_PERTRANS (bsc#1031392).\n\n - btrfs: qgroup: Introduce helpers to update and access\n new qgroup rsv (bsc#1031392).\n\n - btrfs: qgroup: Make qgroup_reserve and its callers to\n use separate reservation type (bsc#1031392).\n\n - btrfs: qgroup: Skeleton to support separate qgroup\n reservation type (bsc#1031392).\n\n - btrfs: qgroups: opencode qgroup_free helper (dependency\n for bsc#1031392).\n\n - btrfs: qgroup: Split meta rsv type into meta_prealloc\n and meta_pertrans (bsc#1031392).\n\n - btrfs: qgroup: Update trace events for metadata\n reservation (bsc#1031392).\n\n - btrfs: qgroup: Update trace events to use new separate\n rsv types (bsc#1031392).\n\n - btrfs: qgroup: Use independent and accurate per inode\n qgroup rsv (bsc#1031392).\n\n - btrfs: qgroup: Use root::qgroup_meta_rsv_* to record\n qgroup meta reserved space (bsc#1031392).\n\n - btrfs: qgroup: Use separate meta reservation type for\n delalloc (bsc#1031392).\n\n - btrfs: remove type argument from comp_tree_refs\n (dependency for bsc#1031392).\n\n - Btrfs: rework outstanding_extents (dependency for\n bsc#1031392).\n\n - btrfs: switch args for comp_*_refs (dependency for\n bsc#1031392).\n\n - btrfs: Take trans lock before access running trans in\n check_delayed_ref (Follow up fixes for bsc#1031392).\n\n - ceph: avoid a use-after-free in ceph_destroy_options()\n (bsc#1112007).\n\n - cfg80211: fix a type issue in\n ieee80211_chandef_to_operating_class() (bnc#1012382).\n\n - cfg80211: nl80211_update_ft_ies() to validate\n NL80211_ATTR_IE (bnc#1012382).\n\n - cgroup: Fix deadlock in cpu hotplug path (bnc#1012382).\n\n - cgroup, netclassid: add a preemption point to\n write_classid (bnc#1098996).\n\n - CIFS: check for STATUS_USER_SESSION_DELETED\n (bsc#1112902).\n\n - cifs: connect to servername instead of IP for IPC$ share\n (bsc#1106359).\n\n - cifs: fix memory leak in SMB2_open() (bsc#1112894).\n\n - cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n\n - cifs: read overflow in is_valid_oplock_break()\n (bnc#1012382).\n\n - clocksource/drivers/ti-32k: Add\n CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs\n (bnc#1012382).\n\n - config.sh: set BUGZILLA_PRODUCT for SLE12-SP3\n\n - crypto: mxs-dcp - Fix wait logic on chan threads\n (bnc#1012382).\n\n - crypto: skcipher - Fix -Wstringop-truncation warnings\n (bnc#1012382).\n\n - Define dependencies of in-kernel KMPs statically This\n allows us to use rpm's internal dependency generator\n (bsc#981083).\n\n - dm cache: fix resize crash if user does not reload cache\n table (bnc#1012382).\n\n - dm thin metadata: fix __udivdi3 undefined on 32-bit\n (bnc#1012382).\n\n - dm thin metadata: try to avoid ever aborting\n transactions (bnc#1012382).\n\n - Do not ship firmware (bsc#1054239). Pull firmware from\n kernel-firmware instead.\n\n - drivers/tty: add error handling for pcmcia_loop_config\n (bnc#1012382).\n\n - drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7\n (bnc#1012382).\n\n - drm/nouveau/TBDdevinit: do not fail when PMU/PRE_OS is\n missing from VBIOS (bnc#1012382).\n\n - drm/virtio: fix bounds check in\n virtio_gpu_cmd_get_capset() (bsc#1106929)\n\n - Drop dtb-source.spec and move the sources to\n kernel-source (bsc#1011920)\n\n - Drop multiversion(kernel) from the KMP template ()\n\n - e1000: check on netif_running() before calling\n e1000_up() (bnc#1012382).\n\n - e1000: ensure to free old tx/rx rings in set_ringparam()\n (bnc#1012382).\n\n - ebtables: arpreply: Add the standard target sanity check\n (bnc#1012382).\n\n - EDAC, thunderx: Fix memory leak in\n thunderx_l2c_threaded_isr() (bsc#1114648).\n\n - Enable kernel-obs-(build,qa) also in the vanilla\n branches\n\n - ethtool: restore erroneously removed break in\n dev_ethtool (bsc#1114229).\n\n - fbdev: fix broken menu dependencies (bsc#1106929)\n\n - fbdev/omapfb: fix omapfb_memory_read infoleak\n (bnc#1012382).\n\n - Fix file list to remove REPORTING-BUGS\n\n - Fix html and pdf creation in Documetation/media/*\n\n - floppy: Do not copy a kernel pointer to user memory in\n FDGETPRM ioctl (bnc#1012382).\n\n - fs/cifs: do not translate SFM_SLASH (U+F026) to\n backslash (bnc#1012382).\n\n - fs/cifs: suppress a string overflow warning\n (bnc#1012382).\n\n - gpio: adp5588: Fix sleep-in-atomic-context bug\n (bnc#1012382).\n\n - hexagon: modify ffs() and fls() to return int\n (bnc#1012382).\n\n - HID: hid-ntrig: add error handling for\n sysfs_create_group (bnc#1012382).\n\n - housekeeping: btrfs selftests: fold backport fix into\n backport patch\n\n - housekeeping: move btrfs patches to sorted section. No\n code changes.\n\n - hv: avoid crash in vmbus sysfs files (bnc#1108377).\n\n - hwmon: (adt7475) Make adt7475_read_word() return errors\n (bnc#1012382).\n\n - hwmon: (ina2xx) fix sysfs shunt resistor read access\n (bnc#1012382).\n\n - hwrng: core - document the quality field (git-fixes).\n\n - i2c: i2c-scmi: fix for i2c_smbus_write_block_data\n (bnc#1012382).\n\n - i2c: i801: Allow ACPI AML access I/O ports not reserved\n for SMBus (bnc#1012382).\n\n - i2c: uniphier-f: issue STOP only for last message or\n I2C_M_STOP (bnc#1012382).\n\n - i2c: uniphier: issue STOP only for last message or\n I2C_M_STOP (bnc#1012382).\n\n - IB/srp: Avoid that sg_reset -d $(srp_device) triggers an\n infinite loop (bnc#1012382).\n\n - Input: atakbd - fix Atari CapsLock behaviour\n (bnc#1012382).\n\n - Input: atakbd - fix Atari keymap (bnc#1012382).\n\n - Input: elantech - enable middle button of touchpad on\n ThinkPad P72 (bnc#1012382).\n\n - ip6_tunnel: be careful when accessing the inner header\n (bnc#1012382).\n\n - ip_tunnel: be careful when accessing the inner header\n (bnc#1012382).\n\n - ipv4: fix use-after-free in ip_cmsg_recv_dstaddr()\n (bnc#1012382).\n\n - ixgbe: pci_set_drvdata must be called before\n register_netdev (Git-fixes bsc#1109923).\n\n - jffs2: return -ERANGE when xattr buffer is too small\n (bnc#1012382).\n\n - KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate\n function (bnc#1012382).\n\n - KVM: x86: remove eager_fpu field of struct kvm_vcpu_arch\n (bnc#1012382).\n\n - lib/test_hexdump.c: fix failure on big endian cpu\n (bsc#1106110).\n\n - mac80211: correct use of IEEE80211_VHT_CAP_RXSTBC_X\n (bnc#1012382).\n\n - mac80211: fix a race between restart and CSA flows\n (bnc#1012382).\n\n - mac80211: fix setting IEEE80211_KEY_FLAG_RX_MGMT for AP\n mode keys (bnc#1012382).\n\n - mac80211: Fix station bandwidth setting after channel\n switch (bnc#1012382).\n\n - mac80211_hwsim: correct use of\n IEEE80211_VHT_CAP_RXSTBC_X (bnc#1012382).\n\n - mac80211: mesh: fix HWMP sequence numbering to follow\n standard (bnc#1012382).\n\n - mac80211: shorten the IBSS debug messages (bnc#1012382).\n\n - mach64: detect the dot clock divider correctly on sparc\n (bnc#1012382).\n\n - md-cluster: clear another node's suspend_area after the\n copy is finished (bnc#1012382).\n\n - media: af9035: prevent buffer overflow on write\n (bnc#1012382).\n\n - media: exynos4-is: Prevent NULL pointer dereference in\n __isp_video_try_fmt() (bnc#1012382).\n\n - media: fsl-viu: fix error handling in viu_of_probe()\n (bnc#1012382).\n\n - media: omap3isp: zero-initialize the isp cam_xclk(a,b)\n initial data (bnc#1012382).\n\n - media: omap_vout: Fix a possible NULL pointer\n dereference in omap_vout_open() (bsc#1050431).\n\n - media: s3c-camif: ignore -ENOIOCTLCMD from\n v4l2_subdev_call for s_power (bnc#1012382).\n\n - media: soc_camera: ov772x: correct setting of banding\n filter (bnc#1012382).\n\n - media: tm6000: add error handling for\n dvb_register_adapter (bnc#1012382).\n\n - media: uvcvideo: Support realtek's UVC 1.5 device\n (bnc#1012382).\n\n - media: v4l: event: Prevent freeing event subscriptions\n while accessed (bnc#1012382).\n\n - media: videobuf-dma-sg: Fix dma_(sync,unmap)_sg() calls\n (bsc#1050431).\n\n - memory_hotplug: cond_resched in __remove_pages\n (bnc#1114178).\n\n - mfd: omap-usb-host: Fix dts probe of children\n (bnc#1012382).\n\n - mm: madvise(MADV_DODUMP): allow hugetlbfs pages\n (bnc#1012382).\n\n - mm: /proc/pid/pagemap: hide swap entries from\n unprivileged users (Git-fixes bsc#1109907).\n\n - mm/vmstat.c: fix outdated vmstat_text (bnc#1012382).\n\n - mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly\n (bnc#1012382).\n\n - mm/vmstat.c: skip NR_TLB_REMOTE_FLUSH* properly (git\n fixes).\n\n - module: exclude SHN_UNDEF symbols from kallsyms api\n (bnc#1012382).\n\n - move changes without Git-commit out of sorted section\n\n - net: cadence: Fix a sleep-in-atomic-context bug in\n macb_halt_tx() (bnc#1012382).\n\n - net: hns: fix length and page_offset overflow when\n CONFIG_ARM64_64K_PAGES (bnc#1012382).\n\n - net: ipv4: update fnhe_pmtu when first hop's MTU changes\n (bnc#1012382).\n\n - net/ipv6: Display all addresses in output of\n /proc/net/if_inet6 (bnc#1012382).\n\n - netlabel: check for IPV4MASK in addrinfo_get\n (bnc#1012382).\n\n - net: macb: disable scatter-gather for macb on sama5d3\n (bnc#1012382).\n\n - net/mlx4: Use cpumask_available for eq->affinity_mask\n (bnc#1012382).\n\n - net: mvpp2: Extract the correct ethtype from the skb for\n tx csum offload (bnc#1012382).\n\n - net: systemport: Fix wake-up interrupt race during\n resume (bnc#1012382).\n\n - net/usb: cancel pending work when unbinding smsc75xx\n (bnc#1012382).\n\n - NFS: add nostatflush mount option (bsc#1065726).\n\n - NFS: Avoid quadratic search when freeing delegations\n (bsc#1084760).\n\n - nfsd: fix corrupted reply to badly ordered compound\n (bnc#1012382).\n\n - ocfs2: fix locking for res->tracking and\n dlm->tracking_list (bnc#1012382).\n\n - of: unittest: Disable interrupt node tests for old world\n MAC systems (bnc#1012382).\n\n - ovl: Copy inode attributes after setting xattr\n (bsc#1107299).\n\n - Pass x86 as architecture on x86_64 and i386\n (bsc#1093118).\n\n - PCI: hv: Use effective affinity mask (bsc#1109772).\n\n - PCI: Reprogram bridge prefetch registers on resume\n (bnc#1012382).\n\n - perf probe powerpc: Ignore SyS symbols irrespective of\n endianness (bnc#1012382).\n\n - perf script python: Fix export-to-postgresql.py\n occasional failure (bnc#1012382).\n\n - PM / core: Clear the direct_complete flag on errors\n (bnc#1012382).\n\n - powerpc/kdump: Handle crashkernel memory reservation\n failure (bnc#1012382).\n\n - powerpc/numa: Skip onlining a offline node in kdump path\n (bsc#1109784).\n\n - powerpc/perf/hv-24x7: Fix passing of catalog version\n number (bsc#1053043).\n\n - powerpc/pseries: Fix build break for SPLPAR=n and CPU\n hotplug (bsc#1079524, git-fixes).\n\n - powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906,\n git-fixes).\n\n - powerpc/pseries/mm: call H_BLOCK_REMOVE (bsc#1109158).\n\n - powerpc/pseries/mm: factorize PTE slot computation\n (bsc#1109158).\n\n - powerpc/pseries/mm: Introducing FW_FEATURE_BLOCK_REMOVE\n (bsc#1109158).\n\n - powerpc/rtas: Fix a potential race between CPU-Offline &\n Migration (bsc#1111870).\n\n - power: vexpress: fix corruption in notifier registration\n (bnc#1012382).\n\n - proc: restrict kernel stack dumps to root (bnc#1012382).\n\n - qlcnic: fix Tx descriptor corruption on 82xx devices\n (bnc#1012382).\n\n - r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing\n RTL_FLAG_TASK_ENABLED (bnc#1012382).\n\n - RAID10 BUG_ON in raise_barrier when force is true and\n conf->barrier is 0 (bnc#1012382).\n\n - rculist: add list_for_each_entry_from_rcu()\n (bsc#1084760).\n\n - rculist: Improve documentation for\n list_for_each_entry_from_rcu() (bsc#1084760).\n\n - RDMA/ucma: check fd type in ucma_migrate_id()\n (bnc#1012382).\n\n - README: Clean-up trailing whitespace\n\n - reiserfs: add check to detect corrupted directory entry\n (bsc#1109818).\n\n - reiserfs: do not panic on bad directory entries\n (bsc#1109818).\n\n - resource: Include resource end in walk_*() interfaces\n (bsc#1114648).\n\n - Revert 'btrfs: qgroups: Retry after commit on getting\n EDQUOT' (bsc#1031392).\n\n - Revert 'drm: Do not pass negative delta to\n ktime_sub_ns()' (bsc#1106929)\n\n - Revert 'drm/i915: Initialize HWS page address after GPU\n reset' (bsc#1106929)\n\n - Revert 'KVM: x86: remove eager_fpu field of struct\n kvm_vcpu_arch' (kabi).\n\n - Revert 'media: v4l: event: Prevent freeing event\n subscriptions while accessed' (kabi).\n\n - Revert 'proc: restrict kernel stack dumps to root'\n (kabi).\n\n - Revert 'rpm/constraints.in: Lower default disk space\n requirement from 25G to 24G' This reverts commit\n 406abda1467c038842febffe264faae1fa2e3c1d. ok, did not\n wait long enough to see the failure.\n\n - Revert 'Skip intel_crt_init for Dell XPS 8700'\n (bsc#1106929)\n\n - Revert 'tcp: add tcp_ooo_try_coalesce() helper' (kabi).\n\n - Revert 'tcp: call tcp_drop() from tcp_data_queue_ofo()'\n (kabi).\n\n - Revert 'tcp: fix a stale ooo_last_skb after a replace'\n (kabi).\n\n - Revert 'tcp: free batches of packets in\n tcp_prune_ofo_queue()' (kabi).\n\n - Revert 'tcp: use an RB tree for ooo receive queue'\n (kabi).\n\n - Revert 'usb: cdc-wdm: Fix a sleep-in-atomic-context bug\n in service_outstanding_interrupt()' (bnc#1012382).\n\n - Revert 'x86/fpu: Finish excising 'eagerfpu'' (kabi).\n\n - Revert 'x86/fpu: Remove struct fpu::counter' (kabi).\n\n - Revert 'x86/fpu: Remove use_eager_fpu()' (kabi).\n\n - rndis_wlan: potential buffer overflow in\n rndis_wlan_auth_indication() (bnc#1012382).\n\n - rpm/apply-patches: Fix failure if there are no vanilla\n patches The grep command returns 1 if there are no\n patches and we are using pipefail.\n\n - rpm/constraints.in: build ARM on at least 2 cpus\n\n - rpm/constraints.in: Lower default disk space requirement\n from 25G to 24G 25G is rejected by the build service on\n ARM.\n\n - rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to\n 4096 (bnc#1012382).\n\n - s390/chsc: Add exception handler for CHSC instruction\n (git-fixes).\n\n - s390/extmem: fix gcc 8 stringop-overflow warning\n (bnc#1012382).\n\n - s390/kdump: Fix elfcorehdr size calculation (git-fixes).\n\n - s390/kdump: Make elfcorehdr size calculation ABI\n compliant (git-fixes).\n\n - s390/mm: correct allocate_pgste proc_handler callback\n (git-fixes).\n\n - s390/qeth: do not dump past end of unknown HW header\n (bnc#1012382).\n\n - s390/qeth: handle failure on workqueue creation\n (git-fixes).\n\n - s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n\n - s390/stacktrace: fix address ranges for asynchronous and\n panic stack (git-fixes).\n\n - scsi: bnx2i: add error handling for ioremap_nocache\n (bnc#1012382).\n\n - scsi: ibmvscsi: Improve strings handling (bnc#1012382).\n\n - scsi: klist: Make it safe to use klists in atomic\n context (bnc#1012382).\n\n - scsi: target/iscsi: Make iscsit_ta_authentication()\n respect the output buffer size (bnc#1012382).\n\n - selftests/efivarfs: add required kernel configs\n (bnc#1012382).\n\n - serial: cpm_uart: return immediately from console poll\n (bnc#1012382).\n\n - serial: imx: restore handshaking irq for imx1\n (bnc#1012382).\n\n - signal: Properly deliver SIGSEGV from x86 uprobes\n (bsc#1110006).\n\n - slub: make ->cpu_partial unsigned int (bnc#1012382).\n\n - smb2: fix missing files in root share directory listing\n (bnc#1012382).\n\n - smb3: fill in statfs fsid and correct namelen\n (bsc#1112905).\n\n - sound: enable interrupt after dma buffer initialization\n (bnc#1012382).\n\n - spi: rspi: Fix interrupted DMA transfers (bnc#1012382).\n\n - spi: rspi: Fix invalid SPI use during system suspend\n (bnc#1012382).\n\n - spi: sh-msiof: Fix handling of write value for SISTR\n register (bnc#1012382).\n\n - spi: sh-msiof: Fix invalid SPI use during system suspend\n (bnc#1012382).\n\n - spi: tegra20-slink: explicitly enable/disable clock\n (bnc#1012382).\n\n - staging: android: ashmem: Fix mmap size validation\n (bnc#1012382).\n\n - staging: rts5208: fix missing error check on call to\n rtsx_write_register (bnc#1012382).\n\n - stmmac: fix valid numbers of unicast filter entries\n (bnc#1012382).\n\n - target: log Data-Out timeouts as errors (bsc#1095805).\n\n - target: log NOP ping timeouts as errors (bsc#1095805).\n\n - target: split out helper for cxn timeout error stashing\n (bsc#1095805).\n\n - target: stash sess_err_stats on Data-Out timeout\n (bsc#1095805).\n\n - target: use ISCSI_IQN_LEN in iscsi_target_stat\n (bsc#1095805).\n\n - tcp: add tcp_ooo_try_coalesce() helper (bnc#1012382).\n\n - tcp: call tcp_drop() from tcp_data_queue_ofo()\n (bnc#1012382).\n\n - tcp: fix a stale ooo_last_skb after a replace\n (bnc#1012382).\n\n - tcp: free batches of packets in tcp_prune_ofo_queue()\n (bnc#1012382).\n\n - tcp: increment sk_drops for dropped rx packets\n (bnc#1012382).\n\n - tcp: use an RB tree for ooo receive queue (bnc#1012382).\n\n - team: Forbid enslaving team device to itself\n (bnc#1012382).\n\n - thermal: of-thermal: disable passive polling when\n thermal zone is disabled (bnc#1012382).\n\n - tools/vm/page-types.c: fix 'defined but not used'\n warning (bnc#1012382).\n\n - tools/vm/slabinfo.c: fix sign-compare warning\n (bnc#1012382).\n\n - tpm: Restore functionality to xen vtpm driver\n (bsc#1020645, git-fixes).\n\n - tsl2550: fix lux1_input error in low light\n (bnc#1012382).\n\n - ubifs: Check for name being NULL while mounting\n (bnc#1012382).\n\n - ucma: fix a use-after-free in ucma_resolve_ip()\n (bnc#1012382).\n\n - USB: fix error handling in usb_driver_claim_interface()\n (bnc#1012382).\n\n - usb: gadget: fotg210-udc: Fix memory leak of\n fotg210->ep[i] (bnc#1012382).\n\n - usb: gadget: serial: fix oops when data rx'd after close\n (bnc#1012382).\n\n - USB: handle NULL config in usb_find_alt_setting()\n (bnc#1012382).\n\n - USB: remove LPM management from\n usb_driver_claim_interface() (bnc#1012382).\n\n - USB: serial: kobil_sct: fix modem-status error handling\n (bnc#1012382).\n\n - USB: serial: simple: add Motorola Tetra MTP6550 id\n (bnc#1012382).\n\n - USB: usbdevfs: restore warning for nonsensical flags\n (bnc#1012382).\n\n - USB: usbdevfs: sanitize flags more (bnc#1012382).\n\n - usb: wusbcore: security: cast sizeof to int for\n comparison (bnc#1012382).\n\n - USB: yurex: Check for truncation in yurex_read()\n (bnc#1012382).\n\n - Use make --output-sync feature when available\n (bsc#1012422). The mesages in make output can interleave\n making it impossible to extract warnings reliably. Since\n version 4 GNU Make supports --output-sync flag that\n prints output of each sub-command atomically preventing\n this issue. Detect the flag and use it if available.\n SLE11 has make 3.81 so it is required to include make 4\n in the kernel OBS projects to take advantege of this.\n\n - Use upstream version of pci-hyperv change 35a88a18d7\n\n - uwb: hwa-rc: fix memory leak at probe (bnc#1012382).\n\n - vmci: type promotion bug in qp_host_get_user_memory()\n (bnc#1012382).\n\n - wlcore: Add missing PM call for\n wlcore_cmd_wait_for_event_or_timeout() (bnc#1012382).\n\n - wlcore: Fix memory leak in\n wlcore_cmd_wait_for_event_or_timeout (git-fixes).\n\n - x86/cpufeature: deduplicate X86_FEATURE_L1TF_PTEINV\n (kabi).\n\n - x86/entry/64: Add two more instruction suffixes\n (bnc#1012382).\n\n - x86/entry/64: Clear registers for exceptions/interrupts,\n to reduce speculation attack surface (bsc#1105931).\n\n - x86/entry/64: sanitize extra registers on syscall entry\n (bsc#1105931).\n\n - x86/fpu: Finish excising 'eagerfpu' (bnc#1012382).\n\n - x86/fpu: Remove second definition of fpu in\n __fpu__restore_sig() (bsc#1110006).\n\n - x86/fpu: Remove struct fpu::counter (bnc#1012382).\n\n - x86/fpu: Remove use_eager_fpu() (bnc#1012382).\n\n - x86/irq: implement\n irq_data_get_effective_affinity_mask() for v4.12\n (bsc#1109772).\n\n - x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error\n (bsc#1114648).\n\n - x86/numa_emulation: Fix emulated-to-physical node\n mapping (bnc#1012382).\n\n - x86/paravirt: Fix some warning messages (bnc#1065600).\n\n - x86/percpu: Fix this_cpu_read() (bsc#1110006).\n\n - x86,sched: Allow topologies where NUMA nodes share an\n LLC (bsc#1091158, bsc#1101555).\n\n - x86/spec_ctrl: Fix spec_ctrl reporting (bsc#1106913,\n bsc#1111516).\n\n - x86/speculation: Apply IBPB more strictly to avoid\n cross-process data leak (bsc#1106913).\n\n - x86/speculation: Enable cross-hyperthread spectre v2\n STIBP mitigation (bsc#1106913).\n\n - x86/speculation: Propagate information about RSB filling\n mitigation to sysfs (bsc#1106913).\n\n - x86/time: Correct the attribute on jiffies' definition\n (bsc#1110006).\n\n - x86/tsc: Add missing header to tsc_msr.c (bnc#1012382).\n\n - xen: avoid crash in disable_hotplug_cpu (bnc#1012382\n bsc#1106594 bsc#1042422).\n\n - xen: fix GCC warning and remove duplicate\n EVTCHN_ROW/EVTCHN_COL usage (bnc#1012382).\n\n - xen/manage: do not complain about an empty value in\n control/sysrq node (bnc#1012382).\n\n - xhci: Add missing CAS workaround for Intel Sunrise Point\n xHCI (bnc#1012382).\n\n - xhci: Do not print a warning when setting link state for\n disabled ports (bnc#1012382).\n\n - rpm/kernel-binary.spec.in: Add missing export\n BRP_SIGN_FILES (bsc#1115587) The export line was\n accidentally dropped at merging scripts branch, which\n resulted in the invalid module signature.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1011920\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1012382\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1012422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1020645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1031392\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1035053\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1042422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1043591\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1048129\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1050431\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1053043\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1054239\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1057199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1062303\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065726\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1067906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1073579\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1076393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1078788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1079524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083215\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083527\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1084760\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1091158\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1093118\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1094825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1095805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1098050\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1098996\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1101555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1105025\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1105931\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106110\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106359\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106594\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106913\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106929\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1107060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1107299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1107535\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1107870\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1108377\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1108498\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109158\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109919\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109923\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1110006\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111516\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111870\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112007\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112262\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112894\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112905\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114229\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1114648\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1115587\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=981083\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=997172\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-pdf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:42.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE42\\.3)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"42.3\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-base-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-base-debuginfo-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-debuginfo-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-debugsource-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-devel-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-debug-devel-debuginfo-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-base-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-base-debuginfo-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-debuginfo-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-debugsource-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-default-devel-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-devel-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-docs-html-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-docs-pdf-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-macros-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-obs-build-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-obs-build-debugsource-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-obs-qa-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-source-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-source-vanilla-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-syms-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-base-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-base-debuginfo-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-debuginfo-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-debugsource-4.4.162-78.1\") ) flag++;\nif ( rpm_check(release:\"SUSE42.3\", reference:\"kernel-vanilla-devel-4.4.162-78.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-devel / kernel-macros / kernel-source / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-01T16:45:30", "description": "The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.162 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack-based buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\nCVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n\nCVE-2018-18710: An issue was discovered in the Linux kernel An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\nCVE-2018-9516: A lack of certain checks in the hid_debug_events_read() function in the drivers/hid/hid-debug.c file might have resulted in receiving userspace buffer overflow and an out-of-bounds write or to the infinite loop. (bnc#1108498).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-11-11T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:3689-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10940", "CVE-2018-14633", "CVE-2018-16658", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-18690", "CVE-2018-18710", "CVE-2018-9516"], "modified": "2022-05-31T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-extra", "p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:lttng-modules", "p-cpe:/a:novell:suse_linux:lttng-modules-debugsource", "p-cpe:/a:novell:suse_linux:lttng-modules-kmp-default", "p-cpe:/a:novell:suse_linux:lttng-modules-kmp-default-debuginfo", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2018-3689-1.NASL", "href": "https://www.tenable.com/plugins/nessus/118882", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2018:3689-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(118882);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/31\");\n\n script_cve_id(\"CVE-2018-10940\", \"CVE-2018-14633\", \"CVE-2018-16658\", \"CVE-2018-18281\", \"CVE-2018-18386\", \"CVE-2018-18690\", \"CVE-2018-18710\", \"CVE-2018-9516\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:3689-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.162 to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-14633: A security flaw was found in the\nchap_server_compute_md5() function in the ISCSI target code in a way\nan authentication request from an ISCSI initiator is processed. An\nunauthenticated remote attacker can cause a stack-based buffer\noverflow and smash up to 17 bytes of the stack. The attack requires\nthe iSCSI target to be enabled on the victim host. Depending on how\nthe target's code was built (i.e. depending on a compiler, compile\nflags and hardware architecture) an attack may lead to a system crash\nand thus to a denial-of-service or possibly to a non-authorized access\nto data exported by an iSCSI target. Due to the nature of the flaw,\nprivilege escalation cannot be fully ruled out, although we believe it\nis highly unlikely. (bnc#1107829).\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after\ndropping pagetable locks. If a syscall such as ftruncate() removes\nentries from the pagetables of a task that is in the middle of\nmremap(), a stale TLB entry can remain for a short time that permits\naccess to a physical page after it has been released back to the page\nallocator and reused. (bnc#1113769).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are\nable to access pseudo terminals) to hang/block further usage of any\npseudo terminal devices due to an EXTPROC versus ICANON confusion in\nTIOCINQ (bnc#1094825).\n\nCVE-2018-18690: A local attacker able to set attributes on an xfs\nfilesystem could make this filesystem non-operational until the next\nmount by triggering an unchecked error condition during an xfs\nattribute change, because xfs_attr_shortform_addname in\nfs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with\nconversion of an attr from short to long form (bnc#1105025).\n\nCVE-2018-18710: An issue was discovered in the Linux kernel An\ninformation leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c\ncould be used by local attackers to read kernel memory because a cast\nfrom unsigned long to int interferes with bounds checking. This is\nsimilar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\nCVE-2018-9516: A lack of certain checks in the hid_debug_events_read()\nfunction in the drivers/hid/hid-debug.c file might have resulted in\nreceiving userspace buffer overflow and an out-of-bounds write or to\nthe infinite loop. (bnc#1108498).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011920\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012382\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1020645\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1031392\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1035053\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042422\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1043591\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1048129\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050431\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050549\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1053043\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1054239\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1057199\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065726\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1067906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1073579\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1076393\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1078788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1079524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082519\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083215\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083527\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084760\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1089343\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1091158\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1093118\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1096052\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1098050\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1098996\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1099597\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1101555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103308\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103405\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105025\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105931\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106105\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106110\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106293\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106359\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106434\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106594\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106913\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106929\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107060\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107318\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107535\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107829\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107870\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108315\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108377\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108498\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109158\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109333\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109919\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109923\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110006\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110363\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110468\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110601\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110602\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110603\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110604\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110605\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110606\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110611\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110612\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110613\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110614\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110615\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110616\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110618\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110619\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111363\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111516\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111870\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112007\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112262\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112263\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112894\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112905\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114229\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114648\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=981083\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=997172\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-14633/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18281/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18690/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18710/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-9516/\"\n );\n # https://www.suse.com/support/update/announcement/2018/suse-su-20183689-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?e2148841\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12-SP3:zypper in -t patch\nSUSE-SLE-WE-12-SP3-2018-2621=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP3:zypper in -t\npatch SUSE-SLE-SDK-12-SP3-2018-2621=1\n\nSUSE Linux Enterprise Server 12-SP3:zypper in -t patch\nSUSE-SLE-SERVER-12-SP3-2018-2621=1\n\nSUSE Linux Enterprise High Availability 12-SP3:zypper in -t patch\nSUSE-SLE-HA-12-SP3-2018-2621=1\n\nSUSE Linux Enterprise Desktop 12-SP3:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP3-2018-2621=1\n\nSUSE CaaS Platform ALL :\n\nTo install this update, use the SUSE CaaS Platform Velum dashboard. It\nwill inform you if it detects new updates and let you then trigger\nupdating of the complete cluster in a controlled way.\n\nSUSE CaaS Platform 3.0 :\n\nTo install this update, use the SUSE CaaS Platform Velum dashboard. It\nwill inform you if it detects new updates and let you then trigger\nupdating of the complete cluster in a controlled way.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-14633\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:lttng-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:lttng-modules-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:lttng-modules-kmp-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:lttng-modules-kmp-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/09\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/11\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP3\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"lttng-modules-2.7.1-8.6.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"lttng-modules-debugsource-2.7.1-8.6.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"lttng-modules-kmp-default-2.7.1_k4.4.162_94.69-8.6.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"lttng-modules-kmp-default-debuginfo-2.7.1_k4.4.162_94.69-8.6.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-base-debuginfo-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debuginfo-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-debugsource-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-default-devel-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", reference:\"kernel-syms-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-default-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-default-debuginfo-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-default-debugsource-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-default-devel-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-default-extra-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-default-extra-debuginfo-4.4.162-94.69.2\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-syms-4.4.162-94.69.2\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 8.3, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:C"}}, {"lastseen": "2021-08-19T12:28:47", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking.(CVE-2018-16658)\n\n - In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form.(CVE-2018-18690)\n\n - A security flaw was found in the Linux kernel in drivers/tty/n_tty.c which allows local attackers (ones who are able to access pseudo terminals) to lock them up and block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ handler.(CVE-2018-18386)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}, "published": "2019-02-14T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-1027)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-16658", "CVE-2018-18386", "CVE-2018-18690"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-debuginfo", "p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-1027.NASL", "href": "https://www.tenable.com/plugins/nessus/122174", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(122174);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-16658\",\n \"CVE-2018-18386\",\n \"CVE-2018-18690\"\n );\n\n script_name(english:\"EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-1027)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - An issue was discovered in the Linux kernel before\n 4.18.6. An information leak in cdrom_ioctl_drive_status\n in drivers/cdrom/cdrom.c could be used by local\n attackers to read kernel memory because a cast from\n unsigned long to int interferes with bounds\n checking.(CVE-2018-16658)\n\n - In the Linux kernel before 4.17, a local attacker able\n to set attributes on an xfs filesystem could make this\n filesystem non-operational until the next mount by\n triggering an unchecked error condition during an xfs\n attribute change, because xfs_attr_shortform_addname in\n fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE\n operations with conversion of an attr from short to\n long form.(CVE-2018-18690)\n\n - A security flaw was found in the Linux kernel in\n drivers/tty/n_tty.c which allows local attackers (ones\n who are able to access pseudo terminals) to lock them\n up and block further usage of any pseudo terminal\n devices due to an EXTPROC versus ICANON confusion in\n TIOCINQ handler.(CVE-2018-18386)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1027\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1fdeb710\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-16658\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/02/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(3)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP3\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-514.44.5.10.h158\",\n \"kernel-debuginfo-3.10.0-514.44.5.10.h158\",\n \"kernel-debuginfo-common-x86_64-3.10.0-514.44.5.10.h158\",\n \"kernel-devel-3.10.0-514.44.5.10.h158\",\n \"kernel-headers-3.10.0-514.44.5.10.h158\",\n \"kernel-tools-3.10.0-514.44.5.10.h158\",\n \"kernel-tools-libs-3.10.0-514.44.5.10.h158\",\n \"perf-3.10.0-514.44.5.10.h158\",\n \"python-perf-3.10.0-514.44.5.10.h158\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"3\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 3.6, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2022-03-27T15:59:42", "description": "According to the version of the kernel packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerability :\n\n - An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.(CVE-2018-18710)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 5.5, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-11-21T00:00:00", "type": "nessus", "title": "EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2018-1373)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18710"], "modified": "2021-04-08T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:kernel-tools-libs-devel", "cpe:/o:huawei:euleros:uvp:2.5.2"], "id": "EULEROS_SA-2018-1373.NASL", "href": "https://www.tenable.com/plugins/nessus/119064", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(119064);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/04/08\");\n\n script_cve_id(\n \"CVE-2018-18710\"\n );\n\n script_name(english:\"EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2018-1373)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the kernel packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerability :\n\n - An issue was discovered in the Linux kernel through\n 4.19. An information leak in cdrom_ioctl_select_disc in\n drivers/cdrom/cdrom.c could be used by local attackers\n to read kernel memory because a cast from unsigned long\n to int interferes with bounds checking. This is similar\n to CVE-2018-10940 and CVE-2018-16658.(CVE-2018-18710)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2018-1373\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e4ffe70f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/21\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:2.5.2\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"2.5.2\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 2.5.2\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-514.44.5.10_104\",\n \"kernel-devel-3.10.0-514.44.5.10_104\",\n \"kernel-headers-3.10.0-514.44.5.10_104\",\n \"kernel-tools-3.10.0-514.44.5.10_104\",\n \"kernel-tools-libs-3.10.0-514.44.5.10_104\",\n \"kernel-tools-libs-devel-3.10.0-514.44.5.10_104\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2021-08-19T12:30:10", "description": "The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-108.81 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-18281: An issue was discovered in the Linux kernel, the mremap() syscall performs TLB flushes after dropping pagetable locks.\nIf a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).\n\nCVE-2018-18710: An issue was discovered in the Linux kernel, an information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\nCVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\nCVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).\n\nCVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n\nCVE-2017-1000407: An denial of service issue was discovered in the Linux kernel, by flooding the diagnostic port 0x80 an exception can be triggered leading to a kernel panic (bnc#1071021).\n\nCVE-2018-9516: An issue was discovered in the Linux kernel, the copy_to_user() inside the HID code does not correctly check the length before executing (bsc#1108498).\n\nCVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host.\nDepending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely (bnc#1107829).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-11-14T00:00:00", "type": "nessus", "title": "SUSE SLES11 Security Update : kernel (SUSE-SU-2018:3746-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-1000407", "CVE-2017-16533", "CVE-2017-7273", "CVE-2018-10940", "CVE-2018-14633", "CVE-2018-16658", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-18710", "CVE-2018-9516"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-ec2", "p-cpe:/a:novell:suse_linux:kernel-ec2-base", "p-cpe:/a:novell:suse_linux:kernel-ec2-devel", "p-cpe:/a:novell:suse_linux:kernel-pae", "p-cpe:/a:novell:suse_linux:kernel-pae-base", "p-cpe:/a:novell:suse_linux:kernel-pae-devel", "p-cpe:/a:novell:suse_linux:kernel-source", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-trace", "p-cpe:/a:novell:suse_linux:kernel-trace-base", "p-cpe:/a:novell:suse_linux:kernel-trace-devel", "p-cpe:/a:novell:suse_linux:kernel-xen", "p-cpe:/a:novell:suse_linux:kernel-xen-base", "p-cpe:/a:novell:suse_linux:kernel-xen-devel", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2018-3746-1.NASL", "href": "https://www.tenable.com/plugins/nessus/118952", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2018:3746-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(118952);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-1000407\", \"CVE-2017-16533\", \"CVE-2017-7273\", \"CVE-2018-10940\", \"CVE-2018-14633\", \"CVE-2018-16658\", \"CVE-2018-18281\", \"CVE-2018-18386\", \"CVE-2018-18710\", \"CVE-2018-9516\");\n\n script_name(english:\"SUSE SLES11 Security Update : kernel (SUSE-SU-2018:3746-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The SUSE Linux Enterprise 11 SP4 kernel was updated to 3.0.101-108.81\nto receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-18281: An issue was discovered in the Linux kernel, the\nmremap() syscall performs TLB flushes after dropping pagetable locks.\nIf a syscall such as ftruncate() removes entries from the pagetables\nof a task that is in the middle of mremap(), a stale TLB entry can\nremain for a short time that permits access to a physical page after\nit has been released back to the page allocator and reused\n(bnc#1113769).\n\nCVE-2018-18710: An issue was discovered in the Linux kernel, an\ninformation leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c\ncould be used by local attackers to read kernel memory because a cast\nfrom unsigned long to int interferes with bounds checking. This is\nsimilar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\nCVE-2018-18386: drivers/tty/n_tty.c in the Linux kernel allowed local\nattackers (who are able to access pseudo terminals) to hang/block\nfurther usage of any pseudo terminal devices due to an EXTPROC versus\nICANON confusion in TIOCINQ (bnc#1094825).\n\nCVE-2017-7273: The cp_report_fixup function in\ndrivers/hid/hid-cypress.c in the Linux kernel 4.x allowed physically\nproximate attackers to cause a denial of service (integer underflow)\nor possibly have unspecified other impact via a crafted HID report\n(bnc#1031240).\n\nCVE-2017-16533: The usbhid_parse function in\ndrivers/hid/usbhid/hid-core.c in the Linux kernel allowed local users\nto cause a denial of service (out-of-bounds read and system crash) or\npossibly have unspecified other impact via a crafted USB device\n(bnc#1066674).\n\nCVE-2017-1000407: An denial of service issue was discovered in the\nLinux kernel, by flooding the diagnostic port 0x80 an exception can be\ntriggered leading to a kernel panic (bnc#1071021).\n\nCVE-2018-9516: An issue was discovered in the Linux kernel, the\ncopy_to_user() inside the HID code does not correctly check the length\nbefore executing (bsc#1108498).\n\nCVE-2018-14633: A security flaw was found in the\nchap_server_compute_md5() function in the ISCSI target code in the\nLinux kernel in a way an authentication request from an ISCSI\ninitiator is processed. An unauthenticated remote attacker can cause a\nstack buffer overflow and smash up to 17 bytes of the stack. The\nattack requires the iSCSI target to be enabled on the victim host.\nDepending on how the target's code was built (i.e. depending on a\ncompiler, compile flags and hardware architecture) an attack may lead\nto a system crash and thus to a denial-of-service or possibly to a\nnon-authorized access to data exported by an iSCSI target. Due to the\nnature of the flaw, privilege escalation cannot be fully ruled out,\nalthough we believe it is highly unlikely (bnc#1107829).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1031240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1047027\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1049128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050431\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1064861\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1066674\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1081680\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094244\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103145\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105799\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106139\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107371\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107829\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107849\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108314\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108498\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110006\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110247\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113337\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114460\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=923775\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-1000407/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-16533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-7273/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-14633/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18281/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18710/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-9516/\"\n );\n # https://www.suse.com/support/update/announcement/2018/suse-su-20183746-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9fe20c1d\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Software Development Kit 11-SP4:zypper in -t\npatch sdksp4-kernel-source-13863=1\n\nSUSE Linux Enterprise Server 11-SP4:zypper in -t patch\nslessp4-kernel-source-13863=1\n\nSUSE Linux Enterprise Server 11-EXTRA:zypper in -t patch\nslexsp3-kernel-source-13863=1\n\nSUSE Linux Enterprise Debuginfo 11-SP4:zypper in -t patch\ndbgsp4-kernel-source-13863=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/14\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-ec2-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-ec2-base-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-ec2-devel-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-xen-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-xen-base-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-pae-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-pae-base-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-pae-devel-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-default-man-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-default-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-default-base-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-default-devel-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-source-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-syms-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-trace-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-trace-base-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", reference:\"kernel-trace-devel-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"kernel-ec2-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"kernel-ec2-base-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"kernel-ec2-devel-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"kernel-xen-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"kernel-xen-base-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"kernel-xen-devel-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"kernel-pae-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"kernel-pae-base-3.0.101-108.81.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"4\", cpu:\"i586\", reference:\"kernel-pae-devel-3.0.101-108.81.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 8.3, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:C"}}, {"lastseen": "2021-08-19T12:29:51", "description": "The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removed entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry could remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\nCVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\nCVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently had a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).\n\nCVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-12-13T00:00:00", "type": "nessus", "title": "SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:4069-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-16533", "CVE-2017-18224", "CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-18445", "CVE-2018-18710", "CVE-2018-19824"], "modified": "2019-09-10T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-extra", "p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2018-4069-1.NASL", "href": "https://www.tenable.com/plugins/nessus/119647", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2018:4069-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119647);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/09/10 13:51:50\");\n\n script_cve_id(\"CVE-2017-16533\", \"CVE-2017-18224\", \"CVE-2018-10940\", \"CVE-2018-16658\", \"CVE-2018-18281\", \"CVE-2018-18386\", \"CVE-2018-18445\", \"CVE-2018-18710\", \"CVE-2018-19824\");\n\n script_name(english:\"SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:4069-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The SUSE Linux Enterprise 12 SP4 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-19824: A local user could exploit a use-after-free in the\nALSA driver by supplying a malicious USB Sound device (with zero\ninterfaces) that is mishandled in usb_audio_probe in sound/usb/card.c\n(bnc#1118152).\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after\ndropping pagetable locks. If a syscall such as ftruncate() removed\nentries from the pagetables of a task that is in the middle of\nmremap(), a stale TLB entry could remain for a short time that permits\naccess to a physical page after it has been released back to the page\nallocator and reused. (bnc#1113769).\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in\ndrivers/cdrom/cdrom.c could be used by local attackers to read kernel\nmemory because a cast from unsigned long to int interferes with bounds\nchecking. This is similar to CVE-2018-10940 and CVE-2018-16658\n(bnc#1113751).\n\nCVE-2018-18445: Faulty computation of numeric bounds in the BPF\nverifier permitted out-of-bounds memory accesses because\nadjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit\nright shifts (bnc#1112372).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are\nable to access pseudo terminals) to hang/block further usage of any\npseudo terminal devices due to an EXTPROC versus ICANON confusion in\nTIOCINQ (bnc#1094825).\n\nCVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and\nconsequently had a race condition for access to the extent tree during\nread operations in DIRECT mode, which allowed local users to cause a\ndenial of service (BUG) by modifying a certain e_cpos field\n(bnc#1084831).\n\nCVE-2017-16533: The usbhid_parse function in\ndrivers/hid/usbhid/hid-core.c allowed local users to cause a denial of\nservice (out-of-bounds read and system crash) or possibly have\nunspecified other impact via a crafted USB device (bnc#1066674).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1055120\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1061840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065729\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1066674\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1067906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1068273\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1076830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1078248\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1079524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082555\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082653\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083647\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084760\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084831\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1085535\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1086196\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1089350\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1091800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1097755\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100132\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103925\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104824\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105025\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106105\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106110\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107256\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107385\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107866\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108377\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108468\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109330\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109911\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109915\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109919\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109951\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110006\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110998\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111040\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111062\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111174\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111506\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111696\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111809\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111921\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112128\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112208\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112219\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112221\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112372\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112554\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112708\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112710\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112711\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112712\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112713\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112733\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112735\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112736\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112738\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112740\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112741\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112745\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112878\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112894\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112899\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112905\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112963\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113295\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113501\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113677\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113722\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113972\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114015\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114178\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114385\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114576\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114577\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114578\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114579\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114580\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114581\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114582\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114583\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114584\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114585\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114839\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115074\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115269\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115431\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115433\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115440\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115567\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115709\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115976\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116183\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116692\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116693\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116698\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116699\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116700\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116701\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116862\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116863\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116876\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116877\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116878\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116891\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116895\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116899\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116950\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117168\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117172\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117174\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117181\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117184\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117188\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117349\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117561\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117788\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117789\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117790\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117791\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117792\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117794\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117795\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117796\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117798\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117799\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117801\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117802\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117804\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117807\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117808\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117815\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117816\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117817\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117819\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117820\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117821\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117822\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118102\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118136\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118137\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118138\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118140\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118152\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118316\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-16533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-18224/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18281/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18445/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18710/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-19824/\"\n );\n # https://www.suse.com/support/update/announcement/2018/suse-su-20184069-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?dc63e3e0\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Workstation Extension 12-SP4:zypper in -t patch\nSUSE-SLE-WE-12-SP4-2018-2894=1\n\nSUSE Linux Enterprise Software Development Kit 12-SP4:zypper in -t\npatch SUSE-SLE-SDK-12-SP4-2018-2894=1\n\nSUSE Linux Enterprise Server 12-SP4:zypper in -t patch\nSUSE-SLE-SERVER-12-SP4-2018-2894=1\n\nSUSE Linux Enterprise High Availability 12-SP4:zypper in -t patch\nSUSE-SLE-HA-12-SP4-2018-2894=1\n\nSUSE Linux Enterprise Desktop 12-SP4:zypper in -t patch\nSUSE-SLE-DESKTOP-12-SP4-2018-2894=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-extra-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLED12|SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLED12 / SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP4\", os_ver + \" SP\" + sp);\nif (os_ver == \"SLED12\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLED12 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"s390x\", reference:\"kernel-default-man-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-base-debuginfo-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debuginfo-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-debugsource-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-default-devel-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", reference:\"kernel-syms-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-debuginfo-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-debugsource-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-devel-debuginfo-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-extra-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-default-extra-debuginfo-4.12.14-95.3.1\")) flag++;\nif (rpm_check(release:\"SLED12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-syms-4.12.14-95.3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-05-30T18:17:23", "description": "The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2018-4288 advisory.\n\n - ** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it virtually impossible to exploit.\n (CVE-2018-1000204)\n\n - An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658. (CVE-2018-18710)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}, "published": "2018-11-29T00:00:00", "type": "nessus", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4288)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-1000204", "CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18710"], "modified": "2022-05-26T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-firmware"], "id": "ORACLELINUX_ELSA-2018-4288.NASL", "href": "https://www.tenable.com/plugins/nessus/119279", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2018-4288.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(119279);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/26\");\n\n script_cve_id(\n \"CVE-2018-10940\",\n \"CVE-2018-16658\",\n \"CVE-2018-18710\",\n \"CVE-2018-1000204\"\n );\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4288)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2018-4288 advisory.\n\n - ** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with\n dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel\n heap pages to the userspace. This has been fixed upstream in\n https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has\n limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the\n Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties\n dispute the relevance of this report, noting that the requirement for an attacker to have both the\n CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it virtually impossible to exploit.\n (CVE-2018-1000204)\n\n - An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc\n in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from\n unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and\n CVE-2018-16658. (CVE-2018-18710)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2018-4288.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-1000204\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2018-16658\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/06/08\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 6 / 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\nif ('x86_64' >!< cpu) audit(AUDIT_ARCH_NOT, 'x86_64', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.1.12-124.22.4.el6uek', '4.1.12-124.22.4.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2018-4288');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.1';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.1.12-124.22.4.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.22.4.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.22.4.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.22.4.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.22.4.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.22.4.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'},\n {'reference':'kernel-uek-4.1.12-124.22.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.22.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.22.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.22.4.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.22.4.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.22.4.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 6.3, "vector": "AV:N/AC:M/Au:S/C:C/I:N/A:N"}}, {"lastseen": "2022-06-01T16:44:09", "description": "The remote OracleVM system is missing necessary patches to address critical security updates :\n\n - Revert commit 8bd274934987 ('block: fix bdi vs gendisk lifetime mismatch') (Ashish Samant) [Orabug: 28968102]\n\n - KVM/x86: Add IBPB support (Ashok Raj) [Orabug: 28703712]\n\n - x86/intel/spectre_v2: Remove unnecessary retp_compiler test (Boris Ostrovsky) [Orabug: 28814570]\n\n - x86/intel/spectre_v4: Deprecate spec_store_bypass_disable=userspace (Boris Ostrovsky) [Orabug: 28814570]\n\n - x86/speculation: x86_spec_ctrl_set needs to be called unconditionally (Boris Ostrovsky) [Orabug: 28814570]\n\n - x86/speculation: Drop unused DISABLE_IBRS_CLOBBER macro (Boris Ostrovsky) [Orabug: 28814570]\n\n - x86/intel/spectre_v4: Keep SPEC_CTRL_SSBD when IBRS is in use (Boris Ostrovsky) [Orabug: 28814570]\n\n - net: net_failover: fix typo in net_failover_slave_register (Liran Alon) [Orabug:\n 28122104]\n\n - virtio_net: Extend virtio to use VF datapath when available (Sridhar Samudrala) [Orabug: 28122104]\n\n - virtio_net: Introduce VIRTIO_NET_F_STANDBY feature bit (Sridhar Samudrala) [Orabug: 28122104]\n\n - net: Introduce net_failover driver (Sridhar Samudrala) [Orabug: 28122104]\n\n - net: Introduce generic failover module (Sridhar Samudrala) [Orabug: 28122104]\n\n - net: introduce lower state changed info structure for LAG lowers (Jiri Pirko) [Orabug: 28122104]\n\n - net: introduce change lower state notifier (Jiri Pirko) [Orabug: 28122104]\n\n - net: add info struct for LAG changeupper (Jiri Pirko) [Orabug: 28122104]\n\n - net: add possibility to pass information about upper device via notifier (Jiri Pirko) [Orabug: 28122104]\n\n - net: Check CHANGEUPPER notifier return value (Ido Schimmel) [Orabug: 28122104]\n\n - net: introduce change upper device notifier change info (Jiri Pirko) \n\n - x86/bugs: rework x86_spec_ctrl_set to make its changes explicit (Daniel Jordan) [Orabug: 28271063]\n\n - x86/bugs: rename ssbd_ibrs_selected to ssbd_userspace_selected (Daniel Jordan) [Orabug:\n 28271063]\n\n - x86/bugs: always use x86_spec_ctrl_base or _priv when setting spec ctrl MSR (Daniel Jordan) [Orabug: 28271063]\n\n - xen-blkfront: fix kernel panic with negotiate_mq error path (Manjunath Patil) [Orabug: 28798861]\n\n - scsi: lpfc: Correct MDS diag and nvmet configuration (James Smart) \n\n - scsi: virtio_scsi: let host do exception handling (Paolo Bonzini) \n\n - net/rds: Fix endless RNR situation (Venkat Venkatsubra) [Orabug: 28857027]\n\n - scsi: sg: allocate with __GFP_ZERO in sg_build_indirect (Alexander Potapenko) [Orabug: 28892656] (CVE-2018-1000204)\n\n - cdrom: fix improper type cast, which can leat to information leak. (Young_X) [Orabug: 28929767] (CVE-2018-16658) (CVE-2018-10940) (CVE-2018-18710)", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}, "published": "2018-11-30T00:00:00", "type": "nessus", "title": "OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0284)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-1000204", "CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18710"], "modified": "2022-05-31T00:00:00", "cpe": ["p-cpe:/a:oracle:vm:kernel-uek", "p-cpe:/a:oracle:vm:kernel-uek-firmware", "cpe:/o:oracle:vm_server:3.4"], "id": "ORACLEVM_OVMSA-2018-0284.NASL", "href": "https://www.tenable.com/plugins/nessus/119292", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The package checks in this plugin were extracted from OracleVM\n# Security Advisory OVMSA-2018-0284.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119292);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/31\");\n\n script_cve_id(\"CVE-2018-1000204\", \"CVE-2018-10940\", \"CVE-2018-16658\", \"CVE-2018-18710\");\n\n script_name(english:\"OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0284)\");\n script_summary(english:\"Checks the RPM output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote OracleVM host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The remote OracleVM system is missing necessary patches to address\ncritical security updates :\n\n - Revert commit 8bd274934987 ('block: fix bdi vs gendisk\n lifetime mismatch') (Ashish Samant) [Orabug: 28968102]\n\n - KVM/x86: Add IBPB support (Ashok Raj) [Orabug: 28703712]\n\n - x86/intel/spectre_v2: Remove unnecessary retp_compiler\n test (Boris Ostrovsky) [Orabug: 28814570]\n\n - x86/intel/spectre_v4: Deprecate\n spec_store_bypass_disable=userspace (Boris Ostrovsky)\n [Orabug: 28814570]\n\n - x86/speculation: x86_spec_ctrl_set needs to be called\n unconditionally (Boris Ostrovsky) [Orabug: 28814570]\n\n - x86/speculation: Drop unused DISABLE_IBRS_CLOBBER macro\n (Boris Ostrovsky) [Orabug: 28814570]\n\n - x86/intel/spectre_v4: Keep SPEC_CTRL_SSBD when IBRS is\n in use (Boris Ostrovsky) [Orabug: 28814570]\n\n - net: net_failover: fix typo in\n net_failover_slave_register (Liran Alon) [Orabug:\n 28122104]\n\n - virtio_net: Extend virtio to use VF datapath when\n available (Sridhar Samudrala) [Orabug: 28122104]\n\n - virtio_net: Introduce VIRTIO_NET_F_STANDBY feature bit\n (Sridhar Samudrala) [Orabug: 28122104]\n\n - net: Introduce net_failover driver (Sridhar Samudrala)\n [Orabug: 28122104]\n\n - net: Introduce generic failover module (Sridhar\n Samudrala) [Orabug: 28122104]\n\n - net: introduce lower state changed info structure for\n LAG lowers (Jiri Pirko) [Orabug: 28122104]\n\n - net: introduce change lower state notifier (Jiri Pirko)\n [Orabug: 28122104]\n\n - net: add info struct for LAG changeupper (Jiri Pirko)\n [Orabug: 28122104]\n\n - net: add possibility to pass information about upper\n device via notifier (Jiri Pirko) [Orabug: 28122104]\n\n - net: Check CHANGEUPPER notifier return value (Ido\n Schimmel) [Orabug: 28122104]\n\n - net: introduce change upper device notifier change info\n (Jiri Pirko) \n\n - x86/bugs: rework x86_spec_ctrl_set to make its changes\n explicit (Daniel Jordan) [Orabug: 28271063]\n\n - x86/bugs: rename ssbd_ibrs_selected to\n ssbd_userspace_selected (Daniel Jordan) [Orabug:\n 28271063]\n\n - x86/bugs: always use x86_spec_ctrl_base or _priv when\n setting spec ctrl MSR (Daniel Jordan) [Orabug: 28271063]\n\n - xen-blkfront: fix kernel panic with negotiate_mq error\n path (Manjunath Patil) [Orabug: 28798861]\n\n - scsi: lpfc: Correct MDS diag and nvmet configuration\n (James Smart) \n\n - scsi: virtio_scsi: let host do exception handling (Paolo\n Bonzini) \n\n - net/rds: Fix endless RNR situation (Venkat Venkatsubra)\n [Orabug: 28857027]\n\n - scsi: sg: allocate with __GFP_ZERO in sg_build_indirect\n (Alexander Potapenko) [Orabug: 28892656]\n (CVE-2018-1000204)\n\n - cdrom: fix improper type cast, which can leat to\n information leak. (Young_X) [Orabug: 28929767]\n (CVE-2018-16658) (CVE-2018-10940) (CVE-2018-18710)\"\n );\n # https://oss.oracle.com/pipermail/oraclevm-errata/2018-November/000918.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?99e26a29\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\"Update the affected kernel-uek / kernel-uek-firmware packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:S/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-1000204\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:vm:kernel-uek-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:vm_server:3.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"OracleVM Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleVM/release\", \"Host/OracleVM/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/OracleVM/release\");\nif (isnull(release) || \"OVS\" >!< release) audit(AUDIT_OS_NOT, \"OracleVM\");\nif (! preg(pattern:\"^OVS\" + \"3\\.4\" + \"(\\.[0-9]|$)\", string:release)) audit(AUDIT_OS_NOT, \"OracleVM 3.4\", \"OracleVM \" + release);\nif (!get_kb_item(\"Host/OracleVM/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"OracleVM\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"OVS3.4\", reference:\"kernel-uek-4.1.12-124.22.4.el6uek\")) flag++;\nif (rpm_check(release:\"OVS3.4\", reference:\"kernel-uek-firmware-4.1.12-124.22.4.el6uek\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-uek / kernel-uek-firmware\");\n}\n", "cvss": {"score": 6.3, "vector": "AV:N/AC:M/Au:S/C:C/I:N/A:N"}}, {"lastseen": "2022-05-24T15:54:27", "description": "The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).\n\nCVE-2018-16884: NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out (bnc#1119946).\n\nCVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n\nCVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. (bnc#1118319).\n\nCVE-2018-16862: A security flaw was found in a way that the cleancache subsystem clears an inode after the final file truncation (removal).\nThe new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one (bnc#1117186).\n\nCVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\nCVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\nCVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check.\nThis could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n(bnc#1108498).\n\nCVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two remote information leak vulnerabilities in the code that handles incoming L2cap configuration packets (bsc#1120758).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 8, "vector": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-02-20T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0439-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10940", "CVE-2018-16658", "CVE-2018-16862", "CVE-2018-16884", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-18690", "CVE-2018-18710", "CVE-2018-19824", "CVE-2018-19985", "CVE-2018-20169", "CVE-2018-9516", "CVE-2018-9568", "CVE-2019-3459", "CVE-2019-3460"], "modified": "2022-05-23T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-default-debugsource", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_101-default", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2019-0439-1.NASL", "href": "https://www.tenable.com/plugins/nessus/122343", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:0439-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(122343);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/23\");\n\n script_cve_id(\n \"CVE-2018-9516\",\n \"CVE-2018-9568\",\n \"CVE-2018-10940\",\n \"CVE-2018-16658\",\n \"CVE-2018-16862\",\n \"CVE-2018-16884\",\n \"CVE-2018-18281\",\n \"CVE-2018-18386\",\n \"CVE-2018-18690\",\n \"CVE-2018-18710\",\n \"CVE-2018-19824\",\n \"CVE-2018-19985\",\n \"CVE-2018-20169\",\n \"CVE-2019-3459\",\n \"CVE-2019-3460\"\n );\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0439-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 12 SP2 kernel was updated to receive various\nsecurity and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-19985: The function hso_probe read if_num from the USB device\n(as an u8) and used it without a length check to index an array,\nresulting in an OOB memory read in hso_probe or hso_get_config_data\nthat could be used by local attackers (bnc#1120743).\n\nCVE-2018-16884: NFS41+ shares mounted in different network namespaces\nat the same time can make bc_svc_process() use wrong back-channel IDs\nand cause a use-after-free vulnerability. Thus a malicious container\nuser can cause a host kernel memory corruption and a system panic. Due\nto the nature of the flaw, privilege escalation cannot be fully ruled\nout (bnc#1119946).\n\nCVE-2018-20169: The USB subsystem mishandled size checks during the\nreading of an extra descriptor, related to __usb_get_extra_descriptor\nin drivers/usb/core/usb.c (bnc#1119714).\n\nCVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory\ncorruption due to type confusion. This could lead to local escalation\nof privilege with no additional execution privileges needed. User\ninteraction is not needed for exploitation. (bnc#1118319).\n\nCVE-2018-16862: A security flaw was found in a way that the cleancache\nsubsystem clears an inode after the final file truncation (removal).\nThe new file created with the same inode may contain leftover pages\nfrom cleancache and the old file data instead of the new one\n(bnc#1117186).\n\nCVE-2018-19824: A local user could exploit a use-after-free in the\nALSA driver by supplying a malicious USB Sound device (with zero\ninterfaces) that is mishandled in usb_audio_probe in sound/usb/card.c\n(bnc#1118152).\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after\ndropping pagetable locks. If a syscall such as ftruncate() removes\nentries from the pagetables of a task that is in the middle of\nmremap(), a stale TLB entry can remain for a short time that permits\naccess to a physical page after it has been released back to the page\nallocator and reused. (bnc#1113769).\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in\ndrivers/cdrom/cdrom.c could be used by local attackers to read kernel\nmemory because a cast from unsigned long to int interferes with bounds\nchecking. This is similar to CVE-2018-10940 and CVE-2018-16658\n(bnc#1113751).\n\nCVE-2018-18690: A local attacker able to set attributes on an xfs\nfilesystem could make this filesystem non-operational until the next\nmount by triggering an unchecked error condition during an xfs\nattribute change, because xfs_attr_shortform_addname in\nfs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with\nconversion of an attr from short to long form (bnc#1105025).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are\nable to access pseudo terminals) to hang/block further usage of any\npseudo terminal devices due to an EXTPROC versus ICANON confusion in\nTIOCINQ (bnc#1094825).\n\nCVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c,\nthere is a possible out of bounds write due to a missing bounds check.\nThis could lead to local escalation of privilege with System execution\nprivileges needed. User interaction is not needed for exploitation.\n(bnc#1108498).\n\nCVE-2019-3459, CVE-2019-3460: The Blutooth stack suffered from two\nremote information leak vulnerabilities in the code that handles\nincoming L2cap configuration packets (bsc#1120758).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012382\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1023175\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042286\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065726\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1070805\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084721\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1086095\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1086535\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1091158\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1091171\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1091197\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094825\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1098996\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1099523\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1099597\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100105\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1101555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103624\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104731\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105025\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105931\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107256\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107299\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107385\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107866\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108145\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108498\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109330\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110286\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110837\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111062\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113192\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113769\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114190\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114648\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114763\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115433\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115440\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116027\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116183\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116345\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117186\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117187\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118152\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118319\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119714\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119946\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119947\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120743\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120758\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1121621\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1123161\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-16862/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-16884/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-18281/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-18386/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-18690/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-18710/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-19824/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-19985/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-20169/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-9516/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-9568/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-3459/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2019-3460/\");\n # https://www.suse.com/support/update/announcement/2019/suse-su-20190439-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?91b39243\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE OpenStack Cloud 7:zypper in -t patch\nSUSE-OpenStack-Cloud-7-2019-439=1\n\nSUSE Linux Enterprise Server for SAP 12-SP2:zypper in -t patch\nSUSE-SLE-SAP-12-SP2-2019-439=1\n\nSUSE Linux Enterprise Server 12-SP2-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-2019-439=1\n\nSUSE Linux Enterprise Server 12-SP2-BCL:zypper in -t patch\nSUSE-SLE-SERVER-12-SP2-BCL-2019-439=1\n\nSUSE Linux Enterprise High Availability 12-SP2:zypper in -t patch\nSUSE-SLE-HA-12-SP2-2019-439=1\n\nSUSE Enterprise Storage 4:zypper in -t patch SUSE-Storage-4-2019-439=1\n\nOpenStack Cloud Magnum Orchestration 7:zypper in -t patch\nSUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-439=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-9568\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2018-16884\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/02/19\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/02/20\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-4_4_121-92_101-default\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(2)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP2\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"x86_64\", reference:\"kgraft-patch-4_4_121-92_101-default-1-3.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", cpu:\"s390x\", reference:\"kernel-default-man-4.4.121-92.101.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-4.4.121-92.101.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-4.4.121-92.101.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-base-debuginfo-4.4.121-92.101.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debuginfo-4.4.121-92.101.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-debugsource-4.4.121-92.101.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-default-devel-4.4.121-92.101.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"2\", reference:\"kernel-syms-4.4.121-92.101.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-06-22T18:45:06", "description": "The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.162 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\nCVE-2018-18690: A local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with conversion of an attr from short to long form (bnc#1105025).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\nCVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check.\nThis could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.\n(bnc#1108498).\n\nCVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack-based buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. (bnc#1107829).\n\nCVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bnc#1108399).\n\nCVE-2018-16597: Incorrect access checking in overlayfs mounts could be used by local attackers to modify or truncate files in the underlying filesystem (bnc#1106512).\n\nCVE-2018-14613: There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c (bnc#1102896).\n\nCVE-2018-14617: There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory (bnc#1102870).\n\nCVE-2018-16276: Local attackers could use user access read/writes with incorrect bounds checking in the yurex USB driver to crash the kernel or potentially escalate privileges (bnc#1106095 bnc#1115593).\n\nCVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c allowed local users to cause a denial of service (memory consumption) via many read accesses to files in the /sys/class/sas_phy directory, as demonstrated by the /sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1087209).\n\nCVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c allowed local users to cause a denial of service (double free) or possibly have unspecified other impact by triggering a creation failure (bnc#1082863).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-01-16T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0095-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10940", "CVE-2018-14613", "CVE-2018-14617", "CVE-2018-14633", "CVE-2018-16276", "CVE-2018-16597", "CVE-2018-16658", "CVE-2018-17182", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-18690", "CVE-2018-18710", "CVE-2018-7480", "CVE-2018-7757", "CVE-2018-9516"], "modified": "2022-05-24T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-azure", "p-cpe:/a:novell:suse_linux:kernel-azure-base", "p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debugsource", "p-cpe:/a:novell:suse_linux:kernel-azure-devel", "p-cpe:/a:novell:suse_linux:kernel-syms-azure", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2019-0095-1.NASL", "href": "https://www.tenable.com/plugins/nessus/121208", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:0095-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(121208);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/24\");\n\n script_cve_id(\n \"CVE-2018-7480\",\n \"CVE-2018-7757\",\n \"CVE-2018-9516\",\n \"CVE-2018-10940\",\n \"CVE-2018-14613\",\n \"CVE-2018-14617\",\n \"CVE-2018-14633\",\n \"CVE-2018-16276\",\n \"CVE-2018-16597\",\n \"CVE-2018-16658\",\n \"CVE-2018-17182\",\n \"CVE-2018-18281\",\n \"CVE-2018-18386\",\n \"CVE-2018-18690\",\n \"CVE-2018-18710\"\n );\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0095-1)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote SUSE host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.162\nto receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after\ndropping pagetable locks. If a syscall such as ftruncate() removes\nentries from the pagetables of a task that is in the middle of\nmremap(), a stale TLB entry can remain for a short time that permits\naccess to a physical page after it has been released back to the page\nallocator and reused. (bnc#1113769).\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in\ndrivers/cdrom/cdrom.c could be used by local attackers to read kernel\nmemory because a cast from unsigned long to int interferes with bounds\nchecking. This is similar to CVE-2018-10940 and CVE-2018-16658\n(bnc#1113751).\n\nCVE-2018-18690: A local attacker able to set attributes on an xfs\nfilesystem could make this filesystem non-operational until the next\nmount by triggering an unchecked error condition during an xfs\nattribute change, because xfs_attr_shortform_addname in\nfs/xfs/libxfs/xfs_attr.c mishandled ATTR_REPLACE operations with\nconversion of an attr from short to long form (bnc#1105025).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are\nable to access pseudo terminals) to hang/block further usage of any\npseudo terminal devices due to an EXTPROC versus ICANON confusion in\nTIOCINQ (bnc#1094825).\n\nCVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c,\nthere is a possible out of bounds write due to a missing bounds check.\nThis could lead to local escalation of privilege with System execution\nprivileges needed. User interaction is not needed for exploitation.\n(bnc#1108498).\n\nCVE-2018-14633: A security flaw was found in the\nchap_server_compute_md5() function in the ISCSI target code in a way\nan authentication request from an ISCSI initiator is processed. An\nunauthenticated remote attacker can cause a stack-based buffer\noverflow and smash up to 17 bytes of the stack. The attack requires\nthe iSCSI target to be enabled on the victim host. Depending on how\nthe target's code was built (i.e. depending on a compiler, compile\nflags and hardware architecture) an attack may lead to a system crash\nand thus to a denial-of-service or possibly to a non-authorized access\nto data exported by an iSCSI target. Due to the nature of the flaw,\nprivilege escalation cannot be fully ruled out, although we believe it\nis highly unlikely. (bnc#1107829).\n\nCVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c\nmishandled sequence number overflows. An attacker can trigger a\nuse-after-free (and possibly gain privileges) via certain thread\ncreation, map, unmap, invalidation, and dereference operations\n(bnc#1108399).\n\nCVE-2018-16597: Incorrect access checking in overlayfs mounts could be\nused by local attackers to modify or truncate files in the underlying\nfilesystem (bnc#1106512).\n\nCVE-2018-14613: There is an invalid pointer dereference in\nio_ctl_map_page() when mounting and operating a crafted btrfs image,\nbecause of a lack of block group item validation in check_leaf_item in\nfs/btrfs/tree-checker.c (bnc#1102896).\n\nCVE-2018-14617: There is a NULL pointer dereference and panic in\nhfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is\npurportedly a hard link) in an hfs+ filesystem that has malformed\ncatalog data, and is mounted read-only without a metadata directory\n(bnc#1102870).\n\nCVE-2018-16276: Local attackers could use user access read/writes with\nincorrect bounds checking in the yurex USB driver to crash the kernel\nor potentially escalate privileges (bnc#1106095 bnc#1115593).\n\nCVE-2018-7757: Memory leak in the sas_smp_get_phy_events function in\ndrivers/scsi/libsas/sas_expander.c allowed local users to cause a\ndenial of service (memory consumption) via many read accesses to files\nin the /sys/class/sas_phy directory, as demonstrated by the\n/sys/class/sas_phy/phy-1:0:12/invalid_dword_count file (bnc#1087209).\n\nCVE-2018-7480: The blkcg_init_queue function in block/blk-cgroup.c\nallowed local users to cause a denial of service (double free) or\npossibly have unspecified other impact by triggering a creation\nfailure (bnc#1082863).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1011920\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012382\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1012422\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1020645\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1031392\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1035053\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1042422\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1043591\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1044189\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1048129\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050431\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1050549\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1053043\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1054239\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1057199\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1062303\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1063026\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065726\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1066223\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1067906\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1073579\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1076393\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1078788\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1079524\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082519\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082863\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1082979\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083215\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083527\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084427\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084536\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084760\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1087209\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1088087\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1089343\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1090535\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1091158\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1093118\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094244\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094562\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094825\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095344\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095753\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095805\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1096052\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1096547\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1098050\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1098996\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1099597\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1099810\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1101555\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102495\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102715\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102870\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102875\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102877\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102879\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102882\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1102896\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103156\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103269\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103308\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103405\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104124\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105025\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105428\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105795\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105931\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106095\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106105\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106110\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106240\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106293\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106359\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106434\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106512\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106594\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106913\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106929\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106934\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107060\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107299\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107318\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107535\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107829\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107870\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107924\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108096\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108170\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108240\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108281\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108315\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108377\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108399\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108498\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108803\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108823\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109038\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109158\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109333\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109336\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109337\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109441\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109772\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109784\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109806\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109818\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109907\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109919\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109923\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110006\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110297\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110337\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110363\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110468\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110600\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110601\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110602\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110603\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110604\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110605\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110606\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110611\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110612\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110613\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110614\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110615\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110616\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110618\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110619\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110930\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111363\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111516\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111870\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112007\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112262\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112263\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112894\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112902\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112903\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112905\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113667\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113751\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113766\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113769\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114178\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114229\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114648\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115593\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=981083\");\n script_set_attribute(attribute:\"see_also\", value:\"https://bugzilla.suse.com/show_bug.cgi?id=997172\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-14613/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-14617/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-14633/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-16276/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-16597/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-17182/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-18281/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-18386/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-18690/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-18710/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-7480/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-7757/\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.suse.com/security/cve/CVE-2018-9516/\");\n # https://www.suse.com/support/update/announcement/2019/suse-su-20190095-1/\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fa701622\");\n script_set_attribute(attribute:\"solution\", value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP3:zypper in -t patch\nSUSE-SLE-SERVER-12-SP3-2019-95=1\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-14633\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2018-9516\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"SuSE Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-azure-4.4.162-4.19.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-azure-base-4.4.162-4.19.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-azure-base-debuginfo-4.4.162-4.19.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-azure-debuginfo-4.4.162-4.19.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-azure-debugsource-4.4.162-4.19.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-azure-devel-4.4.162-4.19.2\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-syms-azure-4.4.162-4.19.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 8.3, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:C"}}, {"lastseen": "2021-08-19T12:30:21", "description": "The SUSE Linux Enterprise 12 SP4 kernel for Azure was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\nCVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\nCVE-2017-18224: fs/ocfs2/aops.c omits use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).\n\nCVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-11-29T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3934-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-16533", "CVE-2017-18224", "CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18386", "CVE-2018-18445", "CVE-2018-18710"], "modified": "2020-06-18T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-azure", "p-cpe:/a:novell:suse_linux:kernel-azure-base", "p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo", "p-cpe:/a:novell:suse_linux:kernel-azure-debugsource", "p-cpe:/a:novell:suse_linux:kernel-azure-devel", "p-cpe:/a:novell:suse_linux:kernel-syms-azure", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2018-3934-1.NASL", "href": "https://www.tenable.com/plugins/nessus/119286", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2018:3934-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119286);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/06/18\");\n\n script_cve_id(\"CVE-2017-16533\", \"CVE-2017-18224\", \"CVE-2018-10940\", \"CVE-2018-16658\", \"CVE-2018-18386\", \"CVE-2018-18445\", \"CVE-2018-18710\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3934-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"The SUSE Linux Enterprise 12 SP4 kernel for Azure was updated to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in\ndrivers/cdrom/cdrom.c could be used by local attackers to read kernel\nmemory because a cast from unsigned long to int interferes with bounds\nchecking. This is similar to CVE-2018-10940 and CVE-2018-16658\n(bnc#1113751).\n\nCVE-2018-18445: Faulty computation of numeric bounds in the BPF\nverifier permits out-of-bounds memory accesses because\nadjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit\nright shifts (bnc#1112372).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are\nable to access pseudo terminals) to hang/block further usage of any\npseudo terminal devices due to an EXTPROC versus ICANON confusion in\nTIOCINQ (bnc#1094825).\n\nCVE-2017-18224: fs/ocfs2/aops.c omits use of a semaphore and\nconsequently has a race condition for access to the extent tree during\nread operations in DIRECT mode, which allowed local users to cause a\ndenial of service (BUG) by modifying a certain e_cpos field\n(bnc#1084831).\n\nCVE-2017-16533: The usbhid_parse function in\ndrivers/hid/usbhid/hid-core.c allowed local users to cause a denial of\nservice (out-of-bounds read and system crash) or possibly have\nunspecified other impact via a crafted USB device (bnc#1066674).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1055120\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1061840\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1066674\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1067906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1076830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1079524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1083647\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084760\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1084831\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1086196\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1091800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1095805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1100132\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1101138\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1103925\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105025\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1105536\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106110\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106287\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106359\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1106838\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108377\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108468\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108870\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109330\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109772\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109784\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109911\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109915\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109919\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109951\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1110006\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111040\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111076\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111506\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111811\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111819\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111834\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111870\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111901\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111921\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111928\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1111983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112208\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112219\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112221\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112372\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112554\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112708\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112710\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112711\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112712\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112713\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112733\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112735\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112736\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112738\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112740\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112741\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112745\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112878\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112894\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112899\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112905\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113295\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113722\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113780\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113972\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114279\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-16533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-18224/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18445/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18710/\"\n );\n # https://www.suse.com/support/update/announcement/2018/suse-su-20183934-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c2ceadc2\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP4:zypper in -t patch\nSUSE-SLE-SERVER-12-SP4-2018-2803=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-azure-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms-azure\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/28\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/29\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(4)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP4\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-azure-4.12.14-6.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-azure-base-4.12.14-6.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-azure-base-debuginfo-4.12.14-6.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-azure-debuginfo-4.12.14-6.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-azure-debugsource-4.12.14-6.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-azure-devel-4.12.14-6.3.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-syms-azure-4.12.14-6.3.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:30:27", "description": "The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\n - CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).\n\n - CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\n - CVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).\n\n - CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n\nThe following non-security bugs were fixed :\n\n - acpi / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).\n\n - aio: fix io_destroy(2) vs. lookup_ioctx() race (git-fixes).\n\n - alsa: hda: Add 2 more models to the power_save blacklist (bsc#1051510).\n\n - alsa: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).\n\n - alsa: hda - Add quirk for ASUS G751 laptop (bsc#1051510).\n\n - alsa: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).\n\n - alsa: hda: fix unused variable warning (bsc#1051510).\n\n - alsa: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).\n\n - alsa: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).\n\n - apparmor: Check buffer bounds when mapping permissions mask (git-fixes).\n\n - ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).\n\n - ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).\n\n - ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).\n\n - ASoC: rsnd: do not fallback to PIO mode when\n -EPROBE_DEFER (bsc#1051510).\n\n - ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).\n\n - ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).\n\n - ASoC: wm8804: Add ACPI support (bsc#1051510).\n\n - ath10k: fix kernel panic issue during pci probe (bsc#1051510).\n\n - ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).\n\n - ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).\n\n - batman-adv: Avoid probe ELP information leak (bsc#1051510).\n\n - batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).\n\n - batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).\n\n - bdi: Fix another oops in wb_workfn() (bsc#1112746).\n\n - bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).\n\n - blkdev_report_zones_ioctl(): Use vmalloc() to allocate large buffers (bsc#1111819).\n\n - blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).\n\n - block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).\n\n - block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).\n\n - block: bvec_nr_vecs() returns value for wrong slab (bsc#1111834).\n\n - bpf/verifier: disallow pointer subtraction (bsc#1083647).\n\n - btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n\n - btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n\n - btrfs: fix file data corruption after cloning a range and fsync (bsc#1111901).\n\n - btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n\n - btrfs: fix mount failure after fsync due to hard link recreation (bsc#1103543).\n\n - btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).\n\n - btrfs: send, fix invalid access to commit roots due to concurrent snapshotting (bsc#1111904).\n\n - cdc-acm: fix race between reset and control messaging (bsc#1051510).\n\n - ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).\n\n - cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n\n - cifs: fix memory leak in SMB2_open() (bsc#1112894).\n\n - cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n\n - clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).\n\n - clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).\n\n - clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).\n\n - clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).\n\n - coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).\n\n - crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).\n\n - crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).\n\n - crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).\n\n - crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).\n\n - dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).\n\n - debugobjects: Make stack check warning more informative (bsc#1051510).\n\n - documentation/l1tf: Fix small spelling typo (bsc#1051510).\n\n - drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).\n\n - drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)\n\n - drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)\n\n - drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).\n\n - drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)\n\n - drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)\n\n - drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)\n\n - drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).\n\n - drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)\n\n - drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).\n\n - drm/i915: Restore vblank interrupts earlier (bsc#1051510).\n\n - drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).\n\n - drm/mediatek: fix OF sibling-node lookup (bsc#1106110)\n\n - drm/msm: fix OF child-node lookup (bsc#1106110)\n\n - drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).\n\n - drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)\n\n - drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)\n\n - drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)\n\n - e1000: check on netif_running() before calling e1000_up() (bsc#1051510).\n\n - e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).\n\n - eeprom: at24: change nvmem stride to 1 (bsc#1051510).\n\n - eeprom: at24: check at24_read/write arguments (bsc#1051510).\n\n - eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).\n\n - enic: do not call enic_change_mtu in enic_probe (bsc#1051510).\n\n - enic: handle mtu change for vf properly (bsc#1051510).\n\n - enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).\n\n - ethtool: fix a privilege escalation bug (bsc#1076830).\n\n - ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).\n\n - ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).\n\n - ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).\n\n - ext4: check for NUL characters in extended attribute's name (bsc#1112732).\n\n - ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).\n\n - ext4: do not mark mmp buffer head dirty (bsc#1112743).\n\n - ext4: fix online resize's handling of a too-small final block group (bsc#1112739).\n\n - ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).\n\n - ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).\n\n - ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).\n\n - ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).\n\n - ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).\n\n - fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).\n\n - fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).\n\n - hfsplus: do not return 0 when fill_super() failed (bsc#1051510).\n\n - hfsplus: stop workqueue when fill_super() failed (bsc#1051510).\n\n - hfs: prevent crash on exit from failed search (bsc#1051510).\n\n - hid: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).\n\n - hid: quirks: fix support for Apple Magic Keyboards (bsc#1051510).\n\n - hid: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).\n\n - hv: avoid crash in vmbus sysfs files (bnc#1108377).\n\n - hv_netvsc: fix schedule in RCU context ().\n\n - hwrng: core - document the quality field (bsc#1051510).\n\n - hypfs_kill_super(): deal with failed allocations (bsc#1051510).\n\n - i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).\n\n - i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).\n\n - iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).\n\n - iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).\n\n - iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).\n\n - input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).\n\n - input: atakbd - fix Atari keymap (bsc#1051510).\n\n - intel_th: pci: Add Ice Lake PCH support (bsc#1051510).\n\n - iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).\n\n - iommu/vt-d: Add definitions for PFSID (bsc#1106237).\n\n - iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).\n\n - iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).\n\n - iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).\n\n - iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).\n\n - iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).\n\n - iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).\n\n - iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).\n\n - iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).\n\n - iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).\n\n - iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).\n\n - jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).\n\n - kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).\n\n - Kbuild: fix # escaping in .cmd files for future Make (git-fixes).\n\n - kernfs: update comment about kernfs_path() return value (bsc#1051510).\n\n - kprobes/x86: Fix %p uses in error messages (bsc#1110006).\n\n - ksm: fix unlocked iteration over vmas in cmp_and_merge_page() (VM Functionality bsc#1111806).\n\n - kvm: Make VM ioctl do valloc for some archs (bsc#1111506).\n\n - kvm: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).\n\n - kvm: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).\n\n - kvm: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).\n\n - kvm: x86: Add a framework for supporting MSR-based features (bsc#1106240).\n\n - kvm: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).\n\n - kvm: X86: Introduce kvm_get_msr_feature() (bsc#1106240).\n\n - kvm/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).\n\n - kvm: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).\n\n - libertas: call into generic suspend code before turning off power (bsc#1051510).\n\n - libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).\n\n - lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).\n\n - loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).\n\n - loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).\n\n - loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).\n\n - mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).\n\n - mach64: detect the dot clock divider correctly on sparc (bsc#1051510).\n\n - media: af9035: prevent buffer overflow on write (bsc#1051510).\n\n - media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).\n\n - media: dvb: fix compat ioctl translation (bsc#1051510).\n\n - media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).\n\n - media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).\n\n - media: pci: cx23885: handle adding to list failure (bsc#1051510).\n\n - media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).\n\n - media: tvp5150: fix switch exit in set control handler (bsc#1051510).\n\n - media: tvp5150: fix width alignment during set_selection() (bsc#1051510).\n\n - media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).\n\n - media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).\n\n - media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).\n\n - mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).\n\n - mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).\n\n - mm: fix BUG_ON() in vmf_insert_pfn_pud() from VM_MIXEDMAP removal (bsc#1111841).\n\n - mm/migrate: Use spin_trylock() while resetting rate limit ().\n\n - mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n\n - move changes without Git-commit out of sorted section\n\n - nfc: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).\n\n - nfs: Avoid quadratic search when freeing delegations (bsc#1084760).\n\n - nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - of: add helper to lookup compatible child node (bsc#1106110)\n\n - orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).\n\n - orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).\n\n - orangefs_kill_sb(): deal with allocation failures (bsc#1051510).\n\n - orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).\n\n - ovl: fix format of setxattr debug (git-fixes).\n\n - ovl: Sync upper dirty data when syncing overlayfs (git-fixes).\n\n - pci/ASPM: Fix link_state teardown on device removal (bsc#1051510).\n\n - pci: hv: Do not wait forever on a device that has disappeared (bsc#1109806).\n\n - pci: Reprogram bridge prefetch registers on resume (bsc#1051510).\n\n - powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).\n\n - powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).\n\n - powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n\n - powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n\n - powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).\n\n - powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).\n\n - powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).\n\n - printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).\n\n - printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).\n\n - proc: restrict kernel stack dumps to root (git-fixes).\n blacklist.conf :\n\n - qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).\n\n - qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).\n\n - r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).\n\n - random: rate limit unseeded randomness warnings (git-fixes).\n\n - rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n\n - rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n\n - reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n\n - reiserfs: do not panic on bad directory entries (bsc#1109818).\n\n - scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n\n - scsi: ipr: Eliminate duplicate barriers ().\n\n - scsi: ipr: fix incorrect indentation of assignment statement ().\n\n - scsi: ipr: Use dma_pool_zalloc() ().\n\n - scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n\n - scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n\n - scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1111830).\n\n - scsi: target: prefer dbroot of /etc/target over /var/target (bsc#1111928).\n\n - serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).\n\n - series.conf: moved some Xen patches to the sorted region xen/blkfront: correct purging of persistent grants (bnc#1112514).\n\n - signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n\n - smb2: fix missing files in root share directory listing (bsc#1112907).\n\n - smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n\n - smb3: fix reset of bytes read and written stats (bsc#1112906).\n\n - smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n\n - sock_diag: fix use-after-free read in __sk_free (bsc#1051510).\n\n - soc/tegra: pmc: Fix child-node lookup (bsc#1051510).\n\n - sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).\n\n - sound: enable interrupt after dma buffer initialization (bsc#1051510).\n\n - spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).\n\n - spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).\n\n - spi: sh-msiof: fix deferred probing (bsc#1051510).\n\n - squashfs: more metadata hardening (bsc#1051510).\n\n - staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).\n\n - stm: Potential read overflow in stm_char_policy_set_ioctl() (bsc#1051510).\n\n - switchtec: Fix Spectre v1 vulnerability (bsc#1051510).\n\n - sysfs: Do not return POSIX ACL xattrs via listxattr (git-fixes).\n\n - target: log Data-Out timeouts as errors (bsc#1095805).\n\n - target: log NOP ping timeouts as errors (bsc#1095805).\n\n - target: split out helper for cxn timeout error stashing (bsc#1095805).\n\n - target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n\n - target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n\n - team: Forbid enslaving team device to itself (bsc#1051510).\n\n - tools build: fix # escaping in .cmd files for future Make (git-fixes).\n\n - tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).\n\n - tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).\n\n - tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).\n\n - tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).\n\n - tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).\n\n - tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).\n\n - tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).\n\n - tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).\n\n - tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).\n\n - tty: Simplify tty->count math in tty_reopen() (bnc#1105428).\n\n - usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).\n\n - usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bsc#1051510).\n\n - usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).\n\n - usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).\n\n - usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).\n\n - usb: remove LPM management from usb_driver_claim_interface() (bsc#1051510).\n\n - usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).\n\n - usb: serial: simple: add Motorola Tetra MTP6550 id (bsc#1051510).\n\n - usb: xhci-mtk: resume USB3 roothub first (bsc#1051510).\n\n - usb: yurex: Check for truncation in yurex_read() (bsc#1051510).\n\n - userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).\n\n - Use upstream version of pci-hyperv patch (35a88a1)\n\n - vmbus: do not return values for uninitalized channels (bsc#1051510).\n\n - vti4: Do not count header length twice on tunnel setup (bsc#1051510).\n\n - vti6: fix PMTU caching and reporting on xmit (bsc#1051510).\n\n - vti6: remove !skb->ignore_df check from vti6_xmit() (bsc#1051510).\n\n - Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).\n\n - x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).\n\n - x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).\n\n - x86/boot: Move EISA setup to a separate file (bsc#1110006).\n\n - x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).\n\n - x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).\n\n - x86/eisa: Add missing include (bsc#1110006).\n\n - x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).\n\n - x86/fpu: Remove second definition of fpu in\n __fpu__restore_sig() (bsc#1110006).\n\n - x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).\n\n - x86/MCE: Fix stack out-of-bounds write in mce-inject.c:\n Flags_read() (bsc#1110006).\n\n - x86/paravirt: Fix some warning messages (bnc#1065600).\n\n - x86/percpu: Fix this_cpu_read() (bsc#1110006).\n\n - x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bsc#1105536).\n\n - x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n\n - xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600).\n\n - xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600).\n\n - xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600).\n\n - xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n\n - xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).\n\n - xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bsc#1051510).\n\n - xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-11-08T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2018-1342)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-16533", "CVE-2017-18224", "CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18386", "CVE-2018-18445", "CVE-2018-18710"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.0"], "id": "OPENSUSE-2018-1342.NASL", "href": "https://www.tenable.com/plugins/nessus/118818", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2018-1342.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(118818);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-16533\", \"CVE-2017-18224\", \"CVE-2018-10940\", \"CVE-2018-16658\", \"CVE-2018-18386\", \"CVE-2018-18445\", \"CVE-2018-18710\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2018-1342)\");\n script_summary(english:\"Check for the openSUSE-2018-1342 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE Leap 15.0 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-18710: An information leak in\n cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could\n be used by local attackers to read kernel memory because\n a cast from unsigned long to int interferes with bounds\n checking. This is similar to CVE-2018-10940 and\n CVE-2018-16658 (bnc#1113751).\n\n - CVE-2018-18445: Faulty computation of numeric bounds in\n the BPF verifier permitted out-of-bounds memory accesses\n because adjust_scalar_min_max_vals in\n kernel/bpf/verifier.c mishandled 32-bit right shifts\n (bnc#1112372).\n\n - CVE-2018-18386: drivers/tty/n_tty.c allowed local\n attackers (who are able to access pseudo terminals) to\n hang/block further usage of any pseudo terminal devices\n due to an EXTPROC versus ICANON confusion in TIOCINQ\n (bnc#1094825).\n\n - CVE-2017-18224: fs/ocfs2/aops.c omitted use of a\n semaphore and consequently has a race condition for\n access to the extent tree during read operations in\n DIRECT mode, which allowed local users to cause a denial\n of service (BUG) by modifying a certain e_cpos field\n (bnc#1084831).\n\n - CVE-2017-16533: The usbhid_parse function in\n drivers/hid/usbhid/hid-core.c allowed local users to\n cause a denial of service (out-of-bounds read and system\n crash) or possibly have unspecified other impact via a\n crafted USB device (bnc#1066674).\n\nThe following non-security bugs were fixed :\n\n - acpi / processor: Fix the return value of\n acpi_processor_ids_walk() (bsc#1051510).\n\n - aio: fix io_destroy(2) vs. lookup_ioctx() race\n (git-fixes).\n\n - alsa: hda: Add 2 more models to the power_save blacklist\n (bsc#1051510).\n\n - alsa: hda - Add mic quirk for the Lenovo G50-30\n (17aa:3905) (bsc#1051510).\n\n - alsa: hda - Add quirk for ASUS G751 laptop\n (bsc#1051510).\n\n - alsa: hda - Fix headphone pin config for ASUS G751\n (bsc#1051510).\n\n - alsa: hda: fix unused variable warning (bsc#1051510).\n\n - alsa: hda/realtek - Fix the problem of the front MIC on\n the Lenovo M715 (bsc#1051510).\n\n - alsa: usb-audio: update quirk for B&W PX to remove\n microphone (bsc#1051510).\n\n - apparmor: Check buffer bounds when mapping permissions\n mask (git-fixes).\n\n - ASoC: intel: skylake: Add missing break in\n skl_tplg_get_token() (bsc#1051510).\n\n - ASoC: Intel: Skylake: Reset the controller in probe\n (bsc#1051510).\n\n - ASoC: rsnd: adg: care clock-frequency size\n (bsc#1051510).\n\n - ASoC: rsnd: do not fallback to PIO mode when\n -EPROBE_DEFER (bsc#1051510).\n\n - ASoC: rt5514: Fix the issue of the delay volume applied\n again (bsc#1051510).\n\n - ASoC: sigmadsp: safeload should not have lower byte\n limit (bsc#1051510).\n\n - ASoC: wm8804: Add ACPI support (bsc#1051510).\n\n - ath10k: fix kernel panic issue during pci probe\n (bsc#1051510).\n\n - ath10k: fix scan crash due to incorrect length\n calculation (bsc#1051510).\n\n - ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait\n (bsc#1051510).\n\n - batman-adv: Avoid probe ELP information leak\n (bsc#1051510).\n\n - batman-adv: fix backbone_gw refcount on queue_work()\n failure (bsc#1051510).\n\n - batman-adv: fix hardif_neigh refcount on queue_work()\n failure (bsc#1051510).\n\n - bdi: Fix another oops in wb_workfn() (bsc#1112746).\n\n - bdi: Preserve kabi when adding cgwb_release_mutex\n (bsc#1112746).\n\n - blkdev_report_zones_ioctl(): Use vmalloc() to allocate\n large buffers (bsc#1111819).\n\n - blk-mq: I/O and timer unplugs are inverted in blktrace\n (bsc#1112713).\n\n - block, bfq: fix wrong init of saved start time for\n weight raising (bsc#1112708).\n\n - block: bfq: swap puts in bfqg_and_blkg_put\n (bsc#1112712).\n\n - block: bvec_nr_vecs() returns value for wrong slab\n (bsc#1111834).\n\n - bpf/verifier: disallow pointer subtraction\n (bsc#1083647).\n\n - btrfs: Enhance btrfs_trim_fs function to handle error\n better (Dependency for bsc#1113667).\n\n - btrfs: Ensure btrfs_trim_fs can trim the whole\n filesystem (bsc#1113667).\n\n - btrfs: fix file data corruption after cloning a range\n and fsync (bsc#1111901).\n\n - btrfs: fix missing error return in btrfs_drop_snapshot\n (Git-fixes bsc#1109919).\n\n - btrfs: fix mount failure after fsync due to hard link\n recreation (bsc#1103543).\n\n - btrfs: handle errors while updating refcounts in\n update_ref_for_cow (Git-fixes bsc#1109915).\n\n - btrfs: send, fix invalid access to commit roots due to\n concurrent snapshotting (bsc#1111904).\n\n - cdc-acm: fix race between reset and control messaging\n (bsc#1051510).\n\n - ceph: avoid a use-after-free in ceph_destroy_options()\n (bsc#1111983).\n\n - cifs: check for STATUS_USER_SESSION_DELETED\n (bsc#1112902).\n\n - cifs: fix memory leak in SMB2_open() (bsc#1112894).\n\n - cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n\n - clk: x86: add 'ether_clk' alias for Bay Trail / Cherry\n Trail (bsc#1051510).\n\n - clk: x86: Stop marking clocks as CLK_IS_CRITICAL\n (bsc#1051510).\n\n - clocksource/drivers/ti-32k: Add\n CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs\n (bsc#1051510).\n\n - clocksource/drivers/timer-atmel-pit: Properly handle\n error cases (bsc#1051510).\n\n - coda: fix 'kernel memory exposure attempt' in fsync\n (bsc#1051510).\n\n - crypto: caam - fix implicit casts in endianness helpers\n (bsc#1051510).\n\n - crypto: chelsio - Fix memory corruption in DMA Mapped\n buffers (bsc#1051510).\n\n - crypto: lrw - Fix out-of bounds access on counter\n overflow (bsc#1051510).\n\n - crypto: tcrypt - fix ghash-generic speed test\n (bsc#1051510).\n\n - dax: Fix deadlock in dax_lock_mapping_entry()\n (bsc#1109951).\n\n - debugobjects: Make stack check warning more informative\n (bsc#1051510).\n\n - documentation/l1tf: Fix small spelling typo\n (bsc#1051510).\n\n - drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7\n (bsc#1051510).\n\n - drm/amdgpu: Fix vce work queue was not cancelled when\n suspend (bsc#1106110)\n\n - drm/amdgpu/powerplay: fix missing break in switch\n statements (bsc#1113722)\n\n - drm/edid: VSDB yCBCr420 Deep Color mode bit definitions\n (bsc#1051510).\n\n - drm/hisilicon: hibmc: Do not carry error code in HiBMC\n framebuffer (bsc#1113722)\n\n - drm/hisilicon: hibmc: Do not overwrite fb helper surface\n depth (bsc#1113722)\n\n - drm/i915/audio: Hook up component bindings even if\n displays are (bsc#1113722)\n\n - drm/i915/dp: Link train Fallback on eDP only if fallback\n link BW can fit panel's native mode (bsc#1051510).\n\n - drm/i915/gen9+: Fix initial readout for Y tiled\n framebuffers (bsc#1113722)\n\n - drm/i915/glk: Add Quirk for GLK NUC HDMI port issues\n (bsc#1051510).\n\n - drm/i915: Restore vblank interrupts earlier\n (bsc#1051510).\n\n - drm: mali-dp: Call drm_crtc_vblank_reset on device init\n (bsc#1051510).\n\n - drm/mediatek: fix OF sibling-node lookup (bsc#1106110)\n\n - drm/msm: fix OF child-node lookup (bsc#1106110)\n\n - drm/nouveau: Do not disable polling in fallback mode\n (bsc#1103356).\n\n - drm/sti: do not remove the drm_bridge that was never\n added (bsc#1100132)\n\n - drm/sun4i: Fix an ulong overflow in the dotclock driver\n (bsc#1106110)\n\n - drm/virtio: fix bounds check in\n virtio_gpu_cmd_get_capset() (bsc#1113722)\n\n - e1000: check on netif_running() before calling\n e1000_up() (bsc#1051510).\n\n - e1000: ensure to free old tx/rx rings in set_ringparam()\n (bsc#1051510).\n\n - eeprom: at24: change nvmem stride to 1 (bsc#1051510).\n\n - eeprom: at24: check at24_read/write arguments\n (bsc#1051510).\n\n - eeprom: at24: correctly set the size for at24mac402\n (bsc#1051510).\n\n - enic: do not call enic_change_mtu in enic_probe\n (bsc#1051510).\n\n - enic: handle mtu change for vf properly (bsc#1051510).\n\n - enic: initialize enic->rfs_h.lock in enic_probe\n (bsc#1051510).\n\n - ethtool: fix a privilege escalation bug (bsc#1076830).\n\n - ext2, dax: set ext2_dax_aops for dax files\n (bsc#1112554).\n\n - ext4: avoid arithemetic overflow that can trigger a BUG\n (bsc#1112736).\n\n - ext4: avoid divide by zero fault when deleting corrupted\n inline directories (bsc#1112735).\n\n - ext4: check for NUL characters in extended attribute's\n name (bsc#1112732).\n\n - ext4: check to make sure the rename(2)'s destination is\n not freed (bsc#1112734).\n\n - ext4: do not mark mmp buffer head dirty (bsc#1112743).\n\n - ext4: fix online resize's handling of a too-small final\n block group (bsc#1112739).\n\n - ext4: fix online resizing for bigalloc file systems with\n a 1k block size (bsc#1112740).\n\n - ext4: fix spectre gadget in ext4_mb_regular_allocator()\n (bsc#1112733).\n\n - ext4: recalucate superblock checksum after updating free\n blocks/inodes (bsc#1112738).\n\n - ext4: reset error code in ext4_find_entry in fallback\n (bsc#1112731).\n\n - ext4: show test_dummy_encryption mount option in\n /proc/mounts (bsc#1112741).\n\n - fbdev/omapfb: fix omapfb_memory_read infoleak\n (bsc#1051510).\n\n - fs/quota: Fix spectre gadget in do_quotactl\n (bsc#1112745).\n\n - hfsplus: do not return 0 when fill_super() failed\n (bsc#1051510).\n\n - hfsplus: stop workqueue when fill_super() failed\n (bsc#1051510).\n\n - hfs: prevent crash on exit from failed search\n (bsc#1051510).\n\n - hid: hid-sensor-hub: Force logical minimum to 1 for\n power and report state (bsc#1051510).\n\n - hid: quirks: fix support for Apple Magic Keyboards\n (bsc#1051510).\n\n - hid: sensor-hub: Restore fixup for Lenovo ThinkPad Helix\n 2 sensor hub report (bsc#1051510).\n\n - hv: avoid crash in vmbus sysfs files (bnc#1108377).\n\n - hv_netvsc: fix schedule in RCU context ().\n\n - hwrng: core - document the quality field (bsc#1051510).\n\n - hypfs_kill_super(): deal with failed allocations\n (bsc#1051510).\n\n - i2c: i2c-scmi: fix for i2c_smbus_write_block_data\n (bsc#1051510).\n\n - i2c: rcar: cleanup DMA for all kinds of failure\n (bsc#1051510).\n\n - iio: adc: at91: fix acking DRDY irq on simple\n conversions (bsc#1051510).\n\n - iio: adc: at91: fix wrong channel number in triggered\n buffer mode (bsc#1051510).\n\n - iio: adc: imx25-gcq: Fix leak of device_node in\n mx25_gcq_setup_cfgs() (bsc#1051510).\n\n - input: atakbd - fix Atari CapsLock behaviour\n (bsc#1051510).\n\n - input: atakbd - fix Atari keymap (bsc#1051510).\n\n - intel_th: pci: Add Ice Lake PCH support (bsc#1051510).\n\n - iommu/arm-smmu: Error out only if not enough context\n interrupts (bsc#1106237).\n\n - iommu/vt-d: Add definitions for PFSID (bsc#1106237).\n\n - iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).\n\n - iommu/vt-d: Fix scatterlist offset handling\n (bsc#1106237).\n\n - iwlwifi: dbg: do not crash if the firmware crashes in\n the middle of a debug dump (bsc#1051510).\n\n - iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).\n\n - iwlwifi: mvm: check for n_profiles validity in EWRD ACPI\n (bsc#1051510).\n\n - iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping\n the interface (bsc#1051510).\n\n - iwlwifi: mvm: open BA session only when sta is\n authorized (bsc#1051510).\n\n - iwlwifi: mvm: send BCAST management frames to the right\n station (bsc#1051510).\n\n - iwlwifi: pcie: gen2: build A-MSDU only for GSO\n (bsc#1051510).\n\n - iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return\n value (bsc#1051510).\n\n - jbd2: fix use after free in jbd2_log_do_checkpoint()\n (bsc#1113257).\n\n - kABI: Hide get_msr_feature() in kvm_x86_ops\n (bsc#1106240).\n\n - Kbuild: fix # escaping in .cmd files for future Make\n (git-fixes).\n\n - kernfs: update comment about kernfs_path() return value\n (bsc#1051510).\n\n - kprobes/x86: Fix %p uses in error messages\n (bsc#1110006).\n\n - ksm: fix unlocked iteration over vmas in\n cmp_and_merge_page() (VM Functionality bsc#1111806).\n\n - kvm: Make VM ioctl do valloc for some archs\n (bsc#1111506).\n\n - kvm: SVM: Add MSR-based feature support for serializing\n LFENCE (bsc#1106240).\n\n - kvm: VMX: support MSR_IA32_ARCH_CAPABILITIES as a\n feature MSR (bsc#1106240).\n\n - kvm: VMX: Tell the nested hypervisor to skip L1D flush\n on vmentry (bsc#1106240).\n\n - kvm: x86: Add a framework for supporting MSR-based\n features (bsc#1106240).\n\n - kvm: x86: define SVM/VMX specific\n kvm_arch_[alloc|free]_vm (bsc#1111506).\n\n - kvm: X86: Introduce kvm_get_msr_feature() (bsc#1106240).\n\n - kvm/x86: kABI fix for vm_alloc/vm_free changes\n (bsc#1111506).\n\n - kvm: x86: Set highest physical address bits in\n non-present/reserved SPTEs (bsc#1106240).\n\n - libertas: call into generic suspend code before turning\n off power (bsc#1051510).\n\n - libnvdimm, dimm: Maximize label transfer size\n (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - libnvdimm, label: change nvdimm_num_label_slots per UEFI\n 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - libnvdimm, label: Fix sparse warning (bsc#1111921,\n bsc#1113408, bsc#1113972).\n\n - lib/ubsan: add type mismatch handler for new GCC/Clang\n (bsc#1051510).\n\n - lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).\n\n - loop: add recursion validation to LOOP_CHANGE_FD\n (bsc#1112711).\n\n - loop: do not call into filesystem while holding\n lo_ctl_mutex (bsc#1112710).\n\n - loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).\n\n - mac80211: minstrel: fix using short preamble CCK rates\n on HT clients (bsc#1051510).\n\n - mach64: detect the dot clock divider correctly on sparc\n (bsc#1051510).\n\n - media: af9035: prevent buffer overflow on write\n (bsc#1051510).\n\n - media: cx231xx: fix potential sign-extension overflow on\n large shift (bsc#1051510).\n\n - media: dvb: fix compat ioctl translation (bsc#1051510).\n\n - media: em28xx: fix input name for Terratec AV 350\n (bsc#1051510).\n\n - media: em28xx: use a default format if TRY_FMT fails\n (bsc#1051510).\n\n - media: pci: cx23885: handle adding to list failure\n (bsc#1051510).\n\n - media: tvp5150: avoid going past array on\n v4l2_querymenu() (bsc#1051510).\n\n - media: tvp5150: fix switch exit in set control handler\n (bsc#1051510).\n\n - media: tvp5150: fix width alignment during\n set_selection() (bsc#1051510).\n\n - media: uvcvideo: Fix uvc_alloc_entity() allocation\n alignment (bsc#1051510).\n\n - media: v4l2-tpg: fix kernel oops when enabling HFLIP and\n OSD (bsc#1051510).\n\n - media: vsp1: Fix YCbCr planar formats pitch calculation\n (bsc#1051510).\n\n - mfd: arizona: Correct calling of runtime_put_sync\n (bsc#1051510).\n\n - mmc: block: avoid multiblock reads for the last sector\n in SPI mode (bsc#1051510).\n\n - mm: fix BUG_ON() in vmf_insert_pfn_pud() from\n VM_MIXEDMAP removal (bsc#1111841).\n\n - mm/migrate: Use spin_trylock() while resetting rate\n limit ().\n\n - mm: /proc/pid/pagemap: hide swap entries from\n unprivileged users (Git-fixes bsc#1109907).\n\n - move changes without Git-commit out of sorted section\n\n - nfc: nfcmrvl_uart: fix OF child-node lookup\n (bsc#1051510).\n\n - nfs: Avoid quadratic search when freeing delegations\n (bsc#1084760).\n\n - nvdimm: Clarify comment in sizeof_namespace_index\n (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Remove empty if statement (bsc#1111921,\n bsc#1113408, bsc#1113972).\n\n - nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408,\n bsc#1113972).\n\n - nvdimm: Split label init out from the logic for getting\n config data (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Use namespace index data to reduce number of\n label reads needed (bsc#1111921, bsc#1113408,\n bsc#1113972).\n\n - of: add helper to lookup compatible child node\n (bsc#1106110)\n\n - orangefs: fix deadlock; do not write i_size in read_iter\n (bsc#1051510).\n\n - orangefs: initialize op on loop restart in\n orangefs_devreq_read (bsc#1051510).\n\n - orangefs_kill_sb(): deal with allocation failures\n (bsc#1051510).\n\n - orangefs: use list_for_each_entry_safe in\n purge_waiting_ops (bsc#1051510).\n\n - ovl: fix format of setxattr debug (git-fixes).\n\n - ovl: Sync upper dirty data when syncing overlayfs\n (git-fixes).\n\n - pci/ASPM: Fix link_state teardown on device removal\n (bsc#1051510).\n\n - pci: hv: Do not wait forever on a device that has\n disappeared (bsc#1109806).\n\n - pci: Reprogram bridge prefetch registers on resume\n (bsc#1051510).\n\n - powerpc/mm/hugetlb: initialize the pagetable cache\n correctly for hugetlb (bsc#1091800).\n\n - powerpc/powernv/ioda2: Reduce upper limit for DMA window\n size (bsc#1055120).\n\n - powerpc/pseries: Fix build break for SPLPAR=n and CPU\n hotplug (bsc#1079524, git-fixes).\n\n - powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906,\n git-fixes).\n\n - powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on\n /cpus' during DLPAR (bsc#1113295).\n\n - powerpc: pseries: remove dlpar_attach_node dependency on\n full path (bsc#1113295).\n\n - powerpc/rtas: Fix a potential race between CPU-Offline &\n Migration (bsc#1111870).\n\n - printk: drop in_nmi check from\n printk_safe_flush_on_panic() (bsc#1112170).\n\n - printk/tracing: Do not trace printk_nmi_enter()\n (bsc#1112208).\n\n - proc: restrict kernel stack dumps to root (git-fixes).\n blacklist.conf :\n\n - qmi_wwan: Added support for Gemalto's Cinterion ALASxx\n WWAN interface (bsc#1051510).\n\n - qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).\n\n - r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing\n RTL_FLAG_TASK_ENABLED (bsc#1051510).\n\n - random: rate limit unseeded randomness warnings\n (git-fixes).\n\n - rculist: add list_for_each_entry_from_rcu()\n (bsc#1084760).\n\n - rculist: Improve documentation for\n list_for_each_entry_from_rcu() (bsc#1084760).\n\n - reiserfs: add check to detect corrupted directory entry\n (bsc#1109818).\n\n - reiserfs: do not panic on bad directory entries\n (bsc#1109818).\n\n - scsi: core: Allow state transitions from OFFLINE to\n BLOCKED (bsc#1112246).\n\n - scsi: ipr: Eliminate duplicate barriers ().\n\n - scsi: ipr: fix incorrect indentation of assignment\n statement ().\n\n - scsi: ipr: Use dma_pool_zalloc() ().\n\n - scsi: libfc: check fc_frame_payload_get() return value\n for null (bsc#1104731).\n\n - scsi: libfc: retry PRLI if we cannot analyse the payload\n (bsc#1104731).\n\n - scsi: qla2xxx: Fix memory leak for allocating abort IOCB\n (bsc#1111830).\n\n - scsi: target: prefer dbroot of /etc/target over\n /var/target (bsc#1111928).\n\n - serial: 8250: Fix clearing FIFOs in RS485 mode again\n (bsc#1051510).\n\n - series.conf: moved some Xen patches to the sorted region\n xen/blkfront: correct purging of persistent grants\n (bnc#1112514).\n\n - signal: Properly deliver SIGSEGV from x86 uprobes\n (bsc#1110006).\n\n - smb2: fix missing files in root share directory listing\n (bsc#1112907).\n\n - smb3: fill in statfs fsid and correct namelen\n (bsc#1112905).\n\n - smb3: fix reset of bytes read and written stats\n (bsc#1112906).\n\n - smb3: on reconnect set PreviousSessionId field\n (bsc#1112899).\n\n - sock_diag: fix use-after-free read in __sk_free\n (bsc#1051510).\n\n - soc/tegra: pmc: Fix child-node lookup (bsc#1051510).\n\n - sound: do not call skl_init_chip() to reset intel skl\n soc (bsc#1051510).\n\n - sound: enable interrupt after dma buffer initialization\n (bsc#1051510).\n\n - spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).\n\n - spi: bcm-qspi: switch back to reading flash using\n smaller chunks (bsc#1051510).\n\n - spi: sh-msiof: fix deferred probing (bsc#1051510).\n\n - squashfs: more metadata hardening (bsc#1051510).\n\n - staging: comedi: ni_mio_common: protect register write\n overflow (bsc#1051510).\n\n - stm: Potential read overflow in\n stm_char_policy_set_ioctl() (bsc#1051510).\n\n - switchtec: Fix Spectre v1 vulnerability (bsc#1051510).\n\n - sysfs: Do not return POSIX ACL xattrs via listxattr\n (git-fixes).\n\n - target: log Data-Out timeouts as errors (bsc#1095805).\n\n - target: log NOP ping timeouts as errors (bsc#1095805).\n\n - target: split out helper for cxn timeout error stashing\n (bsc#1095805).\n\n - target: stash sess_err_stats on Data-Out timeout\n (bsc#1095805).\n\n - target: use ISCSI_IQN_LEN in iscsi_target_stat\n (bsc#1095805).\n\n - team: Forbid enslaving team device to itself\n (bsc#1051510).\n\n - tools build: fix # escaping in .cmd files for future\n Make (git-fixes).\n\n - tools/vm/page-types.c: fix 'defined but not used'\n warning (bsc#1051510).\n\n - tools/vm/slabinfo.c: fix sign-compare warning\n (bsc#1051510).\n\n - tracing: Add barrier to trace_printk() buffer nesting\n modification (bsc#1112219).\n\n - tty: fix data race between tty_init_dev and flush of buf\n (bnc#1105428).\n\n - tty: Hold tty_ldisc_lock() during tty_reopen()\n (bnc#1105428).\n\n - tty/ldsem: Add lockdep asserts for ldisc_sem\n (bnc#1105428).\n\n - tty/ldsem: Convert to regular lockdep annotations\n (bnc#1105428).\n\n - tty/ldsem: Decrement wait_readers on timeouted\n down_read() (bnc#1105428).\n\n - tty/ldsem: Wake up readers after timed out down_write()\n (bnc#1105428).\n\n - tty: Simplify tty->count math in tty_reopen()\n (bnc#1105428).\n\n - usb: chipidea: Prevent unbalanced IRQ disable\n (bsc#1051510).\n\n - usb: gadget: fotg210-udc: Fix memory leak of\n fotg210->ep[i] (bsc#1051510).\n\n - usb: gadget: fsl_udc_core: check allocation return value\n and cleanup on failure (bsc#1051510).\n\n - usb: gadget: fsl_udc_core: fixup struct_udc_setup\n documentation (bsc#1051510).\n\n - usbip: tools: fix atoi() on non-null terminated string\n (bsc#1051510).\n\n - usb: remove LPM management from\n usb_driver_claim_interface() (bsc#1051510).\n\n - usb: serial: cypress_m8: fix interrupt-out transfer\n length (bsc#1051510).\n\n - usb: serial: simple: add Motorola Tetra MTP6550 id\n (bsc#1051510).\n\n - usb: xhci-mtk: resume USB3 roothub first (bsc#1051510).\n\n - usb: yurex: Check for truncation in yurex_read()\n (bsc#1051510).\n\n - userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait()\n pte access (bsc#1109739).\n\n - Use upstream version of pci-hyperv patch (35a88a1)\n\n - vmbus: do not return values for uninitalized channels\n (bsc#1051510).\n\n - vti4: Do not count header length twice on tunnel setup\n (bsc#1051510).\n\n - vti6: fix PMTU caching and reporting on xmit\n (bsc#1051510).\n\n - vti6: remove !skb->ignore_df check from vti6_xmit()\n (bsc#1051510).\n\n - Workaround for mysterious NVMe breakage with i915 CFL\n (bsc#1111040).\n\n - x86/acpi: Prevent X2APIC id 0xffffffff from being\n accounted (bsc#1110006).\n\n - x86/boot/KASLR: Work around firmware bugs by excluding\n EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice\n (bnc#1112878).\n\n - x86/boot: Move EISA setup to a separate file\n (bsc#1110006).\n\n - x86/cpufeature: Add User-Mode Instruction Prevention\n definitions (bsc#1110006).\n\n - x86/cpufeatures: Add Intel Total Memory Encryption\n cpufeature (bsc#1110006).\n\n - x86/eisa: Add missing include (bsc#1110006).\n\n - x86/EISA: Do not probe EISA bus for Xen PV guests\n (bsc#1110006).\n\n - x86/fpu: Remove second definition of fpu in\n __fpu__restore_sig() (bsc#1110006).\n\n - x86/kasan: Panic if there is not enough memory to boot\n (bsc#1110006).\n\n - x86/MCE: Fix stack out-of-bounds write in mce-inject.c:\n Flags_read() (bsc#1110006).\n\n - x86/paravirt: Fix some warning messages (bnc#1065600).\n\n - x86/percpu: Fix this_cpu_read() (bsc#1110006).\n\n - x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit()\n on 32bit (bsc#1105536).\n\n - x86/time: Correct the attribute on jiffies' definition\n (bsc#1110006).\n\n - xen/gntdev: avoid out of bounds access in case of\n partial gntdev_mmap() (bnc#1065600).\n\n - xen: Remove unnecessary BUG_ON from __unbind_from_irq()\n (bnc#1065600).\n\n - xen-swiotlb: fix the check condition for\n xen_swiotlb_free_coherent (bnc#1065600).\n\n - xfrm: use complete IPv6 addresses for hash\n (bsc#1109330).\n\n - xfs: do not fail when converting shortform attr to long\n form during ATTR_REPLACE (bsc#1105025).\n\n - xhci: Add missing CAS workaround for Intel Sunrise Point\n xHCI (bsc#1051510).\n\n - xhci: Do not print a warning when setting link state for\n disabled ports (bsc#1051510).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1055120\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1066674\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1067906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1076830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1079524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083647\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1084760\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1084831\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1091800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1094825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1095805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1100132\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1105025\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1105428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1105536\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106110\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1108377\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109330\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109911\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109915\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109919\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109951\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1110006\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111040\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111506\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111819\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111834\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111870\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111901\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111921\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111928\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112208\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112219\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112221\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112372\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112554\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112708\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112710\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112711\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112712\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112713\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112733\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112735\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112736\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112738\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112740\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112741\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112745\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112878\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112894\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112899\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112905\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113295\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113722\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113972\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/07\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/08\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-docs-html-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-macros-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-qa-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-vanilla-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-syms-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:28:05", "description": "The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\n - CVE-2018-18445: Faulty computation of numeric bounds in the BPF verifier permitted out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandled 32-bit right shifts (bnc#1112372).\n\n - CVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\n - CVE-2017-18224: fs/ocfs2/aops.c omitted use of a semaphore and consequently has a race condition for access to the extent tree during read operations in DIRECT mode, which allowed local users to cause a denial of service (BUG) by modifying a certain e_cpos field (bnc#1084831).\n\n - CVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n\nThe following non-security bugs were fixed :\n\n - acpi / processor: Fix the return value of acpi_processor_ids_walk() (bsc#1051510).\n\n - aio: fix io_destroy(2) vs. lookup_ioctx() race (git-fixes).\n\n - alsa: hda: Add 2 more models to the power_save blacklist (bsc#1051510).\n\n - alsa: hda - Add mic quirk for the Lenovo G50-30 (17aa:3905) (bsc#1051510).\n\n - alsa: hda - Add quirk for ASUS G751 laptop (bsc#1051510).\n\n - alsa: hda - Fix headphone pin config for ASUS G751 (bsc#1051510).\n\n - alsa: hda: fix unused variable warning (bsc#1051510).\n\n - alsa: hda/realtek - Fix the problem of the front MIC on the Lenovo M715 (bsc#1051510).\n\n - alsa: usb-audio: update quirk for B&W PX to remove microphone (bsc#1051510).\n\n - apparmor: Check buffer bounds when mapping permissions mask (git-fixes).\n\n - ASoC: intel: skylake: Add missing break in skl_tplg_get_token() (bsc#1051510).\n\n - ASoC: Intel: Skylake: Reset the controller in probe (bsc#1051510).\n\n - ASoC: rsnd: adg: care clock-frequency size (bsc#1051510).\n\n - ASoC: rsnd: do not fallback to PIO mode when\n -EPROBE_DEFER (bsc#1051510).\n\n - ASoC: rt5514: Fix the issue of the delay volume applied again (bsc#1051510).\n\n - ASoC: sigmadsp: safeload should not have lower byte limit (bsc#1051510).\n\n - ASoC: wm8804: Add ACPI support (bsc#1051510).\n\n - ath10k: fix kernel panic issue during pci probe (bsc#1051510).\n\n - ath10k: fix scan crash due to incorrect length calculation (bsc#1051510).\n\n - ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait (bsc#1051510).\n\n - batman-adv: Avoid probe ELP information leak (bsc#1051510).\n\n - batman-adv: fix backbone_gw refcount on queue_work() failure (bsc#1051510).\n\n - batman-adv: fix hardif_neigh refcount on queue_work() failure (bsc#1051510).\n\n - bdi: Fix another oops in wb_workfn() (bsc#1112746).\n\n - bdi: Preserve kabi when adding cgwb_release_mutex (bsc#1112746).\n\n - blkdev_report_zones_ioctl(): Use vmalloc() to allocate large buffers (bsc#1111819).\n\n - blk-mq: I/O and timer unplugs are inverted in blktrace (bsc#1112713).\n\n - block, bfq: fix wrong init of saved start time for weight raising (bsc#1112708).\n\n - block: bfq: swap puts in bfqg_and_blkg_put (bsc#1112712).\n\n - block: bvec_nr_vecs() returns value for wrong slab (bsc#1111834).\n\n - bpf/verifier: disallow pointer subtraction (bsc#1083647).\n\n - btrfs: Enhance btrfs_trim_fs function to handle error better (Dependency for bsc#1113667).\n\n - btrfs: Ensure btrfs_trim_fs can trim the whole filesystem (bsc#1113667).\n\n - btrfs: fix file data corruption after cloning a range and fsync (bsc#1111901).\n\n - btrfs: fix missing error return in btrfs_drop_snapshot (Git-fixes bsc#1109919).\n\n - btrfs: fix mount failure after fsync due to hard link recreation (bsc#1103543).\n\n - btrfs: handle errors while updating refcounts in update_ref_for_cow (Git-fixes bsc#1109915).\n\n - btrfs: send, fix invalid access to commit roots due to concurrent snapshotting (bsc#1111904).\n\n - cdc-acm: fix race between reset and control messaging (bsc#1051510).\n\n - ceph: avoid a use-after-free in ceph_destroy_options() (bsc#1111983).\n\n - cifs: check for STATUS_USER_SESSION_DELETED (bsc#1112902).\n\n - cifs: fix memory leak in SMB2_open() (bsc#1112894).\n\n - cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n\n - clk: x86: add 'ether_clk' alias for Bay Trail / Cherry Trail (bsc#1051510).\n\n - clk: x86: Stop marking clocks as CLK_IS_CRITICAL (bsc#1051510).\n\n - clocksource/drivers/ti-32k: Add CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs (bsc#1051510).\n\n - clocksource/drivers/timer-atmel-pit: Properly handle error cases (bsc#1051510).\n\n - coda: fix 'kernel memory exposure attempt' in fsync (bsc#1051510).\n\n - crypto: caam - fix implicit casts in endianness helpers (bsc#1051510).\n\n - crypto: chelsio - Fix memory corruption in DMA Mapped buffers (bsc#1051510).\n\n - crypto: lrw - Fix out-of bounds access on counter overflow (bsc#1051510).\n\n - crypto: tcrypt - fix ghash-generic speed test (bsc#1051510).\n\n - dax: Fix deadlock in dax_lock_mapping_entry() (bsc#1109951).\n\n - debugobjects: Make stack check warning more informative (bsc#1051510).\n\n - documentation/l1tf: Fix small spelling typo (bsc#1051510).\n\n - drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7 (bsc#1051510).\n\n - drm/amdgpu: Fix vce work queue was not cancelled when suspend (bsc#1106110)\n\n - drm/amdgpu/powerplay: fix missing break in switch statements (bsc#1113722)\n\n - drm/edid: VSDB yCBCr420 Deep Color mode bit definitions (bsc#1051510).\n\n - drm/hisilicon: hibmc: Do not carry error code in HiBMC framebuffer (bsc#1113722)\n\n - drm/hisilicon: hibmc: Do not overwrite fb helper surface depth (bsc#1113722)\n\n - drm/i915/audio: Hook up component bindings even if displays are (bsc#1113722)\n\n - drm/i915/dp: Link train Fallback on eDP only if fallback link BW can fit panel's native mode (bsc#1051510).\n\n - drm/i915/gen9+: Fix initial readout for Y tiled framebuffers (bsc#1113722)\n\n - drm/i915/glk: Add Quirk for GLK NUC HDMI port issues (bsc#1051510).\n\n - drm/i915: Restore vblank interrupts earlier (bsc#1051510).\n\n - drm: mali-dp: Call drm_crtc_vblank_reset on device init (bsc#1051510).\n\n - drm/mediatek: fix OF sibling-node lookup (bsc#1106110)\n\n - drm/msm: fix OF child-node lookup (bsc#1106110)\n\n - drm/nouveau: Do not disable polling in fallback mode (bsc#1103356).\n\n - drm/sti: do not remove the drm_bridge that was never added (bsc#1100132)\n\n - drm/sun4i: Fix an ulong overflow in the dotclock driver (bsc#1106110)\n\n - drm/virtio: fix bounds check in virtio_gpu_cmd_get_capset() (bsc#1113722)\n\n - e1000: check on netif_running() before calling e1000_up() (bsc#1051510).\n\n - e1000: ensure to free old tx/rx rings in set_ringparam() (bsc#1051510).\n\n - eeprom: at24: change nvmem stride to 1 (bsc#1051510).\n\n - eeprom: at24: check at24_read/write arguments (bsc#1051510).\n\n - eeprom: at24: correctly set the size for at24mac402 (bsc#1051510).\n\n - enic: do not call enic_change_mtu in enic_probe (bsc#1051510).\n\n - enic: handle mtu change for vf properly (bsc#1051510).\n\n - enic: initialize enic->rfs_h.lock in enic_probe (bsc#1051510).\n\n - ethtool: fix a privilege escalation bug (bsc#1076830).\n\n - ext2, dax: set ext2_dax_aops for dax files (bsc#1112554).\n\n - ext4: avoid arithemetic overflow that can trigger a BUG (bsc#1112736).\n\n - ext4: avoid divide by zero fault when deleting corrupted inline directories (bsc#1112735).\n\n - ext4: check for NUL characters in extended attribute's name (bsc#1112732).\n\n - ext4: check to make sure the rename(2)'s destination is not freed (bsc#1112734).\n\n - ext4: do not mark mmp buffer head dirty (bsc#1112743).\n\n - ext4: fix online resize's handling of a too-small final block group (bsc#1112739).\n\n - ext4: fix online resizing for bigalloc file systems with a 1k block size (bsc#1112740).\n\n - ext4: fix spectre gadget in ext4_mb_regular_allocator() (bsc#1112733).\n\n - ext4: recalucate superblock checksum after updating free blocks/inodes (bsc#1112738).\n\n - ext4: reset error code in ext4_find_entry in fallback (bsc#1112731).\n\n - ext4: show test_dummy_encryption mount option in /proc/mounts (bsc#1112741).\n\n - fbdev/omapfb: fix omapfb_memory_read infoleak (bsc#1051510).\n\n - fs/quota: Fix spectre gadget in do_quotactl (bsc#1112745).\n\n - hfsplus: do not return 0 when fill_super() failed (bsc#1051510).\n\n - hfsplus: stop workqueue when fill_super() failed (bsc#1051510).\n\n - hfs: prevent crash on exit from failed search (bsc#1051510).\n\n - hid: hid-sensor-hub: Force logical minimum to 1 for power and report state (bsc#1051510).\n\n - hid: quirks: fix support for Apple Magic Keyboards (bsc#1051510).\n\n - hid: sensor-hub: Restore fixup for Lenovo ThinkPad Helix 2 sensor hub report (bsc#1051510).\n\n - hv: avoid crash in vmbus sysfs files (bnc#1108377).\n\n - hv_netvsc: fix schedule in RCU context ().\n\n - hwrng: core - document the quality field (bsc#1051510).\n\n - hypfs_kill_super(): deal with failed allocations (bsc#1051510).\n\n - i2c: i2c-scmi: fix for i2c_smbus_write_block_data (bsc#1051510).\n\n - i2c: rcar: cleanup DMA for all kinds of failure (bsc#1051510).\n\n - iio: adc: at91: fix acking DRDY irq on simple conversions (bsc#1051510).\n\n - iio: adc: at91: fix wrong channel number in triggered buffer mode (bsc#1051510).\n\n - iio: adc: imx25-gcq: Fix leak of device_node in mx25_gcq_setup_cfgs() (bsc#1051510).\n\n - input: atakbd - fix Atari CapsLock behaviour (bsc#1051510).\n\n - input: atakbd - fix Atari keymap (bsc#1051510).\n\n - intel_th: pci: Add Ice Lake PCH support (bsc#1051510).\n\n - iommu/arm-smmu: Error out only if not enough context interrupts (bsc#1106237).\n\n - iommu/vt-d: Add definitions for PFSID (bsc#1106237).\n\n - iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).\n\n - iommu/vt-d: Fix scatterlist offset handling (bsc#1106237).\n\n - iwlwifi: dbg: do not crash if the firmware crashes in the middle of a debug dump (bsc#1051510).\n\n - iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).\n\n - iwlwifi: mvm: check for n_profiles validity in EWRD ACPI (bsc#1051510).\n\n - iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping the interface (bsc#1051510).\n\n - iwlwifi: mvm: open BA session only when sta is authorized (bsc#1051510).\n\n - iwlwifi: mvm: send BCAST management frames to the right station (bsc#1051510).\n\n - iwlwifi: pcie: gen2: build A-MSDU only for GSO (bsc#1051510).\n\n - iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return value (bsc#1051510).\n\n - jbd2: fix use after free in jbd2_log_do_checkpoint() (bsc#1113257).\n\n - kABI: Hide get_msr_feature() in kvm_x86_ops (bsc#1106240).\n\n - Kbuild: fix # escaping in .cmd files for future Make (git-fixes).\n\n - kernfs: update comment about kernfs_path() return value (bsc#1051510).\n\n - kprobes/x86: Fix %p uses in error messages (bsc#1110006).\n\n - ksm: fix unlocked iteration over vmas in cmp_and_merge_page() (VM Functionality bsc#1111806).\n\n - kvm: Make VM ioctl do valloc for some archs (bsc#1111506).\n\n - kvm: SVM: Add MSR-based feature support for serializing LFENCE (bsc#1106240).\n\n - kvm: VMX: support MSR_IA32_ARCH_CAPABILITIES as a feature MSR (bsc#1106240).\n\n - kvm: VMX: Tell the nested hypervisor to skip L1D flush on vmentry (bsc#1106240).\n\n - kvm: x86: Add a framework for supporting MSR-based features (bsc#1106240).\n\n - kvm: x86: define SVM/VMX specific kvm_arch_[alloc|free]_vm (bsc#1111506).\n\n - kvm: X86: Introduce kvm_get_msr_feature() (bsc#1106240).\n\n - kvm/x86: kABI fix for vm_alloc/vm_free changes (bsc#1111506).\n\n - kvm: x86: Set highest physical address bits in non-present/reserved SPTEs (bsc#1106240).\n\n - libertas: call into generic suspend code before turning off power (bsc#1051510).\n\n - libnvdimm, dimm: Maximize label transfer size (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - libnvdimm, label: change nvdimm_num_label_slots per UEFI 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - libnvdimm, label: Fix sparse warning (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - lib/ubsan: add type mismatch handler for new GCC/Clang (bsc#1051510).\n\n - lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).\n\n - loop: add recursion validation to LOOP_CHANGE_FD (bsc#1112711).\n\n - loop: do not call into filesystem while holding lo_ctl_mutex (bsc#1112710).\n\n - loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).\n\n - mac80211: minstrel: fix using short preamble CCK rates on HT clients (bsc#1051510).\n\n - mach64: detect the dot clock divider correctly on sparc (bsc#1051510).\n\n - media: af9035: prevent buffer overflow on write (bsc#1051510).\n\n - media: cx231xx: fix potential sign-extension overflow on large shift (bsc#1051510).\n\n - media: dvb: fix compat ioctl translation (bsc#1051510).\n\n - media: em28xx: fix input name for Terratec AV 350 (bsc#1051510).\n\n - media: em28xx: use a default format if TRY_FMT fails (bsc#1051510).\n\n - media: pci: cx23885: handle adding to list failure (bsc#1051510).\n\n - media: tvp5150: avoid going past array on v4l2_querymenu() (bsc#1051510).\n\n - media: tvp5150: fix switch exit in set control handler (bsc#1051510).\n\n - media: tvp5150: fix width alignment during set_selection() (bsc#1051510).\n\n - media: uvcvideo: Fix uvc_alloc_entity() allocation alignment (bsc#1051510).\n\n - media: v4l2-tpg: fix kernel oops when enabling HFLIP and OSD (bsc#1051510).\n\n - media: vsp1: Fix YCbCr planar formats pitch calculation (bsc#1051510).\n\n - mfd: arizona: Correct calling of runtime_put_sync (bsc#1051510).\n\n - mmc: block: avoid multiblock reads for the last sector in SPI mode (bsc#1051510).\n\n - mm: fix BUG_ON() in vmf_insert_pfn_pud() from VM_MIXEDMAP removal (bsc#1111841).\n\n - mm/migrate: Use spin_trylock() while resetting rate limit ().\n\n - mm: /proc/pid/pagemap: hide swap entries from unprivileged users (Git-fixes bsc#1109907).\n\n - move changes without Git-commit out of sorted section\n\n - nfc: nfcmrvl_uart: fix OF child-node lookup (bsc#1051510).\n\n - nfs: Avoid quadratic search when freeing delegations (bsc#1084760).\n\n - nvdimm: Clarify comment in sizeof_namespace_index (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Remove empty if statement (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Split label init out from the logic for getting config data (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Use namespace index data to reduce number of label reads needed (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - of: add helper to lookup compatible child node (bsc#1106110)\n\n - orangefs: fix deadlock; do not write i_size in read_iter (bsc#1051510).\n\n - orangefs: initialize op on loop restart in orangefs_devreq_read (bsc#1051510).\n\n - orangefs_kill_sb(): deal with allocation failures (bsc#1051510).\n\n - orangefs: use list_for_each_entry_safe in purge_waiting_ops (bsc#1051510).\n\n - ovl: fix format of setxattr debug (git-fixes).\n\n - ovl: Sync upper dirty data when syncing overlayfs (git-fixes).\n\n - pci/ASPM: Fix link_state teardown on device removal (bsc#1051510).\n\n - pci: hv: Do not wait forever on a device that has disappeared (bsc#1109806).\n\n - pci: Reprogram bridge prefetch registers on resume (bsc#1051510).\n\n - powerpc/mm/hugetlb: initialize the pagetable cache correctly for hugetlb (bsc#1091800).\n\n - powerpc/powernv/ioda2: Reduce upper limit for DMA window size (bsc#1055120).\n\n - powerpc/pseries: Fix build break for SPLPAR=n and CPU hotplug (bsc#1079524, git-fixes).\n\n - powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906, git-fixes).\n\n - powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on /cpus' during DLPAR (bsc#1113295).\n\n - powerpc: pseries: remove dlpar_attach_node dependency on full path (bsc#1113295).\n\n - powerpc/rtas: Fix a potential race between CPU-Offline & Migration (bsc#1111870).\n\n - printk: drop in_nmi check from printk_safe_flush_on_panic() (bsc#1112170).\n\n - printk/tracing: Do not trace printk_nmi_enter() (bsc#1112208).\n\n - proc: restrict kernel stack dumps to root (git-fixes).\n blacklist.conf :\n\n - qmi_wwan: Added support for Gemalto's Cinterion ALASxx WWAN interface (bsc#1051510).\n\n - qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).\n\n - r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing RTL_FLAG_TASK_ENABLED (bsc#1051510).\n\n - random: rate limit unseeded randomness warnings (git-fixes).\n\n - rculist: add list_for_each_entry_from_rcu() (bsc#1084760).\n\n - rculist: Improve documentation for list_for_each_entry_from_rcu() (bsc#1084760).\n\n - reiserfs: add check to detect corrupted directory entry (bsc#1109818).\n\n - reiserfs: do not panic on bad directory entries (bsc#1109818).\n\n - scsi: core: Allow state transitions from OFFLINE to BLOCKED (bsc#1112246).\n\n - scsi: ipr: Eliminate duplicate barriers ().\n\n - scsi: ipr: fix incorrect indentation of assignment statement ().\n\n - scsi: ipr: Use dma_pool_zalloc() ().\n\n - scsi: libfc: check fc_frame_payload_get() return value for null (bsc#1104731).\n\n - scsi: libfc: retry PRLI if we cannot analyse the payload (bsc#1104731).\n\n - scsi: qla2xxx: Fix memory leak for allocating abort IOCB (bsc#1111830).\n\n - scsi: target: prefer dbroot of /etc/target over /var/target (bsc#1111928).\n\n - serial: 8250: Fix clearing FIFOs in RS485 mode again (bsc#1051510).\n\n - series.conf: moved some Xen patches to the sorted region xen/blkfront: correct purging of persistent grants (bnc#1112514).\n\n - signal: Properly deliver SIGSEGV from x86 uprobes (bsc#1110006).\n\n - smb2: fix missing files in root share directory listing (bsc#1112907).\n\n - smb3: fill in statfs fsid and correct namelen (bsc#1112905).\n\n - smb3: fix reset of bytes read and written stats (bsc#1112906).\n\n - smb3: on reconnect set PreviousSessionId field (bsc#1112899).\n\n - sock_diag: fix use-after-free read in __sk_free (bsc#1051510).\n\n - soc/tegra: pmc: Fix child-node lookup (bsc#1051510).\n\n - sound: do not call skl_init_chip() to reset intel skl soc (bsc#1051510).\n\n - sound: enable interrupt after dma buffer initialization (bsc#1051510).\n\n - spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).\n\n - spi: bcm-qspi: switch back to reading flash using smaller chunks (bsc#1051510).\n\n - spi: sh-msiof: fix deferred probing (bsc#1051510).\n\n - squashfs: more metadata hardening (bsc#1051510).\n\n - staging: comedi: ni_mio_common: protect register write overflow (bsc#1051510).\n\n - stm: Potential read overflow in stm_char_policy_set_ioctl() (bsc#1051510).\n\n - switchtec: Fix Spectre v1 vulnerability (bsc#1051510).\n\n - sysfs: Do not return POSIX ACL xattrs via listxattr (git-fixes).\n\n - target: log Data-Out timeouts as errors (bsc#1095805).\n\n - target: log NOP ping timeouts as errors (bsc#1095805).\n\n - target: split out helper for cxn timeout error stashing (bsc#1095805).\n\n - target: stash sess_err_stats on Data-Out timeout (bsc#1095805).\n\n - target: use ISCSI_IQN_LEN in iscsi_target_stat (bsc#1095805).\n\n - team: Forbid enslaving team device to itself (bsc#1051510).\n\n - tools build: fix # escaping in .cmd files for future Make (git-fixes).\n\n - tools/vm/page-types.c: fix 'defined but not used' warning (bsc#1051510).\n\n - tools/vm/slabinfo.c: fix sign-compare warning (bsc#1051510).\n\n - tracing: Add barrier to trace_printk() buffer nesting modification (bsc#1112219).\n\n - tty: fix data race between tty_init_dev and flush of buf (bnc#1105428).\n\n - tty: Hold tty_ldisc_lock() during tty_reopen() (bnc#1105428).\n\n - tty/ldsem: Add lockdep asserts for ldisc_sem (bnc#1105428).\n\n - tty/ldsem: Convert to regular lockdep annotations (bnc#1105428).\n\n - tty/ldsem: Decrement wait_readers on timeouted down_read() (bnc#1105428).\n\n - tty/ldsem: Wake up readers after timed out down_write() (bnc#1105428).\n\n - tty: Simplify tty->count math in tty_reopen() (bnc#1105428).\n\n - usb: chipidea: Prevent unbalanced IRQ disable (bsc#1051510).\n\n - usb: gadget: fotg210-udc: Fix memory leak of fotg210->ep[i] (bsc#1051510).\n\n - usb: gadget: fsl_udc_core: check allocation return value and cleanup on failure (bsc#1051510).\n\n - usb: gadget: fsl_udc_core: fixup struct_udc_setup documentation (bsc#1051510).\n\n - usbip: tools: fix atoi() on non-null terminated string (bsc#1051510).\n\n - usb: remove LPM management from usb_driver_claim_interface() (bsc#1051510).\n\n - usb: serial: cypress_m8: fix interrupt-out transfer length (bsc#1051510).\n\n - usb: serial: simple: add Motorola Tetra MTP6550 id (bsc#1051510).\n\n - usb: xhci-mtk: resume USB3 roothub first (bsc#1051510).\n\n - usb: yurex: Check for truncation in yurex_read() (bsc#1051510).\n\n - userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait() pte access (bsc#1109739).\n\n - Use upstream version of pci-hyperv patch (35a88a1)\n\n - vmbus: do not return values for uninitalized channels (bsc#1051510).\n\n - vti4: Do not count header length twice on tunnel setup (bsc#1051510).\n\n - vti6: fix PMTU caching and reporting on xmit (bsc#1051510).\n\n - vti6: remove !skb->ignore_df check from vti6_xmit() (bsc#1051510).\n\n - Workaround for mysterious NVMe breakage with i915 CFL (bsc#1111040).\n\n - x86/acpi: Prevent X2APIC id 0xffffffff from being accounted (bsc#1110006).\n\n - x86/boot/KASLR: Work around firmware bugs by excluding EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice (bnc#1112878).\n\n - x86/boot: Move EISA setup to a separate file (bsc#1110006).\n\n - x86/cpufeature: Add User-Mode Instruction Prevention definitions (bsc#1110006).\n\n - x86/cpufeatures: Add Intel Total Memory Encryption cpufeature (bsc#1110006).\n\n - x86/eisa: Add missing include (bsc#1110006).\n\n - x86/EISA: Do not probe EISA bus for Xen PV guests (bsc#1110006).\n\n - x86/fpu: Remove second definition of fpu in\n __fpu__restore_sig() (bsc#1110006).\n\n - x86/kasan: Panic if there is not enough memory to boot (bsc#1110006).\n\n - x86/MCE: Fix stack out-of-bounds write in mce-inject.c:\n Flags_read() (bsc#1110006).\n\n - x86/paravirt: Fix some warning messages (bnc#1065600).\n\n - x86/percpu: Fix this_cpu_read() (bsc#1110006).\n\n - x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() on 32bit (bsc#1105536).\n\n - x86/time: Correct the attribute on jiffies' definition (bsc#1110006).\n\n - xen/gntdev: avoid out of bounds access in case of partial gntdev_mmap() (bnc#1065600).\n\n - xen: Remove unnecessary BUG_ON from __unbind_from_irq() (bnc#1065600).\n\n - xen-swiotlb: fix the check condition for xen_swiotlb_free_coherent (bnc#1065600).\n\n - xfrm: use complete IPv6 addresses for hash (bsc#1109330).\n\n - xfs: do not fail when converting shortform attr to long form during ATTR_REPLACE (bsc#1105025).\n\n - xhci: Add missing CAS workaround for Intel Sunrise Point xHCI (bsc#1051510).\n\n - xhci: Do not print a warning when setting link state for disabled ports (bsc#1051510).", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-03-27T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2019-893)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-16533", "CVE-2017-18224", "CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18386", "CVE-2018-18445", "CVE-2018-18710"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.0"], "id": "OPENSUSE-2019-893.NASL", "href": "https://www.tenable.com/plugins/nessus/123366", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-893.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(123366);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-16533\", \"CVE-2017-18224\", \"CVE-2018-10940\", \"CVE-2018-16658\", \"CVE-2018-18386\", \"CVE-2018-18445\", \"CVE-2018-18710\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2019-893)\");\n script_summary(english:\"Check for the openSUSE-2019-893 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE Leap 15.0 kernel was updated to receive various security\nand bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-18710: An information leak in\n cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could\n be used by local attackers to read kernel memory because\n a cast from unsigned long to int interferes with bounds\n checking. This is similar to CVE-2018-10940 and\n CVE-2018-16658 (bnc#1113751).\n\n - CVE-2018-18445: Faulty computation of numeric bounds in\n the BPF verifier permitted out-of-bounds memory accesses\n because adjust_scalar_min_max_vals in\n kernel/bpf/verifier.c mishandled 32-bit right shifts\n (bnc#1112372).\n\n - CVE-2018-18386: drivers/tty/n_tty.c allowed local\n attackers (who are able to access pseudo terminals) to\n hang/block further usage of any pseudo terminal devices\n due to an EXTPROC versus ICANON confusion in TIOCINQ\n (bnc#1094825).\n\n - CVE-2017-18224: fs/ocfs2/aops.c omitted use of a\n semaphore and consequently has a race condition for\n access to the extent tree during read operations in\n DIRECT mode, which allowed local users to cause a denial\n of service (BUG) by modifying a certain e_cpos field\n (bnc#1084831).\n\n - CVE-2017-16533: The usbhid_parse function in\n drivers/hid/usbhid/hid-core.c allowed local users to\n cause a denial of service (out-of-bounds read and system\n crash) or possibly have unspecified other impact via a\n crafted USB device (bnc#1066674).\n\nThe following non-security bugs were fixed :\n\n - acpi / processor: Fix the return value of\n acpi_processor_ids_walk() (bsc#1051510).\n\n - aio: fix io_destroy(2) vs. lookup_ioctx() race\n (git-fixes).\n\n - alsa: hda: Add 2 more models to the power_save blacklist\n (bsc#1051510).\n\n - alsa: hda - Add mic quirk for the Lenovo G50-30\n (17aa:3905) (bsc#1051510).\n\n - alsa: hda - Add quirk for ASUS G751 laptop\n (bsc#1051510).\n\n - alsa: hda - Fix headphone pin config for ASUS G751\n (bsc#1051510).\n\n - alsa: hda: fix unused variable warning (bsc#1051510).\n\n - alsa: hda/realtek - Fix the problem of the front MIC on\n the Lenovo M715 (bsc#1051510).\n\n - alsa: usb-audio: update quirk for B&W PX to remove\n microphone (bsc#1051510).\n\n - apparmor: Check buffer bounds when mapping permissions\n mask (git-fixes).\n\n - ASoC: intel: skylake: Add missing break in\n skl_tplg_get_token() (bsc#1051510).\n\n - ASoC: Intel: Skylake: Reset the controller in probe\n (bsc#1051510).\n\n - ASoC: rsnd: adg: care clock-frequency size\n (bsc#1051510).\n\n - ASoC: rsnd: do not fallback to PIO mode when\n -EPROBE_DEFER (bsc#1051510).\n\n - ASoC: rt5514: Fix the issue of the delay volume applied\n again (bsc#1051510).\n\n - ASoC: sigmadsp: safeload should not have lower byte\n limit (bsc#1051510).\n\n - ASoC: wm8804: Add ACPI support (bsc#1051510).\n\n - ath10k: fix kernel panic issue during pci probe\n (bsc#1051510).\n\n - ath10k: fix scan crash due to incorrect length\n calculation (bsc#1051510).\n\n - ath10k: fix use-after-free in ath10k_wmi_cmd_send_nowait\n (bsc#1051510).\n\n - batman-adv: Avoid probe ELP information leak\n (bsc#1051510).\n\n - batman-adv: fix backbone_gw refcount on queue_work()\n failure (bsc#1051510).\n\n - batman-adv: fix hardif_neigh refcount on queue_work()\n failure (bsc#1051510).\n\n - bdi: Fix another oops in wb_workfn() (bsc#1112746).\n\n - bdi: Preserve kabi when adding cgwb_release_mutex\n (bsc#1112746).\n\n - blkdev_report_zones_ioctl(): Use vmalloc() to allocate\n large buffers (bsc#1111819).\n\n - blk-mq: I/O and timer unplugs are inverted in blktrace\n (bsc#1112713).\n\n - block, bfq: fix wrong init of saved start time for\n weight raising (bsc#1112708).\n\n - block: bfq: swap puts in bfqg_and_blkg_put\n (bsc#1112712).\n\n - block: bvec_nr_vecs() returns value for wrong slab\n (bsc#1111834).\n\n - bpf/verifier: disallow pointer subtraction\n (bsc#1083647).\n\n - btrfs: Enhance btrfs_trim_fs function to handle error\n better (Dependency for bsc#1113667).\n\n - btrfs: Ensure btrfs_trim_fs can trim the whole\n filesystem (bsc#1113667).\n\n - btrfs: fix file data corruption after cloning a range\n and fsync (bsc#1111901).\n\n - btrfs: fix missing error return in btrfs_drop_snapshot\n (Git-fixes bsc#1109919).\n\n - btrfs: fix mount failure after fsync due to hard link\n recreation (bsc#1103543).\n\n - btrfs: handle errors while updating refcounts in\n update_ref_for_cow (Git-fixes bsc#1109915).\n\n - btrfs: send, fix invalid access to commit roots due to\n concurrent snapshotting (bsc#1111904).\n\n - cdc-acm: fix race between reset and control messaging\n (bsc#1051510).\n\n - ceph: avoid a use-after-free in ceph_destroy_options()\n (bsc#1111983).\n\n - cifs: check for STATUS_USER_SESSION_DELETED\n (bsc#1112902).\n\n - cifs: fix memory leak in SMB2_open() (bsc#1112894).\n\n - cifs: Fix use after free of a mid_q_entry (bsc#1112903).\n\n - clk: x86: add 'ether_clk' alias for Bay Trail / Cherry\n Trail (bsc#1051510).\n\n - clk: x86: Stop marking clocks as CLK_IS_CRITICAL\n (bsc#1051510).\n\n - clocksource/drivers/ti-32k: Add\n CLOCK_SOURCE_SUSPEND_NONSTOP flag for non-am43 SoCs\n (bsc#1051510).\n\n - clocksource/drivers/timer-atmel-pit: Properly handle\n error cases (bsc#1051510).\n\n - coda: fix 'kernel memory exposure attempt' in fsync\n (bsc#1051510).\n\n - crypto: caam - fix implicit casts in endianness helpers\n (bsc#1051510).\n\n - crypto: chelsio - Fix memory corruption in DMA Mapped\n buffers (bsc#1051510).\n\n - crypto: lrw - Fix out-of bounds access on counter\n overflow (bsc#1051510).\n\n - crypto: tcrypt - fix ghash-generic speed test\n (bsc#1051510).\n\n - dax: Fix deadlock in dax_lock_mapping_entry()\n (bsc#1109951).\n\n - debugobjects: Make stack check warning more informative\n (bsc#1051510).\n\n - documentation/l1tf: Fix small spelling typo\n (bsc#1051510).\n\n - drm/amdgpu: Fix SDMA HQD destroy error on gfx_v7\n (bsc#1051510).\n\n - drm/amdgpu: Fix vce work queue was not cancelled when\n suspend (bsc#1106110)\n\n - drm/amdgpu/powerplay: fix missing break in switch\n statements (bsc#1113722)\n\n - drm/edid: VSDB yCBCr420 Deep Color mode bit definitions\n (bsc#1051510).\n\n - drm/hisilicon: hibmc: Do not carry error code in HiBMC\n framebuffer (bsc#1113722)\n\n - drm/hisilicon: hibmc: Do not overwrite fb helper surface\n depth (bsc#1113722)\n\n - drm/i915/audio: Hook up component bindings even if\n displays are (bsc#1113722)\n\n - drm/i915/dp: Link train Fallback on eDP only if fallback\n link BW can fit panel's native mode (bsc#1051510).\n\n - drm/i915/gen9+: Fix initial readout for Y tiled\n framebuffers (bsc#1113722)\n\n - drm/i915/glk: Add Quirk for GLK NUC HDMI port issues\n (bsc#1051510).\n\n - drm/i915: Restore vblank interrupts earlier\n (bsc#1051510).\n\n - drm: mali-dp: Call drm_crtc_vblank_reset on device init\n (bsc#1051510).\n\n - drm/mediatek: fix OF sibling-node lookup (bsc#1106110)\n\n - drm/msm: fix OF child-node lookup (bsc#1106110)\n\n - drm/nouveau: Do not disable polling in fallback mode\n (bsc#1103356).\n\n - drm/sti: do not remove the drm_bridge that was never\n added (bsc#1100132)\n\n - drm/sun4i: Fix an ulong overflow in the dotclock driver\n (bsc#1106110)\n\n - drm/virtio: fix bounds check in\n virtio_gpu_cmd_get_capset() (bsc#1113722)\n\n - e1000: check on netif_running() before calling\n e1000_up() (bsc#1051510).\n\n - e1000: ensure to free old tx/rx rings in set_ringparam()\n (bsc#1051510).\n\n - eeprom: at24: change nvmem stride to 1 (bsc#1051510).\n\n - eeprom: at24: check at24_read/write arguments\n (bsc#1051510).\n\n - eeprom: at24: correctly set the size for at24mac402\n (bsc#1051510).\n\n - enic: do not call enic_change_mtu in enic_probe\n (bsc#1051510).\n\n - enic: handle mtu change for vf properly (bsc#1051510).\n\n - enic: initialize enic->rfs_h.lock in enic_probe\n (bsc#1051510).\n\n - ethtool: fix a privilege escalation bug (bsc#1076830).\n\n - ext2, dax: set ext2_dax_aops for dax files\n (bsc#1112554).\n\n - ext4: avoid arithemetic overflow that can trigger a BUG\n (bsc#1112736).\n\n - ext4: avoid divide by zero fault when deleting corrupted\n inline directories (bsc#1112735).\n\n - ext4: check for NUL characters in extended attribute's\n name (bsc#1112732).\n\n - ext4: check to make sure the rename(2)'s destination is\n not freed (bsc#1112734).\n\n - ext4: do not mark mmp buffer head dirty (bsc#1112743).\n\n - ext4: fix online resize's handling of a too-small final\n block group (bsc#1112739).\n\n - ext4: fix online resizing for bigalloc file systems with\n a 1k block size (bsc#1112740).\n\n - ext4: fix spectre gadget in ext4_mb_regular_allocator()\n (bsc#1112733).\n\n - ext4: recalucate superblock checksum after updating free\n blocks/inodes (bsc#1112738).\n\n - ext4: reset error code in ext4_find_entry in fallback\n (bsc#1112731).\n\n - ext4: show test_dummy_encryption mount option in\n /proc/mounts (bsc#1112741).\n\n - fbdev/omapfb: fix omapfb_memory_read infoleak\n (bsc#1051510).\n\n - fs/quota: Fix spectre gadget in do_quotactl\n (bsc#1112745).\n\n - hfsplus: do not return 0 when fill_super() failed\n (bsc#1051510).\n\n - hfsplus: stop workqueue when fill_super() failed\n (bsc#1051510).\n\n - hfs: prevent crash on exit from failed search\n (bsc#1051510).\n\n - hid: hid-sensor-hub: Force logical minimum to 1 for\n power and report state (bsc#1051510).\n\n - hid: quirks: fix support for Apple Magic Keyboards\n (bsc#1051510).\n\n - hid: sensor-hub: Restore fixup for Lenovo ThinkPad Helix\n 2 sensor hub report (bsc#1051510).\n\n - hv: avoid crash in vmbus sysfs files (bnc#1108377).\n\n - hv_netvsc: fix schedule in RCU context ().\n\n - hwrng: core - document the quality field (bsc#1051510).\n\n - hypfs_kill_super(): deal with failed allocations\n (bsc#1051510).\n\n - i2c: i2c-scmi: fix for i2c_smbus_write_block_data\n (bsc#1051510).\n\n - i2c: rcar: cleanup DMA for all kinds of failure\n (bsc#1051510).\n\n - iio: adc: at91: fix acking DRDY irq on simple\n conversions (bsc#1051510).\n\n - iio: adc: at91: fix wrong channel number in triggered\n buffer mode (bsc#1051510).\n\n - iio: adc: imx25-gcq: Fix leak of device_node in\n mx25_gcq_setup_cfgs() (bsc#1051510).\n\n - input: atakbd - fix Atari CapsLock behaviour\n (bsc#1051510).\n\n - input: atakbd - fix Atari keymap (bsc#1051510).\n\n - intel_th: pci: Add Ice Lake PCH support (bsc#1051510).\n\n - iommu/arm-smmu: Error out only if not enough context\n interrupts (bsc#1106237).\n\n - iommu/vt-d: Add definitions for PFSID (bsc#1106237).\n\n - iommu/vt-d: Fix dev iotlb pfsid use (bsc#1106237).\n\n - iommu/vt-d: Fix scatterlist offset handling\n (bsc#1106237).\n\n - iwlwifi: dbg: do not crash if the firmware crashes in\n the middle of a debug dump (bsc#1051510).\n\n - iwlwifi: mvm: Allow TKIP for AP mode (bsc#1051510).\n\n - iwlwifi: mvm: check for n_profiles validity in EWRD ACPI\n (bsc#1051510).\n\n - iwlwifi: mvm: clear HW_RESTART_REQUESTED when stopping\n the interface (bsc#1051510).\n\n - iwlwifi: mvm: open BA session only when sta is\n authorized (bsc#1051510).\n\n - iwlwifi: mvm: send BCAST management frames to the right\n station (bsc#1051510).\n\n - iwlwifi: pcie: gen2: build A-MSDU only for GSO\n (bsc#1051510).\n\n - iwlwifi: pcie gen2: check iwl_pcie_gen2_set_tb() return\n value (bsc#1051510).\n\n - jbd2: fix use after free in jbd2_log_do_checkpoint()\n (bsc#1113257).\n\n - kABI: Hide get_msr_feature() in kvm_x86_ops\n (bsc#1106240).\n\n - Kbuild: fix # escaping in .cmd files for future Make\n (git-fixes).\n\n - kernfs: update comment about kernfs_path() return value\n (bsc#1051510).\n\n - kprobes/x86: Fix %p uses in error messages\n (bsc#1110006).\n\n - ksm: fix unlocked iteration over vmas in\n cmp_and_merge_page() (VM Functionality bsc#1111806).\n\n - kvm: Make VM ioctl do valloc for some archs\n (bsc#1111506).\n\n - kvm: SVM: Add MSR-based feature support for serializing\n LFENCE (bsc#1106240).\n\n - kvm: VMX: support MSR_IA32_ARCH_CAPABILITIES as a\n feature MSR (bsc#1106240).\n\n - kvm: VMX: Tell the nested hypervisor to skip L1D flush\n on vmentry (bsc#1106240).\n\n - kvm: x86: Add a framework for supporting MSR-based\n features (bsc#1106240).\n\n - kvm: x86: define SVM/VMX specific\n kvm_arch_[alloc|free]_vm (bsc#1111506).\n\n - kvm: X86: Introduce kvm_get_msr_feature() (bsc#1106240).\n\n - kvm/x86: kABI fix for vm_alloc/vm_free changes\n (bsc#1111506).\n\n - kvm: x86: Set highest physical address bits in\n non-present/reserved SPTEs (bsc#1106240).\n\n - libertas: call into generic suspend code before turning\n off power (bsc#1051510).\n\n - libnvdimm, dimm: Maximize label transfer size\n (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - libnvdimm, label: change nvdimm_num_label_slots per UEFI\n 2.7 (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - libnvdimm, label: Fix sparse warning (bsc#1111921,\n bsc#1113408, bsc#1113972).\n\n - lib/ubsan: add type mismatch handler for new GCC/Clang\n (bsc#1051510).\n\n - lib/ubsan.c: s/missaligned/misaligned/ (bsc#1051510).\n\n - loop: add recursion validation to LOOP_CHANGE_FD\n (bsc#1112711).\n\n - loop: do not call into filesystem while holding\n lo_ctl_mutex (bsc#1112710).\n\n - loop: fix LOOP_GET_STATUS lock imbalance (bsc#1113284).\n\n - mac80211: minstrel: fix using short preamble CCK rates\n on HT clients (bsc#1051510).\n\n - mach64: detect the dot clock divider correctly on sparc\n (bsc#1051510).\n\n - media: af9035: prevent buffer overflow on write\n (bsc#1051510).\n\n - media: cx231xx: fix potential sign-extension overflow on\n large shift (bsc#1051510).\n\n - media: dvb: fix compat ioctl translation (bsc#1051510).\n\n - media: em28xx: fix input name for Terratec AV 350\n (bsc#1051510).\n\n - media: em28xx: use a default format if TRY_FMT fails\n (bsc#1051510).\n\n - media: pci: cx23885: handle adding to list failure\n (bsc#1051510).\n\n - media: tvp5150: avoid going past array on\n v4l2_querymenu() (bsc#1051510).\n\n - media: tvp5150: fix switch exit in set control handler\n (bsc#1051510).\n\n - media: tvp5150: fix width alignment during\n set_selection() (bsc#1051510).\n\n - media: uvcvideo: Fix uvc_alloc_entity() allocation\n alignment (bsc#1051510).\n\n - media: v4l2-tpg: fix kernel oops when enabling HFLIP and\n OSD (bsc#1051510).\n\n - media: vsp1: Fix YCbCr planar formats pitch calculation\n (bsc#1051510).\n\n - mfd: arizona: Correct calling of runtime_put_sync\n (bsc#1051510).\n\n - mmc: block: avoid multiblock reads for the last sector\n in SPI mode (bsc#1051510).\n\n - mm: fix BUG_ON() in vmf_insert_pfn_pud() from\n VM_MIXEDMAP removal (bsc#1111841).\n\n - mm/migrate: Use spin_trylock() while resetting rate\n limit ().\n\n - mm: /proc/pid/pagemap: hide swap entries from\n unprivileged users (Git-fixes bsc#1109907).\n\n - move changes without Git-commit out of sorted section\n\n - nfc: nfcmrvl_uart: fix OF child-node lookup\n (bsc#1051510).\n\n - nfs: Avoid quadratic search when freeing delegations\n (bsc#1084760).\n\n - nvdimm: Clarify comment in sizeof_namespace_index\n (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Remove empty if statement (bsc#1111921,\n bsc#1113408, bsc#1113972).\n\n - nvdimm: Sanity check labeloff (bsc#1111921, bsc#1113408,\n bsc#1113972).\n\n - nvdimm: Split label init out from the logic for getting\n config data (bsc#1111921, bsc#1113408, bsc#1113972).\n\n - nvdimm: Use namespace index data to reduce number of\n label reads needed (bsc#1111921, bsc#1113408,\n bsc#1113972).\n\n - of: add helper to lookup compatible child node\n (bsc#1106110)\n\n - orangefs: fix deadlock; do not write i_size in read_iter\n (bsc#1051510).\n\n - orangefs: initialize op on loop restart in\n orangefs_devreq_read (bsc#1051510).\n\n - orangefs_kill_sb(): deal with allocation failures\n (bsc#1051510).\n\n - orangefs: use list_for_each_entry_safe in\n purge_waiting_ops (bsc#1051510).\n\n - ovl: fix format of setxattr debug (git-fixes).\n\n - ovl: Sync upper dirty data when syncing overlayfs\n (git-fixes).\n\n - pci/ASPM: Fix link_state teardown on device removal\n (bsc#1051510).\n\n - pci: hv: Do not wait forever on a device that has\n disappeared (bsc#1109806).\n\n - pci: Reprogram bridge prefetch registers on resume\n (bsc#1051510).\n\n - powerpc/mm/hugetlb: initialize the pagetable cache\n correctly for hugetlb (bsc#1091800).\n\n - powerpc/powernv/ioda2: Reduce upper limit for DMA window\n size (bsc#1055120).\n\n - powerpc/pseries: Fix build break for SPLPAR=n and CPU\n hotplug (bsc#1079524, git-fixes).\n\n - powerpc/pseries: Fix CONFIG_NUMA=n build (bsc#1067906,\n git-fixes).\n\n - powerpc/pseries: Fix 'OF: ERROR: Bad of_node_put() on\n /cpus' during DLPAR (bsc#1113295).\n\n - powerpc: pseries: remove dlpar_attach_node dependency on\n full path (bsc#1113295).\n\n - powerpc/rtas: Fix a potential race between CPU-Offline &\n Migration (bsc#1111870).\n\n - printk: drop in_nmi check from\n printk_safe_flush_on_panic() (bsc#1112170).\n\n - printk/tracing: Do not trace printk_nmi_enter()\n (bsc#1112208).\n\n - proc: restrict kernel stack dumps to root (git-fixes).\n blacklist.conf :\n\n - qmi_wwan: Added support for Gemalto's Cinterion ALASxx\n WWAN interface (bsc#1051510).\n\n - qrtr: add MODULE_ALIAS macro to smd (bsc#1051510).\n\n - r8169: Clear RTL_FLAG_TASK_*_PENDING when clearing\n RTL_FLAG_TASK_ENABLED (bsc#1051510).\n\n - random: rate limit unseeded randomness warnings\n (git-fixes).\n\n - rculist: add list_for_each_entry_from_rcu()\n (bsc#1084760).\n\n - rculist: Improve documentation for\n list_for_each_entry_from_rcu() (bsc#1084760).\n\n - reiserfs: add check to detect corrupted directory entry\n (bsc#1109818).\n\n - reiserfs: do not panic on bad directory entries\n (bsc#1109818).\n\n - scsi: core: Allow state transitions from OFFLINE to\n BLOCKED (bsc#1112246).\n\n - scsi: ipr: Eliminate duplicate barriers ().\n\n - scsi: ipr: fix incorrect indentation of assignment\n statement ().\n\n - scsi: ipr: Use dma_pool_zalloc() ().\n\n - scsi: libfc: check fc_frame_payload_get() return value\n for null (bsc#1104731).\n\n - scsi: libfc: retry PRLI if we cannot analyse the payload\n (bsc#1104731).\n\n - scsi: qla2xxx: Fix memory leak for allocating abort IOCB\n (bsc#1111830).\n\n - scsi: target: prefer dbroot of /etc/target over\n /var/target (bsc#1111928).\n\n - serial: 8250: Fix clearing FIFOs in RS485 mode again\n (bsc#1051510).\n\n - series.conf: moved some Xen patches to the sorted region\n xen/blkfront: correct purging of persistent grants\n (bnc#1112514).\n\n - signal: Properly deliver SIGSEGV from x86 uprobes\n (bsc#1110006).\n\n - smb2: fix missing files in root share directory listing\n (bsc#1112907).\n\n - smb3: fill in statfs fsid and correct namelen\n (bsc#1112905).\n\n - smb3: fix reset of bytes read and written stats\n (bsc#1112906).\n\n - smb3: on reconnect set PreviousSessionId field\n (bsc#1112899).\n\n - sock_diag: fix use-after-free read in __sk_free\n (bsc#1051510).\n\n - soc/tegra: pmc: Fix child-node lookup (bsc#1051510).\n\n - sound: do not call skl_init_chip() to reset intel skl\n soc (bsc#1051510).\n\n - sound: enable interrupt after dma buffer initialization\n (bsc#1051510).\n\n - spi/bcm63xx-hsspi: keep pll clk enabled (bsc#1051510).\n\n - spi: bcm-qspi: switch back to reading flash using\n smaller chunks (bsc#1051510).\n\n - spi: sh-msiof: fix deferred probing (bsc#1051510).\n\n - squashfs: more metadata hardening (bsc#1051510).\n\n - staging: comedi: ni_mio_common: protect register write\n overflow (bsc#1051510).\n\n - stm: Potential read overflow in\n stm_char_policy_set_ioctl() (bsc#1051510).\n\n - switchtec: Fix Spectre v1 vulnerability (bsc#1051510).\n\n - sysfs: Do not return POSIX ACL xattrs via listxattr\n (git-fixes).\n\n - target: log Data-Out timeouts as errors (bsc#1095805).\n\n - target: log NOP ping timeouts as errors (bsc#1095805).\n\n - target: split out helper for cxn timeout error stashing\n (bsc#1095805).\n\n - target: stash sess_err_stats on Data-Out timeout\n (bsc#1095805).\n\n - target: use ISCSI_IQN_LEN in iscsi_target_stat\n (bsc#1095805).\n\n - team: Forbid enslaving team device to itself\n (bsc#1051510).\n\n - tools build: fix # escaping in .cmd files for future\n Make (git-fixes).\n\n - tools/vm/page-types.c: fix 'defined but not used'\n warning (bsc#1051510).\n\n - tools/vm/slabinfo.c: fix sign-compare warning\n (bsc#1051510).\n\n - tracing: Add barrier to trace_printk() buffer nesting\n modification (bsc#1112219).\n\n - tty: fix data race between tty_init_dev and flush of buf\n (bnc#1105428).\n\n - tty: Hold tty_ldisc_lock() during tty_reopen()\n (bnc#1105428).\n\n - tty/ldsem: Add lockdep asserts for ldisc_sem\n (bnc#1105428).\n\n - tty/ldsem: Convert to regular lockdep annotations\n (bnc#1105428).\n\n - tty/ldsem: Decrement wait_readers on timeouted\n down_read() (bnc#1105428).\n\n - tty/ldsem: Wake up readers after timed out down_write()\n (bnc#1105428).\n\n - tty: Simplify tty->count math in tty_reopen()\n (bnc#1105428).\n\n - usb: chipidea: Prevent unbalanced IRQ disable\n (bsc#1051510).\n\n - usb: gadget: fotg210-udc: Fix memory leak of\n fotg210->ep[i] (bsc#1051510).\n\n - usb: gadget: fsl_udc_core: check allocation return value\n and cleanup on failure (bsc#1051510).\n\n - usb: gadget: fsl_udc_core: fixup struct_udc_setup\n documentation (bsc#1051510).\n\n - usbip: tools: fix atoi() on non-null terminated string\n (bsc#1051510).\n\n - usb: remove LPM management from\n usb_driver_claim_interface() (bsc#1051510).\n\n - usb: serial: cypress_m8: fix interrupt-out transfer\n length (bsc#1051510).\n\n - usb: serial: simple: add Motorola Tetra MTP6550 id\n (bsc#1051510).\n\n - usb: xhci-mtk: resume USB3 roothub first (bsc#1051510).\n\n - usb: yurex: Check for truncation in yurex_read()\n (bsc#1051510).\n\n - userfaultfd: hugetlbfs: fix userfaultfd_huge_must_wait()\n pte access (bsc#1109739).\n\n - Use upstream version of pci-hyperv patch (35a88a1)\n\n - vmbus: do not return values for uninitalized channels\n (bsc#1051510).\n\n - vti4: Do not count header length twice on tunnel setup\n (bsc#1051510).\n\n - vti6: fix PMTU caching and reporting on xmit\n (bsc#1051510).\n\n - vti6: remove !skb->ignore_df check from vti6_xmit()\n (bsc#1051510).\n\n - Workaround for mysterious NVMe breakage with i915 CFL\n (bsc#1111040).\n\n - x86/acpi: Prevent X2APIC id 0xffffffff from being\n accounted (bsc#1110006).\n\n - x86/boot/KASLR: Work around firmware bugs by excluding\n EFI_BOOT_SERVICES_* and EFI_LOADER_* from KASLR's choice\n (bnc#1112878).\n\n - x86/boot: Move EISA setup to a separate file\n (bsc#1110006).\n\n - x86/cpufeature: Add User-Mode Instruction Prevention\n definitions (bsc#1110006).\n\n - x86/cpufeatures: Add Intel Total Memory Encryption\n cpufeature (bsc#1110006).\n\n - x86/eisa: Add missing include (bsc#1110006).\n\n - x86/EISA: Do not probe EISA bus for Xen PV guests\n (bsc#1110006).\n\n - x86/fpu: Remove second definition of fpu in\n __fpu__restore_sig() (bsc#1110006).\n\n - x86/kasan: Panic if there is not enough memory to boot\n (bsc#1110006).\n\n - x86/MCE: Fix stack out-of-bounds write in mce-inject.c:\n Flags_read() (bsc#1110006).\n\n - x86/paravirt: Fix some warning messages (bnc#1065600).\n\n - x86/percpu: Fix this_cpu_read() (bsc#1110006).\n\n - x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit()\n on 32bit (bsc#1105536).\n\n - x86/time: Correct the attribute on jiffies' definition\n (bsc#1110006).\n\n - xen/gntdev: avoid out of bounds access in case of\n partial gntdev_mmap() (bnc#1065600).\n\n - xen: Remove unnecessary BUG_ON from __unbind_from_irq()\n (bnc#1065600).\n\n - xen-swiotlb: fix the check condition for\n xen_swiotlb_free_coherent (bnc#1065600).\n\n - xfrm: use complete IPv6 addresses for hash\n (bsc#1109330).\n\n - xfs: do not fail when converting shortform attr to long\n form during ATTR_REPLACE (bsc#1105025).\n\n - xhci: Add missing CAS workaround for Intel Sunrise Point\n xHCI (bsc#1051510).\n\n - xhci: Do not print a warning when setting link state for\n disabled ports (bsc#1051510).\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1055120\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1065600\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1066674\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1067906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1076830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1079524\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1083647\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1084760\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1084831\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1091800\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1094825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1095805\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1100132\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103356\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1103543\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104124\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1104731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1105025\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1105428\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1105536\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106110\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106237\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1106240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1108377\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109330\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109818\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109911\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109915\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109919\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1109951\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1110006\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111040\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111506\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111806\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111819\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111830\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111834\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111870\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111901\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111904\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111921\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111928\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1111983\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112170\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112173\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112208\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112219\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112221\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112246\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112372\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112514\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112554\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112708\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112710\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112711\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112712\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112713\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112731\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112732\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112733\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112734\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112735\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112736\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112738\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112739\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112740\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112741\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112745\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112746\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112878\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112894\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112899\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112902\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112903\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112905\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112906\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1112907\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113257\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113284\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113295\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113408\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113667\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113722\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.opensuse.org/show_bug.cgi?id=1113972\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected the Linux Kernel packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-docs-html\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-macros\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-obs-qa\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-source-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:opensuse:15.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/11/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/27\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release =~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"openSUSE\");\nif (release !~ \"^(SUSE15\\.0)$\") audit(AUDIT_OS_RELEASE_NOT, \"openSUSE\", \"15.0\", release);\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nourarch = get_kb_item(\"Host/cpu\");\nif (!ourarch) audit(AUDIT_UNKNOWN_ARCH);\nif (ourarch !~ \"^(x86_64)$\") audit(AUDIT_ARCH_NOT, \"x86_64\", ourarch);\n\nflag = 0;\n\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-base-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-debug-devel-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-base-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-default-devel-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-docs-html-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-macros-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-build-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-obs-qa-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-source-vanilla-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-syms-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-base-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-debugsource-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-4.12.14-lp150.12.25.1\") ) flag++;\nif ( rpm_check(release:\"SUSE15.0\", reference:\"kernel-vanilla-devel-debuginfo-4.12.14-lp150.12.25.1\") ) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-03-27T16:02:17", "description": "According to the version of the kernel packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerability :\n\n - An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking.\n This is similar to CVE-2018-10940.(CVE-2018-16658)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}, "published": "2018-12-28T00:00:00", "type": "nessus", "title": "EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2018-1407)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10940", "CVE-2018-16658"], "modified": "2021-01-06T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:kernel-tools-libs-devel", "cpe:/o:huawei:euleros:uvp:2.5.2"], "id": "EULEROS_SA-2018-1407.NASL", "href": "https://www.tenable.com/plugins/nessus/119896", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(119896);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2018-16658\"\n );\n\n script_name(english:\"EulerOS Virtualization 2.5.2 : kernel (EulerOS-SA-2018-1407)\");\n script_summary(english:\"Checks the rpm output for the updated package.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS Virtualization host is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the version of the kernel packages installed, the\nEulerOS Virtualization installation on the remote host is affected by\nthe following vulnerability :\n\n - An issue was discovered in the Linux kernel before\n 4.18.6. An information leak in cdrom_ioctl_drive_status\n in drivers/cdrom/cdrom.c could be used by local\n attackers to read kernel memory because a cast from\n unsigned long to int interferes with bounds checking.\n This is similar to CVE-2018-10940.(CVE-2018-16658)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2018-1407\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?67fe5784\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/28\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:uvp:2.5.2\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (uvp != \"2.5.2\") audit(AUDIT_OS_NOT, \"EulerOS Virtualization 2.5.2\");\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-514.44.5.10_112\",\n \"kernel-devel-3.10.0-514.44.5.10_112\",\n \"kernel-headers-3.10.0-514.44.5.10_112\",\n \"kernel-tools-3.10.0-514.44.5.10_112\",\n \"kernel-tools-libs-3.10.0-514.44.5.10_112\",\n \"kernel-tools-libs-devel-3.10.0-514.44.5.10_112\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 3.6, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2021-08-19T12:05:38", "description": "An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940. (CVE-2018-16658)\n\nImpact\n\nA local user with Advanced Shell ( bash ) access on a BIG-IP system, or with local administrator access on a Traffix system, may be able to use this flaw to gain elevated privileges. In supported configurations on the BIG-IP system, bash access is limited to system administrators.\nBIG-IP appliance mode does not expose this issue, as users are not allowed bash access in this mode. On Traffix systems, only administrators have local access.", "cvss3": {"score": 6.1, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H"}, "published": "2021-03-10T00:00:00", "type": "nessus", "title": "F5 Networks BIG-IP : Linux kernel vulnerability (K40523020)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10940", "CVE-2018-16658"], "modified": "2021-03-12T00:00:00", "cpe": ["cpe:/a:f5:big-ip_access_policy_manager", "cpe:/a:f5:big-ip_advanced_firewall_manager", "cpe:/a:f5:big-ip_application_acceleration_manager", "cpe:/a:f5:big-ip_application_security_manager", "cpe:/a:f5:big-ip_application_visibility_and_reporting", "cpe:/a:f5:big-ip_global_traffic_manager", "cpe:/a:f5:big-ip_link_controller", "cpe:/a:f5:big-ip_local_traffic_manager", "cpe:/a:f5:big-ip_policy_enforcement_manager", "cpe:/a:f5:big-ip_webaccelerator", "cpe:/h:f5:big-ip"], "id": "F5_BIGIP_SOL40523020.NASL", "href": "https://www.tenable.com/plugins/nessus/147500", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from F5 Networks BIG-IP Solution K40523020.\n#\n# The text description of this plugin is (C) F5 Networks.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(147500);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/03/12\");\n\n script_cve_id(\"CVE-2018-10940\", \"CVE-2018-16658\");\n\n script_name(english:\"F5 Networks BIG-IP : Linux kernel vulnerability (K40523020)\");\n script_summary(english:\"Checks the BIG-IP version.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote device is missing a vendor-supplied security patch.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"An issue was discovered in the Linux kernel before 4.18.6. An\ninformation leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c\ncould be used by local attackers to read kernel memory because a cast\nfrom unsigned long to int interferes with bounds checking. This is\nsimilar to CVE-2018-10940. (CVE-2018-16658)\n\nImpact\n\nA local user with Advanced Shell ( bash ) access on a BIG-IP system,\nor with local administrator access on a Traffix system, may be able to\nuse this flaw to gain elevated privileges. In supported configurations\non the BIG-IP system, bash access is limited to system administrators.\nBIG-IP appliance mode does not expose this issue, as users are not\nallowed bash access in this mode. On Traffix systems, only\nadministrators have local access.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://support.f5.com/csp/article/K40523020\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"Upgrade to one of the non-vulnerable versions listed in the F5\nSolution K40523020.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-16658\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_access_policy_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_advanced_firewall_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_acceleration_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_security_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_application_visibility_and_reporting\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_global_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_link_controller\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_local_traffic_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_policy_enforcement_manager\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:f5:big-ip_webaccelerator\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/h:f5:big-ip\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/09\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/31\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/03/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"F5 Networks Local Security Checks\");\n\n script_dependencies(\"f5_bigip_detect.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/BIG-IP/hotfix\", \"Host/BIG-IP/modules\", \"Host/BIG-IP/version\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\n\ninclude(\"f5_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nversion = get_kb_item(\"Host/BIG-IP/version\");\nif ( ! version ) audit(AUDIT_OS_NOT, \"F5 Networks BIG-IP\");\nif ( isnull(get_kb_item(\"Host/BIG-IP/hotfix\")) ) audit(AUDIT_KB_MISSING, \"Host/BIG-IP/hotfix\");\nif ( ! get_kb_item(\"Host/BIG-IP/modules\") ) audit(AUDIT_KB_MISSING, \"Host/BIG-IP/modules\");\n\nsol = \"K40523020\";\nvmatrix = make_array();\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\n# AFM\nvmatrix[\"AFM\"] = make_array();\nvmatrix[\"AFM\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"AFM\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n# AM\nvmatrix[\"AM\"] = make_array();\nvmatrix[\"AM\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"AM\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n# APM\nvmatrix[\"APM\"] = make_array();\nvmatrix[\"APM\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"APM\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n# ASM\nvmatrix[\"ASM\"] = make_array();\nvmatrix[\"ASM\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"ASM\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n# AVR\nvmatrix[\"AVR\"] = make_array();\nvmatrix[\"AVR\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"AVR\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n# GTM\nvmatrix[\"GTM\"] = make_array();\nvmatrix[\"GTM\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"GTM\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n# LC\nvmatrix[\"LC\"] = make_array();\nvmatrix[\"LC\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"LC\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n# LTM\nvmatrix[\"LTM\"] = make_array();\nvmatrix[\"LTM\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"LTM\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n# PEM\nvmatrix[\"PEM\"] = make_array();\nvmatrix[\"PEM\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"PEM\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n# WAM\nvmatrix[\"WAM\"] = make_array();\nvmatrix[\"WAM\"][\"affected\" ] = make_list(\"15.0.0-15.1.2\",\"14.0.0-14.1.4\",\"13.0.0-13.1.3\");\nvmatrix[\"WAM\"][\"unaffected\"] = make_list(\"16.0.0\");\n\n\nif (bigip_is_affected(vmatrix:vmatrix, sol:sol))\n{\n if (report_verbosity > 0) security_note(port:0, extra:bigip_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = bigip_get_tested_modules();\n audit_extra = \"For BIG-IP module(s) \" + tested + \",\";\n if (tested) audit(AUDIT_INST_VER_NOT_VULN, audit_extra, version);\n else audit(AUDIT_HOST_NOT, \"running any of the affected modules\");\n}\n", "cvss": {"score": 3.6, "vector": "AV:L/AC:L/Au:N/C:P/I:N/A:P"}}, {"lastseen": "2021-08-19T12:29:39", "description": "The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.0.101 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c, there is a possible out of bounds write due to a missing bounds check.\nThis could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation (bnc#1108498).\n\nCVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c allowed local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized (bnc#1116841).\n\nCVE-2018-19985: The function hso_probe read if_num from the USB device (as an u8) and used it without a length check to index an array, resulting in an OOB memory read in hso_probe or hso_get_config_data that could be used by local attackers (bnc#1120743).\n\nCVE-2018-20169: The USB subsystem mishandled size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c (bnc#1119714).\n\nCVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation (bnc#1118319).\n\nCVE-2018-19824: A local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c (bnc#1118152).\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused (bnc#1113769).\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658 (bnc#1113751).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bnc#1094825).\n\nCVE-2017-7273: The cp_report_fixup function in drivers/hid/hid-cypress.c allowed physically proximate attackers to cause a denial of service (integer underflow) or possibly have unspecified other impact via a crafted HID report (bnc#1031240).\n\nCVE-2017-16533: The usbhid_parse function in drivers/hid/usbhid/hid-core.c allowed local users to cause a denial of service (out-of-bounds read and system crash) or possibly have unspecified other impact via a crafted USB device (bnc#1066674).\n\nCVE-2017-1000407: Fixed a denial of service, which was caused by flooding the diagnostic port 0x80 an exception leading to a kernel panic (bnc#1071021).\n\nThe update package also includes non-security fixes. See advisory for details.\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-01-30T00:00:00", "type": "nessus", "title": "SUSE SLES11 Security Update : kernel (SUSE-SU-2019:13937-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-1000407", "CVE-2017-16533", "CVE-2017-7273", "CVE-2018-10940", "CVE-2018-16658", "CVE-2018-18281", "CVE-2018-18386", "CVE-2018-18710", "CVE-2018-19407", "CVE-2018-19824", "CVE-2018-19985", "CVE-2018-20169", "CVE-2018-9516", "CVE-2018-9568"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kernel-bigsmp", "p-cpe:/a:novell:suse_linux:kernel-bigsmp-base", "p-cpe:/a:novell:suse_linux:kernel-bigsmp-devel", "p-cpe:/a:novell:suse_linux:kernel-default", "p-cpe:/a:novell:suse_linux:kernel-default-base", "p-cpe:/a:novell:suse_linux:kernel-default-devel", "p-cpe:/a:novell:suse_linux:kernel-default-man", "p-cpe:/a:novell:suse_linux:kernel-ec2", "p-cpe:/a:novell:suse_linux:kernel-ec2-base", "p-cpe:/a:novell:suse_linux:kernel-ec2-devel", "p-cpe:/a:novell:suse_linux:kernel-pae", "p-cpe:/a:novell:suse_linux:kernel-pae-base", "p-cpe:/a:novell:suse_linux:kernel-pae-devel", "p-cpe:/a:novell:suse_linux:kernel-source", "p-cpe:/a:novell:suse_linux:kernel-syms", "p-cpe:/a:novell:suse_linux:kernel-trace", "p-cpe:/a:novell:suse_linux:kernel-trace-base", "p-cpe:/a:novell:suse_linux:kernel-trace-devel", "p-cpe:/a:novell:suse_linux:kernel-xen", "p-cpe:/a:novell:suse_linux:kernel-xen-base", "p-cpe:/a:novell:suse_linux:kernel-xen-devel", "cpe:/o:novell:suse_linux:11"], "id": "SUSE_SU-2019-13937-1.NASL", "href": "https://www.tenable.com/plugins/nessus/121468", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2019:13937-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(121468);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2017-1000407\", \"CVE-2017-16533\", \"CVE-2017-7273\", \"CVE-2018-10940\", \"CVE-2018-16658\", \"CVE-2018-18281\", \"CVE-2018-18386\", \"CVE-2018-18710\", \"CVE-2018-19407\", \"CVE-2018-19824\", \"CVE-2018-19985\", \"CVE-2018-20169\", \"CVE-2018-9516\", \"CVE-2018-9568\");\n\n script_name(english:\"SUSE SLES11 Security Update : kernel (SUSE-SU-2019:13937-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The SUSE Linux Enterprise 12 SP3 kernel was updated to 3.0.101 to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\nCVE-2018-9516: In hid_debug_events_read of drivers/hid/hid-debug.c,\nthere is a possible out of bounds write due to a missing bounds check.\nThis could lead to local escalation of privilege with System execution\nprivileges needed. User interaction is not needed for exploitation\n(bnc#1108498).\n\nCVE-2018-19407: The vcpu_scan_ioapic function in arch/x86/kvm/x86.c\nallowed local users to cause a denial of service (NULL pointer\ndereference and BUG) via crafted system calls that reach a situation\nwhere ioapic is uninitialized (bnc#1116841).\n\nCVE-2018-19985: The function hso_probe read if_num from the USB device\n(as an u8) and used it without a length check to index an array,\nresulting in an OOB memory read in hso_probe or hso_get_config_data\nthat could be used by local attackers (bnc#1120743).\n\nCVE-2018-20169: The USB subsystem mishandled size checks during the\nreading of an extra descriptor, related to __usb_get_extra_descriptor\nin drivers/usb/core/usb.c (bnc#1119714).\n\nCVE-2018-9568: In sk_clone_lock of sock.c, there is a possible memory\ncorruption due to type confusion. This could lead to local escalation\nof privilege with no additional execution privileges needed. User\ninteraction is not needed for exploitation (bnc#1118319).\n\nCVE-2018-19824: A local user could exploit a use-after-free in the\nALSA driver by supplying a malicious USB Sound device (with zero\ninterfaces) that is mishandled in usb_audio_probe in sound/usb/card.c\n(bnc#1118152).\n\nCVE-2018-18281: The mremap() syscall performs TLB flushes after\ndropping pagetable locks. If a syscall such as ftruncate() removes\nentries from the pagetables of a task that is in the middle of\nmremap(), a stale TLB entry can remain for a short time that permits\naccess to a physical page after it has been released back to the page\nallocator and reused (bnc#1113769).\n\nCVE-2018-18710: An information leak in cdrom_ioctl_select_disc in\ndrivers/cdrom/cdrom.c could be used by local attackers to read kernel\nmemory because a cast from unsigned long to int interferes with bounds\nchecking. This is similar to CVE-2018-10940 and CVE-2018-16658\n(bnc#1113751).\n\nCVE-2018-18386: drivers/tty/n_tty.c allowed local attackers (who are\nable to access pseudo terminals) to hang/block further usage of any\npseudo terminal devices due to an EXTPROC versus ICANON confusion in\nTIOCINQ (bnc#1094825).\n\nCVE-2017-7273: The cp_report_fixup function in\ndrivers/hid/hid-cypress.c allowed physically proximate attackers to\ncause a denial of service (integer underflow) or possibly have\nunspecified other impact via a crafted HID report (bnc#1031240).\n\nCVE-2017-16533: The usbhid_parse function in\ndrivers/hid/usbhid/hid-core.c allowed local users to cause a denial of\nservice (out-of-bounds read and system crash) or possibly have\nunspecified other impact via a crafted USB device (bnc#1066674).\n\nCVE-2017-1000407: Fixed a denial of service, which was caused by\nflooding the diagnostic port 0x80 an exception leading to a kernel\npanic (bnc#1071021).\n\nThe update package also includes non-security fixes. See advisory for\ndetails.\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1031240\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1039803\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1066674\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1071021\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094186\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1094825\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104070\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104366\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1104367\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1107189\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1108498\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1109200\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113201\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113751\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1113769\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1114920\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115007\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1115038\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116412\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1116841\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1117515\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118152\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1118319\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119255\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1119714\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1120743\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=905299\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=936875\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=968018\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=990682\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-1000407/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-16533/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2017-7273/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18281/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18386/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18710/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-19407/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-19824/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-19985/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-20169/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-9516/\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-9568/\"\n );\n # https://www.suse.com/support/update/announcement/2019/suse-su-201913937-1.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?bbd59106\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 11-SP3-LTSS:zypper in -t patch\nslessp3-kernel-20190123-13937=1\n\nSUSE Linux Enterprise Server 11-EXTRA:zypper in -t patch\nslexsp3-kernel-20190123-13937=1\n\nSUSE Linux Enterprise Point of Sale 11-SP3:zypper in -t patch\nsleposp3-kernel-20190123-13937=1\n\nSUSE Linux Enterprise Debuginfo 11-SP3:zypper in -t patch\ndbgsp3-kernel-20190123-13937=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-bigsmp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-bigsmp-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-bigsmp-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-default-man\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-ec2-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-pae-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-syms\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-trace-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-base\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kernel-xen-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:11\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/27\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/01/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/30\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES11)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES11\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES11\" && (! preg(pattern:\"^(3)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES11 SP3\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-ec2-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-ec2-base-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-ec2-devel-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-xen-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-xen-base-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-xen-devel-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-bigsmp-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-bigsmp-base-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-bigsmp-devel-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-pae-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-pae-base-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"x86_64\", reference:\"kernel-pae-devel-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"s390x\", reference:\"kernel-default-man-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"kernel-default-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"kernel-default-base-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"kernel-default-devel-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"kernel-source-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"kernel-syms-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"kernel-trace-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"kernel-trace-base-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", reference:\"kernel-trace-devel-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"kernel-ec2-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"kernel-ec2-base-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"kernel-ec2-devel-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"kernel-xen-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"kernel-xen-base-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"kernel-xen-devel-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"kernel-pae-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"kernel-pae-base-3.0.101-0.47.106.59.1\")) flag++;\nif (rpm_check(release:\"SLES11\", sp:\"3\", cpu:\"i586\", reference:\"kernel-pae-devel-3.0.101-0.47.106.59.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:29:48", "description": "It was discovered that a NULL pointer dereference existed in the keyring subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-2647)\n\nIt was discovered that a race condition existed in the raw MIDI driver for the Linux kernel, leading to a double free vulnerability. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-10902)\n\nIt was discovered that an integer overrun vulnerability existed in the POSIX timers implementation in the Linux kernel. A local attacker could use this to cause a denial of service. (CVE-2018-12896)\n\nNoam Rathaus discovered that a use-after-free vulnerability existed in the Infiniband implementation in the Linux kernel. An attacker could use this to cause a denial of service (system crash). (CVE-2018-14734)\n\nIt was discovered that the YUREX USB device driver for the Linux kernel did not properly restrict user space reads or writes. A physically proximate attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2018-16276)\n\nTetsuo Handa discovered a logic error in the TTY subsystem of the Linux kernel. A local attacker with access to pseudo terminal devices could use this to cause a denial of service. (CVE-2018-18386)\n\nKanda Motohiro discovered that writing extended attributes to an XFS file system in the Linux kernel in certain situations could cause an error condition to occur. A local attacker could use this to cause a denial of service. (CVE-2018-18690)\n\nIt was discovered that an integer overflow vulnerability existed in the CDROM driver of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-18710).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-12-21T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS : Linux kernel vulnerabilities (USN-3849-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-2647", "CVE-2018-10902", "CVE-2018-12896", "CVE-2018-14734", "CVE-2018-16276", "CVE-2018-18386", "CVE-2018-18690", "CVE-2018-18710"], "modified": "2020-09-17T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-3849-1.NASL", "href": "https://www.tenable.com/plugins/nessus/119832", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3849-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119832);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/17\");\n\n script_cve_id(\"CVE-2017-2647\", \"CVE-2018-10902\", \"CVE-2018-12896\", \"CVE-2018-14734\", \"CVE-2018-16276\", \"CVE-2018-18386\", \"CVE-2018-18690\", \"CVE-2018-18710\");\n script_xref(name:\"USN\", value:\"3849-1\");\n\n script_name(english:\"Ubuntu 14.04 LTS : Linux kernel vulnerabilities (USN-3849-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that a NULL pointer dereference existed in the\nkeyring subsystem of the Linux kernel. A local attacker could use this\nto cause a denial of service (system crash). (CVE-2017-2647)\n\nIt was discovered that a race condition existed in the raw MIDI driver\nfor the Linux kernel, leading to a double free vulnerability. A local\nattacker could use this to cause a denial of service (system crash) or\npossibly execute arbitrary code. (CVE-2018-10902)\n\nIt was discovered that an integer overrun vulnerability existed in the\nPOSIX timers implementation in the Linux kernel. A local attacker\ncould use this to cause a denial of service. (CVE-2018-12896)\n\nNoam Rathaus discovered that a use-after-free vulnerability existed in\nthe Infiniband implementation in the Linux kernel. An attacker could\nuse this to cause a denial of service (system crash). (CVE-2018-14734)\n\nIt was discovered that the YUREX USB device driver for the Linux\nkernel did not properly restrict user space reads or writes. A\nphysically proximate attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code.\n(CVE-2018-16276)\n\nTetsuo Handa discovered a logic error in the TTY subsystem of the\nLinux kernel. A local attacker with access to pseudo terminal devices\ncould use this to cause a denial of service. (CVE-2018-18386)\n\nKanda Motohiro discovered that writing extended attributes to an XFS\nfile system in the Linux kernel in certain situations could cause an\nerror condition to occur. A local attacker could use this to cause a\ndenial of service. (CVE-2018-18690)\n\nIt was discovered that an integer overflow vulnerability existed in\nthe CDROM driver of the Linux kernel. A local attacker could use this\nto expose sensitive information (kernel memory). (CVE-2018-18710).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3849-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-3.13-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/03/31\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2018-2020 Canonical, Inc. / NASL script (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2017-2647\", \"CVE-2018-10902\", \"CVE-2018-12896\", \"CVE-2018-14734\", \"CVE-2018-16276\", \"CVE-2018-18386\", \"CVE-2018-18690\", \"CVE-2018-18710\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-3849-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-3.13.0-164-generic\", pkgver:\"3.13.0-164.214\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-3.13.0-164-generic-lpae\", pkgver:\"3.13.0-164.214\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-3.13.0-164-lowlatency\", pkgver:\"3.13.0-164.214\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-generic\", pkgver:\"3.13.0.164.174\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-generic-lpae\", pkgver:\"3.13.0.164.174\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-lowlatency\", pkgver:\"3.13.0.164.174\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-3.13-generic / linux-image-3.13-generic-lpae / etc\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-10-16T13:10:45", "description": "USN-3848-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS.\n\nIt was discovered that a double free existed in the AMD GPIO driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2017-18174)\n\nIt was discovered that an integer overrun vulnerability existed in the POSIX timers implementation in the Linux kernel. A local attacker could use this to cause a denial of service. (CVE-2018-12896)\n\nKanda Motohiro discovered that writing extended attributes to an XFS file system in the Linux kernel in certain situations could cause an error condition to occur. A local attacker could use this to cause a denial of service. (CVE-2018-18690)\n\nIt was discovered that an integer overflow vulnerability existed in the CDROM driver of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-18710).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-12-21T00:00:00", "type": "nessus", "title": "Ubuntu 14.04 LTS : Linux kernel (Xenial HWE) vulnerabilities (USN-3848-2)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-18174", "CVE-2018-12896", "CVE-2018-18690", "CVE-2018-18710"], "modified": "2020-09-17T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-lts-xenial", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lts-xenial", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-lts-xenial", "cpe:/o:canonical:ubuntu_linux:14.04"], "id": "UBUNTU_USN-3848-2.NASL", "href": "https://www.tenable.com/plugins/nessus/119831", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3848-2. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119831);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/17\");\n\n script_cve_id(\"CVE-2017-18174\", \"CVE-2018-12896\", \"CVE-2018-18690\", \"CVE-2018-18710\");\n script_xref(name:\"USN\", value:\"3848-2\");\n\n script_name(english:\"Ubuntu 14.04 LTS : Linux kernel (Xenial HWE) vulnerabilities (USN-3848-2)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"USN-3848-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04\nLTS. This update provides the corresponding updates for the Linux\nHardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu\n14.04 LTS.\n\nIt was discovered that a double free existed in the AMD GPIO driver in\nthe Linux kernel. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code.\n(CVE-2017-18174)\n\nIt was discovered that an integer overrun vulnerability existed in the\nPOSIX timers implementation in the Linux kernel. A local attacker\ncould use this to cause a denial of service. (CVE-2018-12896)\n\nKanda Motohiro discovered that writing extended attributes to an XFS\nfile system in the Linux kernel in certain situations could cause an\nerror condition to occur. A local attacker could use this to cause a\ndenial of service. (CVE-2018-18690)\n\nIt was discovered that an integer overflow vulnerability existed in\nthe CDROM driver of the Linux kernel. A local attacker could use this\nto expose sensitive information (kernel memory). (CVE-2018-18710).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3848-2/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae-lts-xenial\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lts-xenial\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency-lts-xenial\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:14.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2018-2020 Canonical, Inc. / NASL script (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(14\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 14.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2017-18174\", \"CVE-2018-12896\", \"CVE-2018-18690\", \"CVE-2018-18710\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-3848-2\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-4.4.0-1037-aws\", pkgver:\"4.4.0-1037.40\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-4.4.0-141-generic\", pkgver:\"4.4.0-141.167~14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-4.4.0-141-generic-lpae\", pkgver:\"4.4.0-141.167~14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-4.4.0-141-lowlatency\", pkgver:\"4.4.0-141.167~14.04.1\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-aws\", pkgver:\"4.4.0.1037.37\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-generic-lpae-lts-xenial\", pkgver:\"4.4.0.141.121\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-generic-lts-xenial\", pkgver:\"4.4.0.141.121\")) flag++;\nif (ubuntu_check(osver:\"14.04\", pkgname:\"linux-image-lowlatency-lts-xenial\", pkgver:\"4.4.0.141.121\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-4.4-aws / linux-image-4.4-generic / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-10-16T13:10:40", "description": "It was discovered that a double free existed in the AMD GPIO driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code.\n(CVE-2017-18174)\n\nIt was discovered that an integer overrun vulnerability existed in the POSIX timers implementation in the Linux kernel. A local attacker could use this to cause a denial of service. (CVE-2018-12896)\n\nKanda Motohiro discovered that writing extended attributes to an XFS file system in the Linux kernel in certain situations could cause an error condition to occur. A local attacker could use this to cause a denial of service. (CVE-2018-18690)\n\nIt was discovered that an integer overflow vulnerability existed in the CDROM driver of the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2018-18710).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-12-21T00:00:00", "type": "nessus", "title": "Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-3848-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-18174", "CVE-2018-12896", "CVE-2018-18690", "CVE-2018-18710"], "modified": "2020-09-17T00:00:00", "cpe": ["p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-snapdragon", "p-cpe:/a:canonical:ubuntu_linux:linux-image-aws", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic", "p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae", "p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm", "p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency", "p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2", "p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon", "cpe:/o:canonical:ubuntu_linux:16.04"], "id": "UBUNTU_USN-3848-1.NASL", "href": "https://www.tenable.com/plugins/nessus/119830", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Ubuntu Security Notice USN-3848-1. The text \n# itself is copyright (C) Canonical, Inc. See \n# <http://www.ubuntu.com/usn/>. Ubuntu(R) is a registered \n# trademark of Canonical, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119830);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/09/17\");\n\n script_cve_id(\"CVE-2017-18174\", \"CVE-2018-12896\", \"CVE-2018-18690\", \"CVE-2018-18710\");\n script_xref(name:\"USN\", value:\"3848-1\");\n\n script_name(english:\"Ubuntu 16.04 LTS : Linux kernel vulnerabilities (USN-3848-1)\");\n script_summary(english:\"Checks dpkg output for updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\n\"The remote Ubuntu host is missing one or more security-related\npatches.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"It was discovered that a double free existed in the AMD GPIO driver in\nthe Linux kernel. A local attacker could use this to cause a denial of\nservice (system crash) or possibly execute arbitrary code.\n(CVE-2017-18174)\n\nIt was discovered that an integer overrun vulnerability existed in the\nPOSIX timers implementation in the Linux kernel. A local attacker\ncould use this to cause a denial of service. (CVE-2018-12896)\n\nKanda Motohiro discovered that writing extended attributes to an XFS\nfile system in the Linux kernel in certain situations could cause an\nerror condition to occur. A local attacker could use this to cause a\ndenial of service. (CVE-2018-18690)\n\nIt was discovered that an integer overflow vulnerability existed in\nthe CDROM driver of the Linux kernel. A local attacker could use this\nto expose sensitive information (kernel memory). (CVE-2018-18710).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Ubuntu security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://usn.ubuntu.com/3848-1/\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-4.4-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-aws\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-generic-lpae\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-lowlatency\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-raspi2\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:canonical:ubuntu_linux:linux-image-snapdragon\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:canonical:ubuntu_linux:16.04\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/02/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/12/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/12/21\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"Ubuntu Security Notice (C) 2018-2020 Canonical, Inc. / NASL script (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Ubuntu Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/cpu\", \"Host/Ubuntu\", \"Host/Ubuntu/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"ubuntu.inc\");\ninclude(\"ksplice.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/Ubuntu/release\");\nif ( isnull(release) ) audit(AUDIT_OS_NOT, \"Ubuntu\");\nrelease = chomp(release);\nif (! preg(pattern:\"^(16\\.04)$\", string:release)) audit(AUDIT_OS_NOT, \"Ubuntu 16.04\", \"Ubuntu \" + release);\nif ( ! get_kb_item(\"Host/Debian/dpkg-l\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Ubuntu\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2017-18174\", \"CVE-2018-12896\", \"CVE-2018-18690\", \"CVE-2018-18710\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for USN-3848-1\");\n }\n else\n {\n _ubuntu_report = ksplice_reporting_text();\n }\n}\n\nflag = 0;\n\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-1039-kvm\", pkgver:\"4.4.0-1039.45\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-1074-aws\", pkgver:\"4.4.0-1074.84\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-1102-raspi2\", pkgver:\"4.4.0-1102.110\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-1106-snapdragon\", pkgver:\"4.4.0-1106.111\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-141-generic\", pkgver:\"4.4.0-141.167\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-141-generic-lpae\", pkgver:\"4.4.0-141.167\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-4.4.0-141-lowlatency\", pkgver:\"4.4.0-141.167\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-aws\", pkgver:\"4.4.0.1074.76\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-generic\", pkgver:\"4.4.0.141.147\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-generic-lpae\", pkgver:\"4.4.0.141.147\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-kvm\", pkgver:\"4.4.0.1039.38\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-lowlatency\", pkgver:\"4.4.0.141.147\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-raspi2\", pkgver:\"4.4.0.1102.102\")) flag++;\nif (ubuntu_check(osver:\"16.04\", pkgname:\"linux-image-snapdragon\", pkgver:\"4.4.0.1106.98\")) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : ubuntu_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = ubuntu_pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"linux-image-4.4-aws / linux-image-4.4-generic / etc\");\n}\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2022-03-27T15:51:48", "description": "The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in the ELSA-2018-4227 advisory.\n\n - The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. (CVE-2017-13695)\n\n - An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940. (CVE-2018-16658)\n\n - An issue was discovered in the __ns_get_path function in fs/nsfs.c in the Linux kernel before 4.11. Due to a race condition when accessing files, a Use After Free condition can occur. This also affects all Android releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before security patch level 2018-07-05. (CVE-2018-5873)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {"score": 7, "vector": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2018-09-27T00:00:00", "type": "nessus", "title": "Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4227)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2017-13695", "CVE-2018-10940", "CVE-2018-16658", "CVE-2018-5873"], "modified": "2022-03-02T00:00:00", "cpe": ["cpe:/o:oracle:linux:6", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:kernel-uek", "p-cpe:/a:oracle:linux:kernel-uek-debug", "p-cpe:/a:oracle:linux:kernel-uek-debug-devel", "p-cpe:/a:oracle:linux:kernel-uek-devel", "p-cpe:/a:oracle:linux:kernel-uek-doc", "p-cpe:/a:oracle:linux:kernel-uek-firmware"], "id": "ORACLELINUX_ELSA-2018-4227.NASL", "href": "https://www.tenable.com/plugins/nessus/117769", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Oracle Linux Security Advisory ELSA-2018-4227.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(117769);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/03/02\");\n\n script_cve_id(\"CVE-2017-13695\", \"CVE-2018-5873\", \"CVE-2018-16658\");\n\n script_name(english:\"Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4227)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Oracle Linux host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Oracle Linux 6 / 7 host has packages installed that are affected by multiple vulnerabilities as referenced in\nthe ELSA-2018-4227 advisory.\n\n - The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does\n not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive\n information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a\n crafted ACPI table. (CVE-2017-13695)\n\n - An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status\n in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from\n unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940. (CVE-2018-16658)\n\n - An issue was discovered in the __ns_get_path function in fs/nsfs.c in the Linux kernel before 4.11. Due to\n a race condition when accessing files, a Use After Free condition can occur. This also affects all Android\n releases from CAF using the Linux kernel (Android for MSM, Firefox OS for MSM, QRD Android) before\n security patch level 2018-07-05. (CVE-2018-5873)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://linux.oracle.com/errata/ELSA-2018-4227.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-5873\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2017/08/25\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/09/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/09/27\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:kernel-uek-firmware\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2018-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"linux_alt_patch_detect.nasl\", \"ssh_get_info.nasl\");\n script_require_keys(\"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/local_checks_enabled\");\n\n exit(0);\n}\n\n\ninclude('audit.inc');\ninclude('global_settings.inc');\ninclude('ksplice.inc');\ninclude('rpm.inc');\n\nif (!get_kb_item('Host/local_checks_enabled')) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item('Host/OracleLinux')) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar release = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, 'Oracle Linux');\nvar os_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, 'Oracle Linux');\nvar os_ver = os_ver[1];\nif (! preg(pattern:\"^(6|7)([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, 'Oracle Linux 6 / 7', 'Oracle Linux ' + os_ver);\n\nif (!get_kb_item('Host/RedHat/rpm-list')) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nvar cpu = get_kb_item('Host/cpu');\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif ('x86_64' >!< cpu && cpu !~ \"^i[3-6]86$\" && 'aarch64' >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, 'Oracle Linux', cpu);\nif ('x86_64' >!< cpu) audit(AUDIT_ARCH_NOT, 'x86_64', cpu);\n\nvar machine_uptrack_level = get_one_kb_item('Host/uptrack-uname-r');\nif (machine_uptrack_level)\n{\n var trimmed_uptrack_level = ereg_replace(string:machine_uptrack_level, pattern:\"\\.(x86_64|i[3-6]86|aarch64)$\", replace:'');\n var fixed_uptrack_levels = ['4.1.12-124.19.5.el6uek', '4.1.12-124.19.5.el7uek'];\n foreach var fixed_uptrack_level ( fixed_uptrack_levels ) {\n if (rpm_spec_vers_cmp(a:trimmed_uptrack_level, b:fixed_uptrack_level) >= 0)\n {\n audit(AUDIT_PATCH_INSTALLED, 'KSplice hotfix for ELSA-2018-4227');\n }\n }\n __rpm_report = 'Running KSplice level of ' + trimmed_uptrack_level + ' does not meet the minimum fixed level of ' + join(fixed_uptrack_levels, sep:' / ') + ' for this advisory.\\n\\n';\n}\n\nvar kernel_major_minor = get_kb_item('Host/uname/major_minor');\nif (empty_or_null(kernel_major_minor)) exit(1, 'Unable to determine kernel major-minor level.');\nvar expected_kernel_major_minor = '4.1';\nif (kernel_major_minor != expected_kernel_major_minor)\n audit(AUDIT_OS_NOT, 'running kernel level ' + expected_kernel_major_minor + ', it is running kernel level ' + kernel_major_minor);\n\nvar pkgs = [\n {'reference':'kernel-uek-4.1.12-124.19.5.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.19.5.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.19.5.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.19.5.el6uek', 'cpu':'x86_64', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.19.5.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.19.5.el6uek', 'release':'6', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'},\n {'reference':'kernel-uek-4.1.12-124.19.5.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-4.1.12'},\n {'reference':'kernel-uek-debug-4.1.12-124.19.5.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-4.1.12'},\n {'reference':'kernel-uek-debug-devel-4.1.12-124.19.5.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-debug-devel-4.1.12'},\n {'reference':'kernel-uek-devel-4.1.12-124.19.5.el7uek', 'cpu':'x86_64', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-devel-4.1.12'},\n {'reference':'kernel-uek-doc-4.1.12-124.19.5.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-doc-4.1.12'},\n {'reference':'kernel-uek-firmware-4.1.12-124.19.5.el7uek', 'release':'7', 'rpm_spec_vers_cmp':TRUE, 'exists_check':'kernel-uek-firmware-4.1.12'}\n];\n\nvar flag = 0;\nforeach var package_array ( pkgs ) {\n var reference = NULL;\n var release = NULL;\n var sp = NULL;\n var cpu = NULL;\n var el_string = NULL;\n var rpm_spec_vers_cmp = NULL;\n var epoch = NULL;\n var allowmaj = NULL;\n var exists_check = NULL;\n if (!empty_or_null(package_array['reference'])) reference = package_array['reference'];\n if (!empty_or_null(package_array['release'])) release = 'EL' + package_array['release'];\n if (!empty_or_null(package_array['sp'])) sp = package_array['sp'];\n if (!empty_or_null(package_array['cpu'])) cpu = package_array['cpu'];\n if (!empty_or_null(package_array['el_string'])) el_string = package_array['el_string'];\n if (!empty_or_null(package_array['rpm_spec_vers_cmp'])) rpm_spec_vers_cmp = package_array['rpm_spec_vers_cmp'];\n if (!empty_or_null(package_array['epoch'])) epoch = package_array['epoch'];\n if (!empty_or_null(package_array['allowmaj'])) allowmaj = package_array['allowmaj'];\n if (!empty_or_null(package_array['exists_check'])) exists_check = package_array['exists_check'];\n if (reference && release) {\n if (exists_check) {\n if (rpm_exists(release:release, rpm:exists_check) && rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n } else {\n if (rpm_check(release:release, sp:sp, cpu:cpu, reference:reference, epoch:epoch, el_string:el_string, rpm_spec_vers_cmp:rpm_spec_vers_cmp, allowmaj:allowmaj)) flag++;\n }\n }\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n var tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, 'kernel-uek / kernel-uek-debug / kernel-uek-debug-devel / etc');\n}\n", "cvss": {"score": 6.9, "vector": "AV:L/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:30:11", "description": "This update for the Linux Kernel 3.12.74-60_64_107 fixes one issue.\n\nThe following security issue was fixed :\n\nCVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who are able to access pseudo terminals) to hang/block further usage of any pseudo terminal devices due to an EXTPROC versus ICANON confusion in TIOCINQ (bsc#1112039).\n\nNote that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 3.3, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L"}, "published": "2018-11-16T00:00:00", "type": "nessus", "title": "SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3772-1)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-18386"], "modified": "2021-04-08T00:00:00", "cpe": ["p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_106-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_106-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_111-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_111-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_119-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_119-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_122-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_122-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_125-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_125-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_128-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_128-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_133-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_133-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_136-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_136-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_141-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_141-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_146-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_146-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_104-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_104-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_107-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_107-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_66-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_66-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_69-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_69-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_82-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_82-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_85-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_85-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_88-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_88-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_93-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_93-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_96-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_96-xen", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_99-default", "p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_99-xen", "cpe:/o:novell:suse_linux:12"], "id": "SUSE_SU-2018-3772-1.NASL", "href": "https://www.tenable.com/plugins/nessus/119013", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from SUSE update advisory SUSE-SU-2018:3772-1.\n# The text itself is copyright (C) SUSE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(119013);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/04/08\");\n\n script_cve_id(\"CVE-2018-18386\");\n\n script_name(english:\"SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3772-1)\");\n script_summary(english:\"Checks rpm output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\",\n value:\"The remote SUSE host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\",\n value:\n\"This update for the Linux Kernel 3.12.74-60_64_107 fixes one issue.\n\nThe following security issue was fixed :\n\nCVE-2018-18386: The drivers/tty/n_tty.c allowed local attackers (who\nare able to access pseudo terminals) to hang/block further usage of\nany pseudo terminal devices due to an EXTPROC versus ICANON confusion\nin TIOCINQ (bsc#1112039).\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the SUSE security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugzilla.suse.com/show_bug.cgi?id=1112039\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.suse.com/security/cve/CVE-2018-18386/\"\n );\n # https://www.suse.com/support/update/announcement/2018/suse-su-20183772-1/\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?c59ae59e\"\n );\n script_set_attribute(\n attribute:\"solution\",\n value:\n\"To install this SUSE Security Update use the SUSE recommended\ninstallation methods like YaST online_update or 'zypper patch'.\n\nAlternatively you can run the command listed for your product :\n\nSUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-SP1-2018-2664=1 SUSE-SLE-SERVER-12-SP1-2018-2665=1\nSUSE-SLE-SERVER-12-SP1-2018-2669=1 SUSE-SLE-SERVER-12-SP1-2018-2670=1\nSUSE-SLE-SERVER-12-SP1-2018-2678=1 SUSE-SLE-SERVER-12-SP1-2018-2679=1\nSUSE-SLE-SERVER-12-SP1-2018-2680=1 SUSE-SLE-SERVER-12-SP1-2018-2681=1\nSUSE-SLE-SERVER-12-SP1-2018-2682=1 SUSE-SLE-SERVER-12-SP1-2018-2683=1\n\nSUSE Linux Enterprise Server 12-LTSS:zypper in -t patch\nSUSE-SLE-SERVER-12-2018-2666=1 SUSE-SLE-SERVER-12-2018-2667=1\nSUSE-SLE-SERVER-12-2018-2668=1 SUSE-SLE-SERVER-12-2018-2671=1\nSUSE-SLE-SERVER-12-2018-2672=1 SUSE-SLE-SERVER-12-2018-2673=1\nSUSE-SLE-SERVER-12-2018-2674=1 SUSE-SLE-SERVER-12-2018-2675=1\nSUSE-SLE-SERVER-12-2018-2676=1 SUSE-SLE-SERVER-12-2018-2677=1\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_106-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_106-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_111-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_111-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_119-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_119-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_122-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_122-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_125-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_125-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_128-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_128-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_133-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_133-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_136-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_136-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_141-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_141-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_146-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_61-52_146-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_104-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_104-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_107-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_107-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_66-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_66-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_69-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_69-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_82-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_82-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_85-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_85-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_88-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_88-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_93-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_93-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_96-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_96-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_99-default\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_99-xen\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:novell:suse_linux:12\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/10/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/11/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/11/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"SuSE Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/SuSE/release\", \"Host/SuSE/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/SuSE/release\");\nif (isnull(release) || release !~ \"^(SLED|SLES)\") audit(AUDIT_OS_NOT, \"SUSE\");\nos_ver = pregmatch(pattern: \"^(SLE(S|D)\\d+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"SUSE\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^(SLES12)$\", string:os_ver)) audit(AUDIT_OS_NOT, \"SUSE SLES12\", \"SUSE \" + os_ver);\n\nif (!get_kb_item(\"Host/SuSE/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^i[3-6]86$\" && \"x86_64\" >!< cpu && \"s390x\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"SUSE \" + os_ver, cpu);\nif (cpu >!< \"x86_64\") audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nsp = get_kb_item(\"Host/SuSE/patchlevel\");\nif (isnull(sp)) sp = \"0\";\nif (os_ver == \"SLES12\" && (! preg(pattern:\"^(0|1)$\", string:sp))) audit(AUDIT_OS_NOT, \"SLES12 SP0/1\", os_ver + \" SP\" + sp);\n\n\nflag = 0;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_104-default-3-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_104-xen-3-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_107-default-3-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_107-xen-3-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_66-default-10-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_66-xen-10-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_69-default-9-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_69-xen-9-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_82-default-9-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_82-xen-9-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_85-default-9-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_85-xen-9-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_88-default-7-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_88-xen-7-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_93-default-6-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_93-xen-6-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_96-default-6-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_96-xen-6-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_99-default-5-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"1\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_74-60_64_99-xen-5-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_106-default-11-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_106-xen-11-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_111-default-10-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_111-xen-10-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_119-default-10-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_119-xen-10-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_122-default-10-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_122-xen-10-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_125-default-9-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_125-xen-9-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_128-default-7-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_128-xen-7-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_133-default-6-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_133-xen-6-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_136-default-6-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_136-xen-6-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_141-default-5-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_141-xen-5-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_146-default-3-2.1\")) flag++;\nif (rpm_check(release:\"SLES12\", sp:\"0\", cpu:\"x86_64\", reference:\"kgraft-patch-3_12_61-52_146-xen-3-2.1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_note(port:0, extra:rpm_report_get());\n else security_note(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 2.1, "vector": "AV:L/AC:L/Au:N/C:N/I:N/A:P"}}, {"lastseen": "2022-05-21T15:39:23", "description": "According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :\n\n - An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.(CVE-2018-18710)\n\n - A flaw was found in mmap in the Linux kernel allowing the process to map a null page. This allows attackers to abuse this mechanism to turn null pointer dereferences into workable exploits.(CVE-2019-9213)\n\n - The Linux kernel does not properly initialize memory in messages passed between virtual guests and the host operating system in the vhost/vhost.c:vhost_new_msg() function. This can allow local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file.(CVE-2018-1118)\n\n - It was found that the raw midi kernel driver does not protect against concurrent access which leads to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status() which are part of snd_rawmidi_ioctl() handler in rawmidi.c file. A malicious local attacker could possibly use this for privilege escalation.(CVE-2018-10902)\n\n - A flaw was discovered in the Linux kernel's USB subsystem in the __usb_get_extra_descriptor() function in the drivers/usb/core/usb.c which mishandles a size check during the reading of an extra descriptor data.\n By using a specially crafted USB device which sends a forged extra descriptor, an unprivileged user with physical access to the system can potentially cause a privilege escalation or trigger a system crash or lock up and thus to cause a denial of service (DoS).(CVE-2018-20169)\n\n - In the function wmi_set_ie() in the Linux kernel the length validation code does not handle unsigned integer overflow properly. As a result, a large value of the aEUR~ie_lenaEURtm argument can cause a buffer overflow and thus a memory corruption leading to a system crash or other or unspecified impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is unlikely.(CVE-2018-5848)\n\n - A new software page cache side channel attack scenario was discovered in operating systems that implement the very common 'page cache' caching mechanism. A malicious user/process could use 'in memory' page-cache knowledge to infer access timings to shared memory and gain knowledge which can be used to reduce effectiveness of cryptographic strength by monitoring algorithmic behavior, infer access patterns of memory to determine code paths taken, and exfiltrate data to a blinded attacker through page-granularity access times as a side-channel.(CVE-2019-5489)\n\n - A security flaw was found in the Linux kernel in a way that the cleancache subsystem clears an inode after the final file truncation (removal). The new file created with the same inode may contain leftover pages from cleancache and the old file data instead of the new one.(CVE-2018-16862)\n\nNote that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-04-02T00:00:00", "type": "nessus", "title": "EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1156)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-10902", "CVE-2018-10940", "CVE-2018-1118", "CVE-2018-16658", "CVE-2018-16862", "CVE-2018-18710", "CVE-2018-20169", "CVE-2018-5848", "CVE-2019-5489", "CVE-2019-9213"], "modified": "2022-05-20T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:kernel", "p-cpe:/a:huawei:euleros:kernel-debuginfo", "p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64", "p-cpe:/a:huawei:euleros:kernel-devel", "p-cpe:/a:huawei:euleros:kernel-headers", "p-cpe:/a:huawei:euleros:kernel-tools", "p-cpe:/a:huawei:euleros:kernel-tools-libs", "p-cpe:/a:huawei:euleros:perf", "p-cpe:/a:huawei:euleros:python-perf", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-1156.NASL", "href": "https://www.tenable.com/plugins/nessus/123630", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(123630);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/20\");\n\n script_cve_id(\n \"CVE-2018-1118\",\n \"CVE-2018-5848\",\n \"CVE-2018-10902\",\n \"CVE-2018-16862\",\n \"CVE-2018-18710\",\n \"CVE-2018-20169\",\n \"CVE-2019-5489\",\n \"CVE-2019-9213\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-1156)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the kernel packages installed, the\nEulerOS installation on the remote host is affected by the following\nvulnerabilities :\n\n - An issue was discovered in the Linux kernel through\n 4.19. An information leak in cdrom_ioctl_select_disc in\n drivers/cdrom/cdrom.c could be used by local attackers\n to read kernel memory because a cast from unsigned long\n to int interferes with bounds checking. This is similar\n to CVE-2018-10940 and CVE-2018-16658.(CVE-2018-18710)\n\n - A flaw was found in mmap in the Linux kernel allowing\n the process to map a null page. This allows attackers\n to abuse this mechanism to turn null pointer\n dereferences into workable exploits.(CVE-2019-9213)\n\n - The Linux kernel does not properly initialize memory in\n messages passed between virtual guests and the host\n operating system in the vhost/vhost.c:vhost_new_msg()\n function. This can allow local privileged users to read\n some kernel memory contents when reading from the\n /dev/vhost-net device file.(CVE-2018-1118)\n\n - It was found that the raw midi kernel driver does not\n protect against concurrent access which leads to a\n double realloc (double free) in\n snd_rawmidi_input_params() and\n snd_rawmidi_output_status() which are part of\n snd_rawmidi_ioctl() handler in rawmidi.c file. A\n malicious local attacker could possibly use this for\n privilege escalation.(CVE-2018-10902)\n\n - A flaw was discovered in the Linux kernel's USB\n subsystem in the __usb_get_extra_descriptor() function\n in the drivers/usb/core/usb.c which mishandles a size\n check during the reading of an extra descriptor data.\n By using a specially crafted USB device which sends a\n forged extra descriptor, an unprivileged user with\n physical access to the system can potentially cause a\n privilege escalation or trigger a system crash or lock\n up and thus to cause a denial of service\n (DoS).(CVE-2018-20169)\n\n - In the function wmi_set_ie() in the Linux kernel the\n length validation code does not handle unsigned integer\n overflow properly. As a result, a large value of the\n aEUR~ie_lenaEURtm argument can cause a buffer overflow and\n thus a memory corruption leading to a system crash or\n other or unspecified impact. Due to the nature of the\n flaw, privilege escalation cannot be fully ruled out,\n although we believe it is unlikely.(CVE-2018-5848)\n\n - A new software page cache side channel attack scenario\n was discovered in operating systems that implement the\n very common 'page cache' caching mechanism. A malicious\n user/process could use 'in memory' page-cache knowledge\n to infer access timings to shared memory and gain\n knowledge which can be used to reduce effectiveness of\n cryptographic strength by monitoring algorithmic\n behavior, infer access patterns of memory to determine\n code paths taken, and exfiltrate data to a blinded\n attacker through page-granularity access times as a\n side-channel.(CVE-2019-5489)\n\n - A security flaw was found in the Linux kernel in a way\n that the cleancache subsystem clears an inode after the\n final file truncation (removal). The new file created\n with the same inode may contain leftover pages from\n cleancache and the old file data instead of the new\n one.(CVE-2018-16862)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1156\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fb5be0b3\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected kernel packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2018-20169\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2018-5848\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Reliable Datagram Sockets (RDS) rds_atomic_free_op NULL pointer dereference Privilege Escalation');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/02\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:kernel-tools-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"kernel-3.10.0-862.14.0.1.h105.eulerosv2r7\",\n \"kernel-debuginfo-3.10.0-862.14.0.1.h105.eulerosv2r7\",\n \"kernel-debuginfo-common-x86_64-3.10.0-862.14.0.1.h105.eulerosv2r7\",\n \"kernel-devel-3.10.0-862.14.0.1.h105.eulerosv2r7\",\n \"kernel-headers-3.10.0-862.14.0.1.h105.eulerosv2r7\",\n \"kernel-tools-3.10.0-862.14.0.1.h105.eulerosv2r7\",\n \"kernel-tools-libs-3.10.0-862.14.0.1.h105.eulerosv2r7\",\n \"perf-3.10.0-862.14.0.1.h105.eulerosv2r7\",\n \"python-perf-3.10.0-862.14.0.1.h105.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel\");\n}\n", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2021-08-19T12:28:07", "description": "The openSUSE Leap 15.0 kernel was updated to 4.12.14-lp150.12.28.1 to receive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-18281: The mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. (bnc#1113769).\n\nThe following non-security bugs were fixed :\n\n - ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail DMA controllers (bsc#1051510).\n\n - ACPI / platform: Add SMB0001 HID to forbidden_id_list (bsc#1051510).\n\n - ACPI / watchdog: Prefer iTCO_wdt always when WDAT table uses RTC SRAM (bsc#1051510).\n\n - ACPI/APEI: Handle GSIV and GPIO notification types (bsc#1115567). \n\n - ACPI/IORT: Fix iort_get_platform_device_domain() uninitialized pointer value (bsc#1051510).\n\n - ACPICA: Tables: Add WSMT support (bsc#1089350).\n\n - ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control write (bsc#1051510).\n\n - ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio pops (bsc#1051510).\n\n - ALSA: control: Fix race between adding and removing a user element (bsc#1051510).\n\n - ALSA: hda/ca0132 - Call pci_iounmap() instead of iounmap() (bsc#1051510).\n\n - ALSA: hda/realtek - Add GPIO data update helper (bsc#1051510).\n\n - ALSA: hda/realtek - Add auto-mute quirk for HP Spectre x360 laptop (bsc#1051510).\n\n - ALSA: hda/realtek - Allow skipping spec->init_amp detection (bsc#1051510).\n\n - ALSA: hda/realtek - Fix HP Headset Mic can't record (bsc#1051510).\n\n - ALSA: hda/realtek - Manage GPIO bits commonly (bsc#1051510).\n\n - ALSA: hda/realtek - Simplify Dell XPS13 GPIO handling (bsc#1051510).\n\n - ALSA: hda/realtek - Support ALC300 (bsc#1051510).\n\n - ALSA: hda/realtek - fix headset mic detection for MSI MS-B171 (bsc#1051510).\n\n - ALSA: hda/realtek - fix the pop noise on headphone for lenovo laptops (bsc#1051510).\n\n - ALSA: hda: Add ASRock N68C-S UCC the power_save blacklist (bsc#1051510).\n\n - ALSA: oss: Use kvzalloc() for local buffer allocations (bsc#1051510).\n\n - ALSA: sparc: Fix invalid snd_free_pages() at error path (bsc#1051510).\n\n - ALSA: usb-audio: Add vendor and product name for Dell WD19 Dock (bsc#1051510).\n\n - ALSA: wss: Fix invalid snd_free_pages() at error path (bsc#1051510).\n\n - ARM: dts: at91: add new compatibility string for macb on sama5d3 (bsc#1051510).\n\n - ASoC: Intel: cht_bsw_max98090: add support for Baytrail (bsc#1051510).\n\n - ASoC: dwc: Added a quirk DW_I2S_QUIRK_16BIT_IDX_OVERRIDE to dwc (bsc#1085535)\n\n - ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards using pmc_plt_clk_0 (bsc#1051510).\n\n - ASoC: sun8i-codec: fix crash on module removal (bsc#1051510).\n\n - Bluetooth: SMP: fix crash in unpairing (bsc#1051510).\n\n - Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth (bsc#1051510).\n\n - Btrfs: fix assertion failure during fsync in no-holes mode (bsc#1118136).\n\n - Btrfs: fix assertion on fsync of regular file when using no-holes feature (bsc#1118137).\n\n - Btrfs: fix cur_offset in the error case for nocow (bsc#1118140).\n\n - Btrfs: fix data corruption due to cloning of eof block (bsc#1116878).\n\n - Btrfs: fix deadlock on tree root leaf when finding free extent (bsc#1116876).\n\n - Btrfs: fix deadlock when writing out free space caches (bsc#1116700).\n\n - Btrfs: fix infinite loop on inode eviction after deduplication of eof block (bsc#1116877).\n\n - Btrfs: fix NULL pointer dereference on compressed write path error (bsc#1116698).\n\n - Btrfs: fix use-after-free during inode eviction (bsc#1116701).\n\n - Btrfs: fix use-after-free when dumping free space (bsc#1116862).\n\n - Btrfs: fix warning when replaying log after fsync of a tmpfile (bsc#1116692).\n\n - Btrfs: fix wrong dentries after fsync of file that got its parent replaced (bsc#1116693).\n\n - Btrfs: send, fix infinite loop due to directory rename dependencies (bsc#1118138).\n\n - Documentation/l1tf: Fix typos (bsc#1051510).\n\n - Documentation/l1tf: Remove Yonah processors from not vulnerable list (bsc#1051510).\n\n - EDAC, thunderx: Fix memory leak in thunderx_l2c_threaded_isr() (bsc#1114279).\n\n - EDAC: Raise the maximum number of memory controllers (bsc#1113780).\n\n - Fix kABI for 'Ensure we commit after writeback is complete' (bsc#1111809).\n\n - Fix some patch headers which diverge from RFC5322 Manually fix some patches which have an invalid header.\n\n - HID: hiddev: fix potential Spectre v1 (bsc#1051510).\n\n - HID: uhid: forbid UHID_CREATE under KERNEL_DS or elevated privileges (bsc#1051510).\n\n - Input: elan_i2c - add ACPI ID for Lenovo IdeaPad 330-15IGM (bsc#1051510).\n\n - Input: synaptics - avoid using uninitialized variable when probing (bsc#1051510).\n\n - Input: xpad - add PDP device id 0x02a4 (bsc#1051510).\n\n - Input: xpad - add support for Xbox1 PDP Camo series gamepad (bsc#1051510).\n\n - Input: xpad - avoid using __set_bit() for capabilities (bsc#1051510).\n\n - Input: xpad - fix some coding style issues (bsc#1051510).\n\n - KABI fix for 'NFSv4.1: Fix up replays of interrupted requests' (git-fixes).\n\n - KABI: hide new member in struct iommu_table from genksyms (bsc#1061840).\n\n - KABI: powerpc: Revert npu callback signature change (bsc#1055120).\n\n - KABI: powerpc: export __find_linux_pte as\n __find_linux_pte_or_hugepte (bsc#1061840).\n\n - KVM: PPC: Add pt_regs into kvm_vcpu_arch and move vcpu->arch.gpr[] into it (bsc#1061840).\n\n - KVM: PPC: Avoid marking DMA-mapped pages dirty in real mode (bsc#1061840).\n\n - KVM: PPC: Book 3S HV: Do ptesync in radix guest exit path (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Add 'online' register to ONE_REG interface (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Add of_node_put() in success path (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Allow HPT and radix on the same core for POWER9 v2.2 (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Allow creating max number of VCPUs on POWER9 (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Avoid crash from THP collapse during radix page fault (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Avoid shifts by negative amounts (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Check DR not IR to chose real vs virt mode MMIOs (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR value loaded (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate function (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Do not use compound_order to determine host mapping size (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Do not use existing 'prodded' flag for XIVE escalations (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Enable migration of decrementer register (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Factor fake-suspend handling out of kvmppc_save/restore_tm (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or 1GB memory backing (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix conditions for starting vcpu (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix constant size warning (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix duplication of host SLB entries (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix guest r11 corruption with POWER9 TM workarounds (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix handling of large pages in radix page fault handler (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in HPT resizing code (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix inaccurate comment (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real mode interrupts (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix trap number return from\n __kvmppc_vcore_entry (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix typo in kvmppc_hv_get_dirty_log_radix() (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Handle 1GB pages in radix page fault handler (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Improve handling of debug-trigger HMIs on POWER9 (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Keep XIVE escalation interrupt masked unless ceded (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Make HPT resizing work on POWER9 (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Make radix clear pte when unmapping (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Make radix use correct tlbie sequence in kvmppc_radix_tlbie_page (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU ID space (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Radix page fault handler optimizations (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under kvm->lock (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Recursively unmap all page table entries when unmapping (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Remove useless statement (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to Linux handlers (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR count correctly (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Snapshot timebase offset on guest entry (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Streamline setting of reference and change bits (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page fault handler (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Use a helper to unmap ptes in the radix fault path (bsc#1061840).\n\n - KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts on CPU priority change (bsc#1061840).\n\n - KVM: PPC: Book3S HV: radix: Do not clear partition PTE when RC or write bits do not match (bsc#1061840).\n\n - KVM: PPC: Book3S HV: radix: Refine IO region partition scope attributes (bsc#1061840).\n\n - KVM: PPC: Book3S PR: Add guest MSR parameter for kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).\n\n - KVM: PPC: Book3S PR: Move kvmppc_save_tm/kvmppc_restore_tm to separate file (bsc#1061840).\n\n - KVM: PPC: Book3S: Add MMIO emulation for VMX instructions (bsc#1061840).\n\n - KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages with smaller physical pages (bsc#1061840).\n\n - KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64 parameters (bsc#1061840).\n\n - KVM: PPC: Book3S: Eliminate some unnecessary checks (bsc#1061840).\n\n - KVM: PPC: Book3S: Fix compile error that occurs with some gcc versions (bsc#1061840).\n\n - KVM: PPC: Book3S: Fix matching of hardware and emulated TCE tables (bsc#1061840).\n\n - KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE (bsc#1061840).\n\n - KVM: PPC: Fix a mmio_host_swabbed uninitialized usage issue (bsc#1061840).\n\n - KVM: PPC: Make iommu_table::it_userspace big endian (bsc#1061840).\n\n - KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in kvm_vcpu_arch (bsc#1061840).\n\n - KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show() (bsc#1061840).\n\n - KVM: VMX: re-add ple_gap module parameter (bsc#1106240).\n\n - KVM: arm/arm64: Introduce vcpu_el1_is_32bit (bsc#1110998).\n\n - KVM: nVMX: Always reflect #NM VM-exits to L1 (bsc#1106240).\n\n - KVM: nVMX: move check_vmentry_postreqs() call to nested_vmx_enter_non_root_mode() (bsc#1106240).\n\n - KVM: s390: vsie: copy wrapping keys to right place (git-fixes).\n\n - KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING hypercall (bsc#1106240).\n\n - MD: fix invalid stored role for a disk - try2 (git-fixes).\n\n - NFS: Avoid RCU usage in tracepoints (git-fixes).\n\n - NFS: Ensure we commit after writeback is complete (bsc#1111809).\n\n - NFS: Fix a typo in nfs_rename() (git-fixes).\n\n - NFS: Fix an incorrect type in struct nfs_direct_req (git-fixes).\n\n - NFS: Fix typo in nomigration mount option (git-fixes).\n\n - NFS: Fix unstable write completion (git-fixes).\n\n - NFS: commit direct writes even if they fail partially (git-fixes).\n\n - NFSv4.0 fix client reference leak in callback (git-fixes).\n\n - NFSv4.1 fix infinite loop on I/O (git-fixes).\n\n - NFSv4.1: Fix a potential layoutget/layoutrecall deadlock (git-fixes).\n\n - NFSv4.1: Fix the client behaviour on NFS4ERR_SEQ_FALSE_RETRY (git-fixes).\n\n - NFSv4.1: Fix up replays of interrupted requests (git-fixes).\n\n - NFSv4: Fix a typo in nfs41_sequence_process (git-fixes).\n\n - PCI/ASPM: Do not initialize link state when aspm_disabled is set (bsc#1051510).\n\n - PCI/MSI: Warn and return error if driver enables MSI/MSI-X twice (bsc#1051510).\n\n - PCI: Add Device IDs for Intel GPU 'spurious interrupt' quirk (bsc#1051510).\n\n - PCI: hv: Use effective affinity mask (bsc#1109772).\n\n - PCI: imx6: Fix link training status detection in link up check (bsc#1109806).\n\n - PCI: iproc: Remove PAXC slot check to allow VF support (bsc#1109806).\n\n - PCI: vmd: Assign vector zero to all bridges (bsc#1109806).\n\n - PCI: vmd: Detach resources after stopping root bus (bsc#1109806).\n\n - PCI: vmd: White list for fast interrupt handlers (bsc#1109806).\n\n - SUNRPC: Allow connect to return EHOSTUNREACH (git-fixes).\n\n - SUNRPC: Fix tracepoint storage issues with svc_recv and svc_rqst_status (git-fixes).\n\n - USB: misc: appledisplay: add 20' Apple Cinema Display (bsc#1051510).\n\n - USB: omap_udc: fix rejection of out transfers when DMA is used (bsc#1051510).\n\n - USB: quirks: Add no-lpm quirk for Raydium touchscreens (bsc#1051510).\n\n - USB: serial: option: add two-endpoints device-id flag (bsc#1051510).\n\n - USB: serial: option: drop redundant interface-class test (bsc#1051510).\n\n - USB: serial: option: improve Quectel EP06 detection (bsc#1051510).\n\n - VFS: close race between getcwd() and d_move() (git-fixes).\n\n - VMCI: Resource wildcard match fixed (bsc#1051510).\n\n - acpi, nfit: Fix ARS overflow continuation (bsc#1116895).\n\n - acpi/nfit, x86/mce: Handle only uncorrectable machine checks (bsc#1114279).\n\n - acpi/nfit, x86/mce: Validate a MCE's address before using it (bsc#1114279).\n\n - act_ife: fix a potential use-after-free (networking-stable-18_09_11).\n\n - amd/iommu: Fix Guest Virtual APIC Log Tail Address Register (bsc#1106105).\n\n - arm64: KVM: Move CPU ID reg trap setup off the world switch path (bsc#1110998).\n\n - arm64: KVM: Sanitize PSTATE.M when being set from userspace (bsc#1110998).\n\n - arm64: KVM: Tighten guest core register access from userspace (bsc#1110998).\n\n - ata: Fix racy link clearance (bsc#1107866).\n\n - ataflop: fix error handling during setup (bsc#1051510).\n\n - ath10k: schedule hardware restart if WMI command times out (bsc#1051510).\n\n - autofs: fix autofs_sbi() does not check super block type (git-fixes).\n\n - autofs: fix slab out of bounds read in getname_kernel() (git-fixes).\n\n - autofs: mount point create should honour passed in mode (git-fixes).\n\n - badblocks: fix wrong return value in badblocks_set if badblocks are disabled (git-fixes).\n\n - batman-adv: Expand merged fragment buffer for full packet (bsc#1051510).\n\n - batman-adv: Use explicit tvlv padding for ELP packets (bsc#1051510).\n\n - bitops: protect variables in bit_clear_unless() macro (bsc#1051510).\n\n - bitops: protect variables in set_mask_bits() macro (bsc#1051510).\n\n - block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n\n - block: respect virtual boundary mask in bvecs (bsc#1113412).\n\n - bnxt_en: Fix TX timeout during netpoll (networking-stable-18_10_16).\n\n - bnxt_en: free hwrm resources, if driver probe fails (networking-stable-18_10_16).\n\n - bonding: avoid possible dead-lock (networking-stable-18_10_16).\n\n - bonding: fix length of actor system (networking-stable-18_11_02).\n\n - bonding: fix warning message (networking-stable-18_10_16).\n\n - bonding: pass link-local packets to bonding master also (networking-stable-18_10_16).\n\n - bpf, net: add skb_mac_header_len helper (networking-stable-18_09_24).\n\n - bpf: fix partial copy of map_ptr when dst is scalar (bsc#1083647).\n\n - bpf: wait for running BPF programs when updating map-in-map (bsc#1083647).\n\n - brcmfmac: fix for proper support of 160MHz bandwidth (bsc#1051510).\n\n - brcmfmac: fix reporting support for 160 MHz channels (bsc#1051510).\n\n - brcmutil: really fix decoding channel info for 160 MHz bandwidth (bsc#1051510).\n\n - bridge: do not add port to router list when receives query with source 0.0.0.0 (networking-stable-18_11_02).\n\n - btrfs: make sure we create all new block groups (bsc#1116699).\n\n - btrfs: protect space cache inode alloc with GFP_NOFS (bsc#1116863).\n\n - cachefiles: fix the race between cachefiles_bury_object() and rmdir(2) (bsc#1051510).\n\n - can: dev: __can_get_echo_skb(): Do not crash the kernel if can_priv::echo_skb is accessed out of bounds (bsc#1051510).\n\n - can: dev: __can_get_echo_skb(): print error message, if trying to echo non existing skb (bsc#1051510).\n\n - can: dev: __can_get_echo_skb(): replace struct can_frame by canfd_frame to access frame length (bsc#1051510).\n\n - can: dev: can_get_echo_skb(): factor out non sending code to __can_get_echo_skb() (bsc#1051510).\n\n - can: hi311x: Use level-triggered interrupt (bsc#1051510).\n\n - can: raw: check for CAN FD capable netdev in raw_sendmsg() (bsc#1051510).\n\n - can: rcar_can: Fix erroneous registration (bsc#1051510).\n\n - can: rx-offload: introduce can_rx_offload_get_echo_skb() and can_rx_offload_queue_sorted() functions (bsc#1051510).\n\n - cdc-acm: correct counting of UART states in serial state notification (bsc#1051510).\n\n - cdc-acm: do not reset notification buffer index upon urb unlinking (bsc#1051510).\n\n - ceph: fix dentry leak in ceph_readdir_prepopulate (bsc#1114839).\n\n - ceph: quota: fix NULL pointer dereference in quota check (bsc#1114839).\n\n - cfg80211: Address some corner cases in scan result channel updating (bsc#1051510).\n\n - cfg80211: fix use-after-free in reg_process_hint() (bsc#1051510).\n\n - clk: at91: Fix division by zero in PLL recalc_rate() (bsc#1051510).\n\n - clk: fixed-factor: fix of_node_get-put imbalance (bsc#1051510).\n\n - clk: fixed-rate: fix of_node_get-put imbalance (bsc#1051510).\n\n - clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk (bsc#1051510).\n\n - clk: rockchip: Fix static checker warning in rockchip_ddrclk_get_parent call (bsc#1051510).\n\n - clk: s2mps11: Add used attribute to s2mps11_dt_match (bsc#1051510).\n\n - clk: s2mps11: Fix matching when built as module and DT node contains compatible (bsc#1051510).\n\n - clk: samsung: exynos5420: Enable PERIS clocks for suspend (bsc#1051510).\n\n - clockevents/drivers/i8253: Add support for PIT shutdown quirk (bsc#1051510).\n\n - configfs: replace strncpy with memcpy (bsc#1051510).\n\n - crypto: simd - correctly take reqsize of wrapped skcipher into account (bsc#1051510).\n\n - do d_instantiate/unlock_new_inode combinations safely (git-fixes).\n\n - driver/dma/ioat: Call del_timer_sync() without holding prep_lock (bsc#1051510).\n\n - drm/amdgpu: add missing CHIP_HAINAN in amdgpu_ucode_get_load_type (bsc#1051510).\n\n - drm/ast: Fix incorrect free on ioregs (bsc#1051510).\n\n - drm/ast: Remove existing framebuffers before loading driver (boo#1112963)\n\n - drm/ast: change resolution may cause screen blurred (boo#1112963).\n\n - drm/ast: fixed cursor may disappear sometimes (bsc#1051510).\n\n - drm/dp_mst: Check if primary mstb is null (bsc#1051510).\n\n - drm/dp_mst: Skip validating ports during destruction, just ref (bsc#1051510).\n\n - drm/edid: Add 6 bpc quirk for BOE panel (bsc#1051510).\n\n - drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion 15-n233sl (bsc#1113722)\n\n - drm/i915/execlists: Force write serialisation into context image vs execution (bsc#1051510).\n\n - drm/i915/glk: Remove 99% limitation (bsc#1051510).\n\n - drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N values (bsc#1051510).\n\n - drm/i915: Do not oops during modeset shutdown after lpe audio deinit (bsc#1051510).\n\n - drm/i915: Do not unset intel_connector->mst_port (bsc#1051510).\n\n - drm/i915: Fix ilk+ watermarks when disabling pipes (bsc#1051510).\n\n - drm/i915: Large page offsets for pread/pwrite (bsc#1051510).\n\n - drm/i915: Mark pin flags as u64 (bsc#1051510).\n\n - drm/i915: Skip vcpi allocation for MSTB ports that are gone (bsc#1051510).\n\n - drm/i915: Write GPU relocs harder with gen3 (bsc#1051510).\n\n - drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config (bsc#1051510).\n\n - drm/meson: Fix OOB memory accesses in meson_viu_set_osd_lut() (bsc#1051510).\n\n - drm/meson: add support for 1080p25 mode (bsc#1051510).\n\n - drm/nouveau: Check backlight IDs are >= 0, not > 0 (bsc#1051510).\n\n - drm/omap: fix memory barrier bug in DMM driver (bsc#1051510).\n\n - drm/rockchip: Allow driver to be shutdown on reboot/kexec (bsc#1051510).\n\n - drm: fb-helper: Reject all pixel format changing requests (bsc#1113722)\n\n - ext4: add missing brelse() add_new_gdb_meta_bg()'s error path (bsc#1117795).\n\n - ext4: add missing brelse() in set_flexbg_block_bitmap()'s error path (bsc#1117794).\n\n - ext4: add missing brelse() update_backups()'s error path (bsc#1117796).\n\n - ext4: avoid buffer leak in ext4_orphan_add() after prior errors (bsc#1117802).\n\n - ext4: avoid buffer leak on shutdown in ext4_mark_iloc_dirty() (bsc#1117801).\n\n - ext4: avoid potential extra brelse in setup_new_flex_group_blocks() (bsc#1117792).\n\n - ext4: fix buffer leak in __ext4_read_dirblock() on error path (bsc#1117807).\n\n - ext4: fix buffer leak in ext4_xattr_move_to_block() on error path (bsc#1117806).\n\n - ext4: fix missing cleanup if ext4_alloc_flex_bg_array() fails while resizing (bsc#1117798).\n\n - ext4: fix possible inode leak in the retry loop of ext4_resize_fs() (bsc#1117799).\n\n - ext4: fix possible leak of s_journal_flag_rwsem in error path (bsc#1117804).\n\n - ext4: fix possible leak of sbi->s_group_desc_leak in error path (bsc#1117803).\n\n - ext4: fix setattr project check in fssetxattr ioctl (bsc#1117789).\n\n - ext4: fix use-after-free race in ext4_remount()'s error path (bsc#1117791).\n\n - ext4: initialize retries variable in ext4_da_write_inline_data_begin() (bsc#1117788).\n\n - ext4: propagate error from dquot_initialize() in EXT4_IOC_FSSETXATTR (bsc#1117790).\n\n - ext4: release bs.bh before re-using in ext4_xattr_block_find() (bsc#1117805).\n\n - fbdev: fix broken menu dependencies (bsc#1113722)\n\n - firmware: dcdbas: Add support for WSMT ACPI table (bsc#1089350 ).\n\n - firmware: dcdbas: include linux/io.h (bsc#1089350).\n\n - floppy: fix race condition in __floppy_read_block_0() (bsc#1051510).\n\n - flow_dissector: do not dissect l4 ports for fragments (networking-stable-18_11_21).\n\n - fs/dcache.c: fix kmemcheck splat at take_dentry_name_snapshot() (git-fixes).\n\n - fs: Make extension of struct super_block transparent (bsc#1117822).\n\n - fs: dcache: Avoid livelock between d_alloc_parallel and\n __d_add (git-fixes).\n\n - fs: dcache: Use READ_ONCE when accessing i_dir_seq (git-fixes).\n\n - fscache: fix race between enablement and dropping of object (bsc#1107385).\n\n - fsnotify: Fix busy inodes during unmount (bsc#1117822).\n\n - fsnotify: fix ignore mask logic in fsnotify() (bsc#1115074).\n\n - ftrace: Fix debug preempt config name in stack_tracer_(en,dis)able (bsc#1117172).\n\n - ftrace: Fix kmemleak in unregister_ftrace_graph (bsc#1117181).\n\n - ftrace: Fix memleak when unregistering dynamic ops when tracing disabled (bsc#1117174).\n\n - ftrace: Remove incorrect setting of glob search field (bsc#1117184).\n\n - genirq: Fix race on spurious interrupt detection (bsc#1051510).\n\n - getname_kernel() needs to make sure that ->name !=\n ->iname in long case (git-fixes).\n\n - gpio: do not free unallocated ida on gpiochip_add_data_with_key() error path (bsc#1051510).\n\n - grace: replace BUG_ON by WARN_ONCE in exit_net hook (git-fixes).\n\n - gso_segment: Reset skb->mac_len after modifying network header (networking-stable-18_09_24).\n\n - hv_netvsc: ignore devices that are not PCI (networking-stable-18_09_11).\n\n - hwmon (ina2xx) Fix NULL id pointer in probe() (bsc#1051510).\n\n - hwmon: (core) Fix double-free in\n __hwmon_device_register() (bsc#1051510).\n\n - hwmon: (ibmpowernv) Remove bogus __init annotations (bsc#1051510).\n\n - hwmon: (ina2xx) Fix current value calculation (bsc#1051510).\n\n - hwmon: (nct6775) Fix potential Spectre v1 (bsc#1051510).\n\n - hwmon: (pmbus) Fix page count auto-detection (bsc#1051510).\n\n - hwmon: (pwm-fan) Set fan speed to 0 on suspend (bsc#1051510).\n\n - hwmon: (raspberrypi) Fix initial notify (bsc#1051510).\n\n - hwmon: (w83795) temp4_type has writable permission (bsc#1051510).\n\n - ibmvnic: fix accelerated VLAN handling ().\n\n - ibmvnic: fix index in release_rx_pools (bsc#1115440, bsc#1115433).\n\n - ibmvnic: remove ndo_poll_controller ().\n\n - iio: accel: adxl345: convert address field usage in iio_chan_spec (bsc#1051510).\n\n - iio: ad5064: Fix regulator handling (bsc#1051510).\n\n - iio:st_magn: Fix enable device after trigger (bsc#1051510).\n\n - ima: fix showing large 'violations' or 'runtime_measurements_count' (bsc#1051510).\n\n - include/linux/pfn_t.h: force '~' to be parsed as an unary operator (bsc#1051510).\n\n - inet: make sure to grab rcu_read_lock before using ireq->ireq_opt (networking-stable-18_10_16).\n\n - iommu/arm-smmu: Ensure that page-table updates are visible before TLBI (bsc#1106237).\n\n - iommu/ipmmu-vmsa: Fix crash on early domain free (bsc#1106105).\n\n - iommu/vt-d: Fix NULL pointer dereference in prq_event_thread() (bsc#1106105).\n\n - iommu/vt-d: Use memunmap to free memremap (bsc#1106105).\n\n - ip6_tunnel: Fix encapsulation layout (networking-stable-18_11_02).\n\n - ip6_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).\n\n - ip6_vti: fix a NULL pointer deference when destroy vti6 tunnel (networking-stable-18_09_11).\n\n - ip_tunnel: be careful when accessing the inner header (networking-stable-18_10_16).\n\n - ip_tunnel: do not force DF when MTU is locked (networking-stable-18_11_21).\n\n - ipmi: Fix timer race with module unload (bsc#1051510).\n\n - ipv4: lock mtu in fnhe when received PMTU net.ipv4.route.min_pmtu (networking-stable-18_11_21).\n\n - ipv4: tcp: send zero IPID for RST and ACK sent in SYN-RECV and TIME-WAIT state (networking-stable-18_09_11).\n\n - ipv6/ndisc: Preserve IPv6 control buffer if protocol error handlers are called (networking-stable-18_11_02).\n\n - ipv6: fix possible use-after-free in ip6_xmit() (networking-stable-18_09_24).\n\n - ipv6: mcast: fix a use-after-free in inet6_mc_check (networking-stable-18_11_02).\n\n - ipv6: take rcu lock in rawv6_send_hdrinc() (networking-stable-18_10_16).\n\n - iwlwifi: dbg: allow wrt collection before ALIVE (bsc#1051510).\n\n - iwlwifi: do not WARN on trying to dump dead firmware (bsc#1051510).\n\n - iwlwifi: mvm: check for short GI only for OFDM (bsc#1051510).\n\n - iwlwifi: mvm: check return value of rs_rate_from_ucode_rate() (bsc#1051510).\n\n - iwlwifi: mvm: do not use SAR Geo if basic SAR is not used (bsc#1051510).\n\n - iwlwifi: mvm: fix BAR seq ctrl reporting (bsc#1051510).\n\n - iwlwifi: mvm: fix regulatory domain update when the firmware starts (bsc#1051510).\n\n - iwlwifi: mvm: support sta_statistics() even on older firmware (bsc#1051510).\n\n - iwlwifi: pcie: avoid empty free RB queue (bsc#1051510).\n\n - kABI: protect struct fib_nh_exception (kabi).\n\n - kABI: protect struct rtable (kabi).\n\n - kabi/severities: ignore __xive_vm_h_* KVM internal symbols.\n\n - kabi/severities: ignore ppc64 realmode helpers. KVM fixes remove exports of realmode_pfn_to_page iommu_tce_xchg_rm mm_iommu_lookup_rm mm_iommu_ua_to_hpa_rm. Some are no longer used and others are no longer exported because the code was consolideted in one place. These helpers are to be called in realmode and linking to them from non-KVM modules is a bug. Hence removing them does not break KABI.\n\n - kabi: mask raw in struct bpf_reg_state (bsc#1083647).\n\n - kbuild: fix kernel/bounds.c 'W=1' warning (bsc#1051510).\n\n - kbuild: move '_all' target out of $(KBUILD_SRC) conditional (bsc#1114279).\n\n - kgdboc: Passing ekgdboc to command line causes panic (bsc#1051510).\n\n - libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).\n\n - libertas: do not set URB_ZERO_PACKET on IN USB transfer (bsc#1051510).\n\n - libnvdimm, region: Fail badblocks listing for inactive regions (bsc#1116899).\n\n - libnvdimm: Hold reference on parent while scheduling async init (bsc#1116891).\n\n - livepatch: create and include UAPI headers ().\n\n - llc: set SOCK_RCU_FREE in llc_sap_add_socket() (networking-stable-18_11_02).\n\n - lockd: fix 'list_add double add' caused by legacy signal interface (git-fixes).\n\n - mac80211: Always report TX status (bsc#1051510).\n\n - mac80211: TDLS: fix skb queue/priority assignment (bsc#1051510).\n\n - mac80211: fix TX status reporting for ieee80211s (bsc#1051510).\n\n - mac80211_hwsim: do not omit multicast announce of first added radio (bsc#1051510).\n\n - mach64: fix display corruption on big endian machines (bsc#1113722)\n\n - mach64: fix image corruption due to reading accelerator registers (bsc#1113722)\n\n - mailbox: PCC: handle parse error (bsc#1051510).\n\n - make sure that __dentry_kill() always invalidates d_seq, unhashed or not (git-fixes).\n\n - md/raid10: fix that replacement cannot complete recovery after reassemble (git-fixes).\n\n - md/raid1: add error handling of read error from FailFast device (git-fixes).\n\n - md/raid5-cache: disable reshape completely (git-fixes).\n\n - md/raid5: fix data corruption of replacements after originals dropped (git-fixes).\n\n - md: fix NULL dereference of mddev->pers in remove_and_add_spares() (git-fixes).\n\n - memory_hotplug: cond_resched in __remove_pages (bnc#1114178).\n\n - mfd: menelaus: Fix possible race condition and leak (bsc#1051510).\n\n - mfd: omap-usb-host: Fix dts probe of children (bsc#1051510).\n\n - mlxsw: spectrum: Fix IP2ME CPU policer configuration (networking-stable-18_11_21).\n\n - mm: handle no memcg case in memcg_kmem_charge() properly (bnc#1113677).\n\n - mm: rework memcg kernel stack accounting (bnc#1113677).\n\n - mmc: dw_mmc-rockchip: correct property names in debug (bsc#1051510).\n\n - mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev 0x8620 rev 0x01 (bsc#1051510).\n\n - modpost: ignore livepatch unresolved relocations ().\n\n - mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED mounts (bsc#1117819).\n\n - mount: Prevent MNT_DETACH from disconnecting locked mounts (bsc#1117820).\n\n - mount: Retest MNT_LOCKED in do_umount (bsc#1117818).\n\n - neighbour: confirm neigh entries when ARP packet is received (networking-stable-18_09_24).\n\n - net-gro: reset skb->pkt_type in napi_reuse_skb() (networking-stable-18_11_21).\n\n - net/af_iucv: drop inbound packets with invalid flags (bnc#1113501, LTC#172679).\n\n - net/af_iucv: fix skb handling on HiperTransport xmit error (bnc#1113501, LTC#172679).\n\n - net/appletalk: fix minor pointer leak to userspace in SIOCFINDIPDDPRT (networking-stable-18_09_24).\n\n - net/ibmnvic: Fix deadlock problem in reset ().\n\n - net/ibmvnic: Fix RTNL deadlock during device reset (bnc#1115431).\n\n - net/ipv6: Display all addresses in output of /proc/net/if_inet6 (networking-stable-18_10_16).\n\n - net/ipv6: Fix index counter for unicast addresses in in6_dump_addrs (networking-stable-18_11_02).\n\n - net/mlx5: Check for error in mlx5_attach_interface (networking-stable-18_09_18).\n\n - net/mlx5: E-Switch, Fix memory leak when creating switchdev mode FDB tables (networking-stable-18_09_18).\n\n - net/mlx5: E-Switch, Fix out of bound access when setting vport rate (networking-stable-18_10_16).\n\n - net/mlx5: Fix debugfs cleanup in the device init/remove flow (networking-stable-18_09_18).\n\n - net/mlx5: Fix use-after-free in self-healing flow (networking-stable-18_09_18).\n\n - net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page fault type (networking-stable-18_11_02).\n\n - net/mlx5e: Fix selftest for small MTUs (networking-stable-18_11_21).\n\n - net/mlx5e: Set vlan masks for all offloaded TC rules (networking-stable-18_10_16).\n\n - net/packet: fix packet drop as of virtio gso (networking-stable-18_10_16).\n\n - net/sched: act_pedit: fix dump of extended layered op (networking-stable-18_09_11).\n\n - net/sched: act_sample: fix NULL dereference in the data path (networking-stable-18_09_24).\n\n - net/usb: cancel pending work when unbinding smsc75xx (networking-stable-18_10_16).\n\n - net: aquantia: memory corruption on jumbo frames (networking-stable-18_10_16).\n\n - net: bcmgenet: Poll internal PHY for GENETv5 (networking-stable-18_11_02).\n\n - net: bcmgenet: protect stop from timeout (networking-stable-18_11_21).\n\n - net: bcmgenet: use MAC link status for fixed phy (networking-stable-18_09_11).\n\n - net: bridge: remove ipv6 zero address check in mcast queries (git-fixes).\n\n - net: dsa: bcm_sf2: Call setup during switch resume (networking-stable-18_10_16).\n\n - net: dsa: bcm_sf2: Fix unbind ordering (networking-stable-18_10_16).\n\n - net: ena: Fix Kconfig dependency on X86 (bsc#1111696 bsc#1117561).\n\n - net: ena: add functions for handling Low Latency Queues in ena_com (bsc#1111696 bsc#1117561).\n\n - net: ena: add functions for handling Low Latency Queues in ena_netdev (bsc#1111696 bsc#1117561).\n\n - net: ena: change rx copybreak default to reduce kernel memory pressure (bsc#1111696 bsc#1117561).\n\n - net: ena: complete host info to match latest ENA spec (bsc#1111696 bsc#1117561).\n\n - net: ena: enable Low Latency Queues (bsc#1111696 bsc#1117561).\n\n - net: ena: explicit casting and initialization, and clearer error handling (bsc#1111696 bsc#1117561).\n\n - net: ena: fix NULL dereference due to untimely napi initialization (bsc#1111696 bsc#1117561).\n\n - net: ena: fix auto casting to boolean (bsc#1111696 bsc#1117561).\n\n - net: ena: fix compilation error in xtensa architecture (bsc#1111696 bsc#1117561).\n\n - net: ena: fix crash during failed resume from hibernation (bsc#1111696 bsc#1117561).\n\n - net: ena: fix indentations in ena_defs for better readability (bsc#1111696 bsc#1117561).\n\n - net: ena: fix rare bug when failed restart/resume is followed by driver removal (bsc#1111696 bsc#1117561).\n\n - net: ena: fix warning in rmmod caused by double iounmap (bsc#1111696 bsc#1117561).\n\n - net: ena: introduce Low Latency Queues data structures according to ENA spec (bsc#1111696 bsc#1117561).\n\n - net: ena: limit refill Rx threshold to 256 to avoid latency issues (bsc#1111696 bsc#1117561).\n\n - net: ena: minor performance improvement (bsc#1111696 bsc#1117561).\n\n - net: ena: remove ndo_poll_controller (bsc#1111696 bsc#1117561).\n\n - net: ena: remove redundant parameter in ena_com_admin_init() (bsc#1111696 bsc#1117561).\n\n - net: ena: update driver version to 2.0.1 (bsc#1111696 bsc#1117561).\n\n - net: ena: use CSUM_CHECKED device indication to report skb's checksum status (bsc#1111696 bsc#1117561).\n\n - net: fec: do not dump RX FIFO register when not available (networking-stable-18_11_02).\n\n - net: hns: fix for unmapping problem when SMMU is on (networking-stable-18_10_16).\n\n - net: hp100: fix always-true check for link up state (networking-stable-18_09_24).\n\n - net: ibm: fix return type of ndo_start_xmit function ().\n\n - net: ipmr: fix unresolved entry dumps (networking-stable-18_11_02).\n\n - net: macb: do not disable MDIO bus at open/close time (networking-stable-18_09_11).\n\n - net: mvpp2: Extract the correct ethtype from the skb for tx csum offload (networking-stable-18_10_16).\n\n - net: mvpp2: fix a txq_done race condition (networking-stable-18_10_16).\n\n - net: phy: mdio-gpio: Fix working over slow can_sleep GPIOs (networking-stable-18_11_21).\n\n - net: qca_spi: Fix race condition in spi transfers (networking-stable-18_09_18).\n\n - net: qmi_wwan: add Wistron Neweb D19Q1 (bsc#1051510).\n\n - net: sched: Fix for duplicate class dump (networking-stable-18_11_02).\n\n - net: sched: Fix memory exposure from short TCA_U32_SEL (networking-stable-18_09_11).\n\n - net: sched: action_ife: take reference to meta module (networking-stable-18_09_11).\n\n - net: sched: gred: pass the right attribute to gred_change_table_def() (networking-stable-18_11_02).\n\n - net: smsc95xx: Fix MTU range (networking-stable-18_11_21).\n\n - net: socket: fix a missing-check bug (networking-stable-18_11_02).\n\n - net: stmmac: Fix stmmac_mdio_reset() when building stmmac as modules (networking-stable-18_11_02).\n\n - net: stmmac: Fixup the tail addr setting in xmit path (networking-stable-18_10_16).\n\n - net: systemport: Fix wake-up interrupt race during resume (networking-stable-18_10_16).\n\n - net: systemport: Protect stop from timeout (networking-stable-18_11_21).\n\n - net: udp: fix handling of CHECKSUM_COMPLETE packets (networking-stable-18_11_02).\n\n - netlabel: check for IPV4MASK in addrinfo_get (networking-stable-18_10_16).\n\n - nfp: wait for posted reconfigs when disabling the device (networking-stable-18_09_11).\n\n - nfs: do not wait on commit in nfs_commit_inode() if there were no commit requests (git-fixes).\n\n - nfsd4: permit layoutget of executable-only files (git-fixes).\n\n - nfsd: CLOSE SHOULD return the invalid special stateid for NFSv4.x (x>0) (git-fixes).\n\n - nfsd: Ensure we check stateid validity in the seqid operation checks (git-fixes).\n\n - nfsd: Fix another OPEN stateid race (git-fixes).\n\n - nfsd: Fix stateid races between OPEN and CLOSE (git-fixes).\n\n - nfsd: check for use of the closed special stateid (git-fixes).\n\n - nfsd: deal with revoked delegations appropriately (git-fixes).\n\n - nfsd: fix corrupted reply to badly ordered compound (git-fixes).\n\n - nfsd: fix potential use-after-free in nfsd4_decode_getdeviceinfo (git-fixes).\n\n - nfsd: restrict rd_maxcount to svc_max_payload in nfsd_encode_readdir (git-fixes).\n\n - nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds (bsc#1051510).\n\n - nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT (bsc#1051510).\n\n - nospec: Include asm/barrier.h dependency (bsc#1114279).\n\n - nvme: Free ctrl device name on init failure ().\n\n - ocfs2: fix a misuse a of brelse after failing ocfs2_check_dir_entry (bsc#1117817).\n\n - ocfs2: fix locking for res->tracking and dlm->tracking_list (bsc#1117816).\n\n - ocfs2: fix ocfs2 read block panic (bsc#1117815).\n\n - ocfs2: free up write context when direct IO failed (bsc#1117821).\n\n - ocfs2: subsystem.su_mutex is required while accessing the item->ci_parent (bsc#1117808).\n\n - openvswitch: Fix push/pop ethernet validation (networking-stable-18_11_02).\n\n - pNFS: Always free the session slot on error in nfs4_layoutget_handle_exception (git-fixes).\n\n - pNFS: Prevent the layout header refcount going to zero in pnfs_roc() (git-fixes).\n\n - pci: dwc: remove duplicate fix References: bsc#1115269 Patch has been already applied by the following commit:\n 9f73db8b7c PCI: dwc: Fix enumeration end when reaching root subordinate (bsc#1051510)\n\n - pcmcia: Implement CLKRUN protocol disabling for Ricoh bridges (bsc#1051510).\n\n - percpu: make this_cpu_generic_read() atomic w.r.t.\n interrupts (bsc#1114279).\n\n - perf: fix invalid bit in diagnostic entry (git-fixes).\n\n - pinctrl: at91-pio4: fix has_config check in atmel_pctl_dt_subnode_to_map() (bsc#1051510).\n\n - pinctrl: meson: fix pinconf bias disable (bsc#1051510).\n\n - pinctrl: qcom: spmi-mpp: Fix drive strength setting (bsc#1051510).\n\n - pinctrl: qcom: spmi-mpp: Fix err handling of pmic_mpp_set_mux (bsc#1051510).\n\n - pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be compliant (bsc#1051510).\n\n - pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be compliant (bsc#1051510).\n\n - pipe: match pipe_max_size data type with procfs (git-fixes).\n\n - platform/x86: acerhdf: Add BIOS entry for Gateway LT31 v1.3307 (bsc#1051510).\n\n - platform/x86: intel_telemetry: report debugfs failure (bsc#1051510).\n\n - pnfs: Do not release the sequence slot until we've processed layoutget on open (git-fixes).\n\n - power: supply: max8998-charger: Fix platform data retrieval (bsc#1051510).\n\n - powerpc/64s/hash: Do not use PPC_INVALIDATE_ERAT on CPUs before POWER9 (bsc#1065729).\n\n - powerpc/boot: Fix opal console in boot wrapper (bsc#1065729).\n\n - powerpc/kvm/booke: Fix altivec related build break (bsc#1061840).\n\n - powerpc/kvm: Switch kvm pmd allocator to custom allocator (bsc#1061840).\n\n - powerpc/mm/keys: Move pte bits to correct headers (bsc#1078248).\n\n - powerpc/mm: Fix typo in comments (bsc#1065729).\n\n - powerpc/mm: Rename find_linux_pte_or_hugepte() (bsc#1061840).\n\n - powerpc/npu-dma.c: Fix crash after\n __mmu_notifier_register failure (bsc#1055120).\n\n - powerpc/perf: Update raw-event code encoding comment for power8 (bsc#1065729).\n\n - powerpc/powernv/ioda: Allocate indirect TCE levels on demand (bsc#1061840).\n\n - powerpc/powernv/ioda: Finish removing explicit max window size check (bsc#1061840).\n\n - powerpc/powernv/ioda: Remove explicit max window size check (bsc#1061840).\n\n - powerpc/powernv/npu: Add lock to prevent race in concurrent context init/destroy (bsc#1055120).\n\n - powerpc/powernv/npu: Do not explicitly flush nmmu tlb (bsc#1055120).\n\n - powerpc/powernv/npu: Fix deadlock in mmio_invalidate() (bsc#1055120).\n\n - powerpc/powernv/npu: Prevent overwriting of pnv_npu2_init_contex() callback parameters (bsc#1055120).\n\n - powerpc/powernv/npu: Use flush_all_mm() instead of flush_tlb_mm() (bsc#1055120).\n\n - powerpc/powernv/pci: Work around races in PCI bridge enabling (bsc#1055120).\n\n - powerpc/powernv: Add indirect levels to it_userspace (bsc#1061840).\n\n - powerpc/powernv: Do not select the cpufreq governors (bsc#1065729).\n\n - powerpc/powernv: Fix concurrency issue with npu->mmio_atsd_usage (bsc#1055120).\n\n - powerpc/powernv: Fix opal_event_shutdown() called with interrupts disabled (bsc#1065729).\n\n - powerpc/powernv: Move TCE manupulation code to its own file (bsc#1061840).\n\n - powerpc/powernv: Rework TCE level allocation (bsc#1061840).\n\n - powerpc/pseries/mobility: Extend start/stop topology update scope (bsc#1116950, bsc#1115709).\n\n - powerpc/pseries: Fix DTL buffer registration (bsc#1065729).\n\n - powerpc/pseries: Fix how we iterate over the DTL entries (bsc#1065729).\n\n - powerpc/xive: Move definition of ESB bits (bsc#1061840).\n\n - powerpc/xmon: Add ISA v3.0 SPRs to SPR dump (bsc#1061840).\n\n - pppoe: fix reception of frames with no mac header (networking-stable-18_09_24).\n\n - printk: Fix panic caused by passing log_buf_len to command line (bsc#1117168).\n\n - provide linux/set_memory.h (bsc#1113295).\n\n - ptp: fix Spectre v1 vulnerability (bsc#1051510).\n\n - pwm: lpss: Release runtime-pm reference from the driver's remove callback (bsc#1051510).\n\n - pxa168fb: prepare the clock (bsc#1051510).\n\n - qmi_wwan: Support dynamic config on Quectel EP06 (bsc#1051510).\n\n - qmi_wwan: apply SET_DTR quirk to the SIMCOM shared device ID (bsc#1051510).\n\n - r8169: fix NAPI handling under high load (networking-stable-18_11_02).\n\n - race of lockd inetaddr notifiers vs nlmsvc_rqst change (git-fixes).\n\n - rds: fix two RCU related problems (networking-stable-18_09_18).\n\n - remoteproc: qcom: Fix potential device node leaks (bsc#1051510).\n\n - reset: hisilicon: fix potential NULL pointer dereference (bsc#1051510).\n\n - reset: imx7: Fix always writing bits as 0 (bsc#1051510).\n\n - resource: Include resource end in walk_*() interfaces (bsc#1114279).\n\n - rpm/kernel-binary.spec.in: add macros.s into kernel-*-devel Starting with 4.20-rc1, file arch/*/kernel/macros.s is needed to build out of tree modules. Add it to kernel-$(flavor)-devel packages if it exists.\n\n - rpm/kernel-binary.spec.in: allow unsupported modules for\n -extra (bsc#1111183). SLE-15 and later only.\n\n - rpm/kernel-source.spec.in: Add patches.drm for moved DRM patches\n\n - rpm: use syncconfig instead of silentoldconfig where available Since mainline commit 0085b4191f3e ('kconfig:\n remove silentoldconfig target'), 'make silentoldconfig' can be no longer used. Use 'make syncconfig' instead if available.\n\n - rtnetlink: Disallow FDB configuration for non-Ethernet device (networking-stable-18_11_02).\n\n - rtnetlink: fix rtnl_fdb_dump() for ndmsg header (networking-stable-18_10_16).\n\n - rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to 4096 (networking-stable-18_10_16).\n\n - s390/cpum_sf: Add data entry sizes to sampling trailer entry (git-fixes).\n\n - s390/kvm: fix deadlock when killed by oom (bnc#1113501, LTC#172235).\n\n - s390/mm: Check for valid vma before zapping in gmap_discard (git-fixes).\n\n - s390/mm: correct allocate_pgste proc_handler callback (git-fixes).\n\n - s390/qeth: fix HiperSockets sniffer (bnc#1113501, LTC#172953).\n\n - s390/qeth: handle failure on workqueue creation (git-fixes).\n\n - s390/qeth: report 25Gbit link speed (bnc#1113501, LTC#172959).\n\n - s390/sclp_tty: enable line mode tty even if there is an ascii console (git-fixes).\n\n - s390/sthyi: add cache to store hypervisor info (LTC#160415, bsc#1068273).\n\n - s390/sthyi: add s390_sthyi system call (LTC#160415, bsc#1068273).\n\n - s390/sthyi: reorganize sthyi implementation (LTC#160415, bsc#1068273).\n\n - s390: qeth: Fix potential array overrun in cmd/rc lookup (bnc#1113501, LTC#172682).\n\n - s390: qeth_core_mpc: Use ARRAY_SIZE instead of reimplementing its function (bnc#1113501, LTC#172682).\n\n - s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n\n - scripts/git_sort/git_sort.py: add mkp/scsi.git 4.21/scsi-queue\n\n - scsi: core: Avoid that SCSI device removal through sysfs triggers a deadlock (bsc#1114578).\n\n - scsi: libsas: remove irq save in sas_ata_qc_issue() (bsc#1114580).\n\n - scsi: lpfc: Correct LCB RJT handling (bsc#1114015).\n\n - scsi: lpfc: Correct errors accessing fw log (bsc#1114015).\n\n - scsi: lpfc: Correct invalid EQ doorbell write on if_type=6 (bsc#1114015).\n\n - scsi: lpfc: Correct irq handling via locks when taking adapter offline (bsc#1114015).\n\n - scsi: lpfc: Correct loss of fc4 type on remote port address change (bsc#1114015).\n\n - scsi: lpfc: Correct race with abort on completion path (bsc#1114015).\n\n - scsi: lpfc: Correct soft lockup when running mds diagnostics (bsc#1114015).\n\n - scsi: lpfc: Correct speeds on SFP swap (bsc#1114015).\n\n - scsi: lpfc: Fix GFT_ID and PRLI logic for RSCN (bsc#1114015).\n\n - scsi: lpfc: Fix LOGO/PLOGI handling when triggerd by ABTS Timeout event (bsc#1114015).\n\n - scsi: lpfc: Fix errors in log messages (bsc#1114015).\n\n - scsi: lpfc: Fix lpfc_sli4_read_config return value check (bsc#1114015).\n\n - scsi: lpfc: Fix odd recovery in duplicate FLOGIs in point-to-point (bsc#1114015).\n\n - scsi: lpfc: Implement GID_PT on Nameserver query to support faster failover (bsc#1114015).\n\n - scsi: lpfc: Raise nvme defaults to support a larger io and more connectivity (bsc#1114015).\n\n - scsi: lpfc: Remove set but not used variable 'sgl_size' (bsc#1114015).\n\n - scsi: lpfc: Reset link or adapter instead of doing infinite nameserver PLOGI retry (bsc#1114015).\n\n - scsi: lpfc: Synchronize access to remoteport via rport (bsc#1114015).\n\n - scsi: lpfc: add Trunking support (bsc#1114015).\n\n - scsi: lpfc: add support to retrieve firmware logs (bsc#1114015).\n\n - scsi: lpfc: fcoe: Fix link down issue after 1000+ link bounces (bsc#1114015).\n\n - scsi: lpfc: raise sg count for nvme to use available sg resources (bsc#1114015).\n\n - scsi: lpfc: reduce locking when updating statistics (bsc#1114015).\n\n - scsi: lpfc: update driver version to 12.0.0.7 (bsc#1114015).\n\n - scsi: lpfc: update driver version to 12.0.0.8 (bsc#1114015).\n\n - scsi: qlogicpti: Fix an error handling path in 'qpti_sbus_probe()' (bsc#1114581).\n\n - scsi: scsi_transport_srp: Fix shost to rport translation (bsc#1114582).\n\n - scsi: sg: fix minor memory leak in error path (bsc#1114584).\n\n - scsi: sysfs: Introduce sysfs_(un,)break_active_protection() (bsc#1114578).\n\n - scsi: target/tcm_loop: Avoid that static checkers warn about dead code (bsc#1114577).\n\n - scsi: target: Fix fortify_panic kernel exception (bsc#1114576).\n\n - scsi: target: tcmu: add read length support (bsc#1097755).\n\n - sctp: fix race on sctp_id2asoc (networking-stable-18_11_02).\n\n - sctp: fix strchange_flags name for Stream Change Event (networking-stable-18_11_21).\n\n - sctp: hold transport before accessing its asoc in sctp_transport_get_next (networking-stable-18_09_11).\n\n - sctp: not allow to set asoc prsctp_enable by sockopt (networking-stable-18_11_21).\n\n - sctp: not increase stream's incnt before sending addstrm_in request (networking-stable-18_11_21).\n\n - skip LAYOUTRETURN if layout is invalid (git-fixes).\n\n - soc: fsl: qbman: qman: avoid allocating from non existing gen_pool (bsc#1051510).\n\n - soc: ti: QMSS: Fix usage of irq_set_affinity_hint (bsc#1051510).\n\n - staging: rtl8723bs: Fix the return value in case of error in 'rtw_wx_read32()' (bsc#1051510).\n\n - staging: vchiq_arm: fix compat VCHIQ_IOC_AWAIT_COMPLETION (bsc#1051510).\n\n - staging:iio:ad7606: fix voltage scales (bsc#1051510).\n\n - sunrpc: Do not use stack buffer with scatterlist (git-fixes).\n\n - sunrpc: Fix rpc_task_begin trace point (git-fixes).\n\n - target: fix buffer offset in core_scsi3_pri_read_full_status (bsc1117349).\n\n - tcp: do not restart timewait timer on rst reception (networking-stable-18_09_11).\n\n - test_firmware: fix error return getting clobbered (bsc#1051510).\n\n - tg3: Add PHY reset for 5717/5719/5720 in change ring and flow control paths (networking-stable-18_11_21).\n\n - thermal: bcm2835: enable hwmon explicitly (bsc#1108468).\n\n - thermal: da9062/61: Prevent hardware access during system suspend (bsc#1051510).\n\n - thermal: rcar_thermal: Prevent hardware access during system suspend (bsc#1051510).\n\n - tipc: do not assume linear buffer when reading ancillary data (networking-stable-18_11_21).\n\n - tipc: fix a missing rhashtable_walk_exit() (networking-stable-18_09_11).\n\n - tipc: fix flow control accounting for implicit connect (networking-stable-18_10_16).\n\n - tpm2-cmd: allow more attempts for selftest execution (bsc#1082555).\n\n - tpm: React correctly to RC_TESTING from TPM 2.0 self tests (bsc#1082555).\n\n - tpm: Restore functionality to xen vtpm driver (bsc#1082555).\n\n - tpm: Trigger only missing TPM 2.0 self tests (bsc#1082555).\n\n - tpm: Use dynamic delay to wait for TPM 2.0 self test result (bsc#1082555).\n\n - tpm: add retry logic (bsc#1082555).\n\n - tpm: consolidate the TPM startup code (bsc#1082555).\n\n - tpm: do not suspend/resume if power stays on (bsc#1082555).\n\n - tpm: fix intermittent failure with self tests (bsc#1082555).\n\n - tpm: fix response size validation in tpm_get_random() (bsc#1082555).\n\n - tpm: move endianness conversion of TPM_TAG_RQU_COMMAND to tpm_input_header (bsc#1082555).\n\n - tpm: move endianness conversion of ordinals to tpm_input_header (bsc#1082555).\n\n - tpm: move the delay_msec increment after sleep in tpm_transmit() (bsc#1082555).\n\n - tpm: replace msleep() with usleep_range() in TPM 1.2/2.0 generic drivers (bsc#1082555).\n\n - tpm: self test failure should not cause suspend to fail (bsc#1082555).\n\n - tpm: tpm-interface: fix tpm_transmit/_cmd kdoc (bsc#1082555).\n\n - tpm: use tpm2_pcr_read() in tpm2_do_selftest() (bsc#1082555).\n\n - tpm: use tpm_buf functions in tpm2_pcr_read() (bsc#1082555).\n\n - tracing: Apply trace_clock changes to instance max buffer (bsc#1117188).\n\n - tracing: Erase irqsoff trace with empty write (bsc#1117189).\n\n - tty: Do not block on IO when ldisc change is pending (bnc#1105428).\n\n - tty: check name length in tty_find_polling_driver() (bsc#1051510).\n\n - tty: wipe buffer (bsc#1051510).\n\n - tty: wipe buffer if not echoing data (bsc#1051510).\n\n - tun: Consistently configure generic netdev params via rtnetlink (bsc#1051510).\n\n - tuntap: fix multiqueue rx (networking-stable-18_11_21).\n\n - udp4: fix IP_CMSG_CHECKSUM for connected sockets (networking-stable-18_09_24).\n\n - udp6: add missing checks on edumux packet processing (networking-stable-18_09_24).\n\n - udp6: fix encap return code for resubmitting (git-fixes).\n\n - uio: Fix an Oops on load (bsc#1051510).\n\n - uio: ensure class is registered before devices (bsc#1051510).\n\n - uio: make symbol 'uio_class_registered' static (bsc#1051510).\n\n - usb: cdc-acm: add entry for Hiro (Conexant) modem (bsc#1051510).\n\n - usb: core: Fix hub port connection events lost (bsc#1051510).\n\n - usb: dwc2: host: Do not retry NAKed transactions right away (bsc#1114385).\n\n - usb: dwc2: host: do not delay retries for CONTROL IN transfers (bsc#1114385).\n\n - usb: dwc3: core: Clean up ULPI device (bsc#1051510).\n\n - usb: dwc3: gadget: Properly check last unaligned/zero chain TRB (bsc#1051510).\n\n - usb: dwc3: gadget: fix ISOC TRB type on unaligned transfers (bsc#1051510).\n\n - usb: gadget: storage: Fix Spectre v1 vulnerability (bsc#1051510).\n\n - usb: gadget: u_ether: fix unsafe list iteration (bsc#1051510).\n\n - usb: gadget: udc: atmel: handle at91sam9rl PMC (bsc#1051510).\n\n - usb: host: ohci-at91: fix request of irq for optional gpio (bsc#1051510).\n\n - usb: quirks: Add delay-init quirk for Corsair K70 LUX RGB (bsc#1051510).\n\n - usb: xhci: fix timeout for transition from RExit to U0 (bsc#1051510).\n\n - usbip:vudc: BUG kmalloc-2048 (Not tainted): Poison overwritten (bsc#1051510).\n\n - usbnet: smsc95xx: disable carrier check while suspending (bsc#1051510).\n\n - vfs: fix freeze protection in mnt_want_write_file() for overlayfs (git-fixes).\n\n - vhost/scsi: truncate T10 PI iov_iter to prot_bytes (bsc#1051510).\n\n - vhost: Fix Spectre V1 vulnerability (bsc#1051510).\n\n - virtio_net: avoid using netif_tx_disable() for serializing tx routine (networking-stable-18_11_02).\n\n - w1: omap-hdq: fix missing bus unregister at removal (bsc#1051510).\n\n - x86, hibernate: Fix nosave_regions setup for hibernation (bsc#1110006).\n\n - x86/MCE: Make correctable error detection look at the Deferred bit (bsc#1114279).\n\n - x86/corruption-check: Fix panic in memory_corruption_check() when boot option without value is provided (bsc#1110006).\n\n - x86/cpu/vmware: Do not trace vmware_sched_clock() (bsc#1114279).\n\n - x86/irq: implement irq_data_get_effective_affinity_mask() for v4.12 (bsc#1109772).\n\n - x86/kexec: Correct KEXEC_BACKUP_SRC_END off-by-one error (bsc#1114279).\n\n - x86/ldt: Remove unused variable in map_ldt_struct() (bsc#1114279).\n\n - x86/ldt: Split out sanity check in map_ldt_struct() (bsc#1114279).\n\n - x86/ldt: Unmap PTEs for the slot before freeing LDT pages (bsc#1114279).\n\n - x86/mm/pat: Disable preemption around __flush_tlb_all() (bsc#1114279).\n\n - x86/speculation: Support Enhanced IBRS on future CPUs ().\n\n - x86/xen: Fix boot loader version reported for PVH guests (bnc#1065600).\n\n - xen-swiotlb: use actually allocated size on check physical continuous (bnc#1065600).\n\n - xen/balloon: Support xend-based toolstack (bnc#1065600).\n\n - xen/blkfront: avoid NULL blkfront_info dereference on device removal (bsc#1111062).\n\n - xen/netfront: do not bug in case of too many frags (bnc#1104824).\n\n - xen/pvh: do not try to unplug emulated devices (bnc#1065600).\n\n - xen/pvh: increase early stack size (bnc#1065600).\n\n - xen: fix race in xen_qlock_wait() (bnc#1107256).\n\n - xen: fix xen_qlock_wait() (bnc#1107256).\n\n - xen: make xen_qlock_wait() nestable (bnc#1107256).\n\n - xfs: Fix error code in 'xfs_ioc_getbmap()' (git-fixes).\n\n - xfs: Properly detect when DAX won't be used on any device (bsc#1115976).\n\n - xhci: Add check for invalid byte size error when UAS devices are connected (bsc#1051510).\n\n - xhci: Fix leaking USB3 shared_hcd at xhci removal (bsc#1051510).\n\n - xprtrdma: Do not defer fencing an async RPC's chunks (git-fixes).", "cvss3": {"score": 7.8, "vector": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}, "published": "2019-03-27T00:00:00", "type": "nessus", "title": "openSUSE Security Update : the Linux Kernel (openSUSE-2019-974)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2018-18281"], "modified": "2021-01-19T00:00:00", "cpe": ["p-cpe:/a:novell:opensuse:kernel-debug", "p-cpe:/a:novell:opensuse:kernel-debug-base", "p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debuginfo", "p-cpe:/a:novell:opensuse:kernel-debug-debugsource", "p-cpe:/a:novell:opensuse:kernel-debug-devel", "p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default", "p-cpe:/a:novell:opensuse:kernel-default-base", "p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debuginfo", "p-cpe:/a:novell:opensuse:kernel-default-debugsource", "p-cpe:/a:novell:opensuse:kernel-default-devel", "p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-devel", "p-cpe:/a:novell:opensuse:kernel-docs-html", "p-cpe:/a:novell:opensuse:kernel-kvmsmall", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel", "p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo", "p-cpe:/a:novell:opensuse:kernel-macros", "p-cpe:/a:novell:opensuse:kernel-obs-build", "p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource", "p-cpe:/a:novell:opensuse:kernel-obs-qa", "p-cpe:/a:novell:opensuse:kernel-source", "p-cpe:/a:novell:opensuse:kernel-source-vanilla", "p-cpe:/a:novell:opensuse:kernel-syms", "p-cpe:/a:novell:opensuse:kernel-vanilla", "p-cpe:/a:novell:opensuse:kernel-vanilla-base", "p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo", "p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel", "p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo", "cpe:/o:novell:opensuse:15.0"], "id": "OPENSUSE-2019-974.NASL", "href": "https://www.tenable.com/plugins/nessus/123397", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from openSUSE Security Update openSUSE-2019-974.\n#\n# The text description of this plugin is (C) SUSE LLC.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(123397);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/19\");\n\n script_cve_id(\"CVE-2018-18281\");\n\n script_name(english:\"openSUSE Security Update : the Linux Kernel (openSUSE-2019-974)\");\n script_summary(english:\"Check for the openSUSE-2019-974 patch\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote openSUSE host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The openSUSE Leap 15.0 kernel was updated to 4.12.14-lp150.12.28.1 to\nreceive various security and bugfixes.\n\nThe following security bugs were fixed :\n\n - CVE-2018-18281: The mremap() syscall performs TLB\n flushes after dropping pagetable locks. If a syscall\n such as ftruncate() removes entries from the pagetables\n of a task that is in the middle of mremap(), a stale TLB\n entry can remain for a short time that permits access to\n a physical page after it has been released back to the\n page allocator and reused. (bnc#1113769).\n\nThe following non-security bugs were fixed :\n\n - ACPI / LPSS: Add alternative ACPI HIDs for Cherry Trail\n DMA controllers (bsc#1051510).\n\n - ACPI / platform: Add SMB0001 HID to forbidden_id_list\n (bsc#1051510).\n\n - ACPI / watchdog: Prefer iTCO_wdt always when WDAT table\n uses RTC SRAM (bsc#1051510).\n\n - ACPI/APEI: Handle GSIV and GPIO notification types\n (bsc#1115567). \n\n - ACPI/IORT: Fix iort_get_platform_device_domain()\n uninitialized pointer value (bsc#1051510).\n\n - ACPICA: Tables: Add WSMT support (bsc#1089350).\n\n - ALSA: ac97: Fix incorrect bit shift at AC97-SPSA control\n write (bsc#1051510).\n\n - ALSA: ca0106: Disable IZD on SB0570 DAC to fix audio\n pops (bsc#1051510).\n\n - ALSA: control: Fix race between adding and removing a\n user element (bsc#1051510).\n\n - ALSA: hda/ca0132 - Call pci_iounmap() instead of\n iounmap() (bsc#1051510).\n\n - ALSA: hda/realtek - Add GPIO data update helper\n (bsc#1051510).\n\n - ALSA: hda/realtek - Add auto-mute quirk for HP Spectre\n x360 laptop (bsc#1051510).\n\n - ALSA: hda/realtek - Allow skipping spec->init_amp\n detection (bsc#1051510).\n\n - ALSA: hda/realtek - Fix HP Headset Mic can't record\n (bsc#1051510).\n\n - ALSA: hda/realtek - Manage GPIO bits commonly\n (bsc#1051510).\n\n - ALSA: hda/realtek - Simplify Dell XPS13 GPIO handling\n (bsc#1051510).\n\n - ALSA: hda/realtek - Support ALC300 (bsc#1051510).\n\n - ALSA: hda/realtek - fix headset mic detection for MSI\n MS-B171 (bsc#1051510).\n\n - ALSA: hda/realtek - fix the pop noise on headphone for\n lenovo laptops (bsc#1051510).\n\n - ALSA: hda: Add ASRock N68C-S UCC the power_save\n blacklist (bsc#1051510).\n\n - ALSA: oss: Use kvzalloc() for local buffer allocations\n (bsc#1051510).\n\n - ALSA: sparc: Fix invalid snd_free_pages() at error path\n (bsc#1051510).\n\n - ALSA: usb-audio: Add vendor and product name for Dell\n WD19 Dock (bsc#1051510).\n\n - ALSA: wss: Fix invalid snd_free_pages() at error path\n (bsc#1051510).\n\n - ARM: dts: at91: add new compatibility string for macb on\n sama5d3 (bsc#1051510).\n\n - ASoC: Intel: cht_bsw_max98090: add support for Baytrail\n (bsc#1051510).\n\n - ASoC: dwc: Added a quirk DW_I2S_QUIRK_16BIT_IDX_OVERRIDE\n to dwc (bsc#1085535)\n\n - ASoC: intel: cht_bsw_max98090_ti: Add quirk for boards\n using pmc_plt_clk_0 (bsc#1051510).\n\n - ASoC: sun8i-codec: fix crash on module removal\n (bsc#1051510).\n\n - Bluetooth: SMP: fix crash in unpairing (bsc#1051510).\n\n - Bluetooth: btbcm: Add entry for BCM4335C0 UART bluetooth\n (bsc#1051510).\n\n - Btrfs: fix assertion failure during fsync in no-holes\n mode (bsc#1118136).\n\n - Btrfs: fix assertion on fsync of regular file when using\n no-holes feature (bsc#1118137).\n\n - Btrfs: fix cur_offset in the error case for nocow\n (bsc#1118140).\n\n - Btrfs: fix data corruption due to cloning of eof block\n (bsc#1116878).\n\n - Btrfs: fix deadlock on tree root leaf when finding free\n extent (bsc#1116876).\n\n - Btrfs: fix deadlock when writing out free space caches\n (bsc#1116700).\n\n - Btrfs: fix infinite loop on inode eviction after\n deduplication of eof block (bsc#1116877).\n\n - Btrfs: fix NULL pointer dereference on compressed write\n path error (bsc#1116698).\n\n - Btrfs: fix use-after-free during inode eviction\n (bsc#1116701).\n\n - Btrfs: fix use-after-free when dumping free space\n (bsc#1116862).\n\n - Btrfs: fix warning when replaying log after fsync of a\n tmpfile (bsc#1116692).\n\n - Btrfs: fix wrong dentries after fsync of file that got\n its parent replaced (bsc#1116693).\n\n - Btrfs: send, fix infinite loop due to directory rename\n dependencies (bsc#1118138).\n\n - Documentation/l1tf: Fix typos (bsc#1051510).\n\n - Documentation/l1tf: Remove Yonah processors from not\n vulnerable list (bsc#1051510).\n\n - EDAC, thunderx: Fix memory leak in\n thunderx_l2c_threaded_isr() (bsc#1114279).\n\n - EDAC: Raise the maximum number of memory controllers\n (bsc#1113780).\n\n - Fix kABI for 'Ensure we commit after writeback is\n complete' (bsc#1111809).\n\n - Fix some patch headers which diverge from RFC5322\n Manually fix some patches which have an invalid header.\n\n - HID: hiddev: fix potential Spectre v1 (bsc#1051510).\n\n - HID: uhid: forbid UHID_CREATE under KERNEL_DS or\n elevated privileges (bsc#1051510).\n\n - Input: elan_i2c - add ACPI ID for Lenovo IdeaPad\n 330-15IGM (bsc#1051510).\n\n - Input: synaptics - avoid using uninitialized variable\n when probing (bsc#1051510).\n\n - Input: xpad - add PDP device id 0x02a4 (bsc#1051510).\n\n - Input: xpad - add support for Xbox1 PDP Camo series\n gamepad (bsc#1051510).\n\n - Input: xpad - avoid using __set_bit() for capabilities\n (bsc#1051510).\n\n - Input: xpad - fix some coding style issues\n (bsc#1051510).\n\n - KABI fix for 'NFSv4.1: Fix up replays of interrupted\n requests' (git-fixes).\n\n - KABI: hide new member in struct iommu_table from\n genksyms (bsc#1061840).\n\n - KABI: powerpc: Revert npu callback signature change\n (bsc#1055120).\n\n - KABI: powerpc: export __find_linux_pte as\n __find_linux_pte_or_hugepte (bsc#1061840).\n\n - KVM: PPC: Add pt_regs into kvm_vcpu_arch and move\n vcpu->arch.gpr[] into it (bsc#1061840).\n\n - KVM: PPC: Avoid marking DMA-mapped pages dirty in real\n mode (bsc#1061840).\n\n - KVM: PPC: Book 3S HV: Do ptesync in radix guest exit\n path (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Add 'online' register to ONE_REG\n interface (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Add of_node_put() in success path\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Allow HPT and radix on the same\n core for POWER9 v2.2 (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Allow creating max number of VCPUs\n on POWER9 (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Avoid crash from THP collapse\n during radix page fault (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Avoid shifts by negative amounts\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Check DR not IR to chose real vs\n virt mode MMIOs (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Do SLB load/unload with guest LPCR\n value loaded (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Do not truncate HPTE index in xlate\n function (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Do not use compound_order to\n determine host mapping size (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Do not use existing 'prodded' flag\n for XIVE escalations (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Enable migration of decrementer\n register (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Factor fake-suspend handling out of\n kvmppc_save/restore_tm (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix VRMA initialization with 2MB or\n 1GB memory backing (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix conditions for starting vcpu\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix constant size warning\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix duplication of host SLB entries\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix guest r11 corruption with\n POWER9 TM workarounds (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix handling of large pages in\n radix page fault handler (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix handling of secondary HPTEG in\n HPT resizing code (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix inaccurate comment\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix kvmppc_bad_host_intr for real\n mode interrupts (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix trap number return from\n __kvmppc_vcore_entry (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Fix typo in\n kvmppc_hv_get_dirty_log_radix() (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Handle 1GB pages in radix page\n fault handler (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Improve handling of debug-trigger\n HMIs on POWER9 (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Keep XIVE escalation interrupt\n masked unless ceded (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Lockless tlbie for HPT hcalls\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Make HPT resizing work on POWER9\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Make radix clear pte when unmapping\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Make radix use correct tlbie\n sequence in kvmppc_radix_tlbie_page (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Make xive_pushed a byte, not a word\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Pack VCORE IDs to access full VCPU\n ID space (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Radix page fault handler\n optimizations (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Read kvm->arch.emul_smt_mode under\n kvm->lock (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Recursively unmap all page table\n entries when unmapping (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Remove useless statement\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Remove vcpu->arch.dec usage\n (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Send kvmppc_bad_interrupt NMIs to\n Linux handlers (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Set RWMR on POWER8 so PURR/SPURR\n count correctly (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Snapshot timebase offset on guest\n entry (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Streamline setting of reference and\n change bits (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Use __gfn_to_pfn_memslot() in page\n fault handler (bsc#1061840).\n\n - KVM: PPC: Book3S HV: Use a helper to unmap ptes in the\n radix fault path (bsc#1061840).\n\n - KVM: PPC: Book3S HV: XIVE: Resend re-routed interrupts\n on CPU priority change (bsc#1061840).\n\n - KVM: PPC: Book3S HV: radix: Do not clear partition PTE\n when RC or write bits do not match (bsc#1061840).\n\n - KVM: PPC: Book3S HV: radix: Refine IO region partition\n scope attributes (bsc#1061840).\n\n - KVM: PPC: Book3S PR: Add guest MSR parameter for\n kvmppc_save_tm()/kvmppc_restore_tm() (bsc#1061840).\n\n - KVM: PPC: Book3S PR: Move\n kvmppc_save_tm/kvmppc_restore_tm to separate file\n (bsc#1061840).\n\n - KVM: PPC: Book3S: Add MMIO emulation for VMX\n instructions (bsc#1061840).\n\n - KVM: PPC: Book3S: Allow backing bigger guest IOMMU pages\n with smaller physical pages (bsc#1061840).\n\n - KVM: PPC: Book3S: Check KVM_CREATE_SPAPR_TCE_64\n parameters (bsc#1061840).\n\n - KVM: PPC: Book3S: Eliminate some unnecessary checks\n (bsc#1061840).\n\n - KVM: PPC: Book3S: Fix compile error that occurs with\n some gcc versions (bsc#1061840).\n\n - KVM: PPC: Book3S: Fix matching of hardware and emulated\n TCE tables (bsc#1061840).\n\n - KVM: PPC: Book3S: Use correct page shift in H_STUFF_TCE\n (bsc#1061840).\n\n - KVM: PPC: Fix a mmio_host_swabbed uninitialized usage\n issue (bsc#1061840).\n\n - KVM: PPC: Make iommu_table::it_userspace big endian\n (bsc#1061840).\n\n - KVM: PPC: Move nip/ctr/lr/xer registers to pt_regs in\n kvm_vcpu_arch (bsc#1061840).\n\n - KVM: PPC: Use seq_puts() in kvmppc_exit_timing_show()\n (bsc#1061840).\n\n - KVM: VMX: re-add ple_gap module parameter (bsc#1106240).\n\n - KVM: arm/arm64: Introduce vcpu_el1_is_32bit\n (bsc#1110998).\n\n - KVM: nVMX: Always reflect #NM VM-exits to L1\n (bsc#1106240).\n\n - KVM: nVMX: move check_vmentry_postreqs() call to\n nested_vmx_enter_non_root_mode() (bsc#1106240).\n\n - KVM: s390: vsie: copy wrapping keys to right place\n (git-fixes).\n\n - KVM: x86: Fix kernel info-leak in KVM_HC_CLOCK_PAIRING\n hypercall (bsc#1106240).\n\n - MD: fix invalid stored role for a disk - try2\n (git-fixes).\n\n - NFS: Avoid RCU usage in tracepoints (git-fixes).\n\n - NFS: Ensure we commit after writeback is complete\n (bsc#1111809).\n\n - NFS: Fix a typo in nfs_rename() (git-fixes).\n\n - NFS: Fix an incorrect type in struct nfs_direct_req\n (git-fixes).\n\n - NFS: Fix typo in nomigration mount option (git-fixes).\n\n - NFS: Fix unstable write completion (git-fixes).\n\n - NFS: commit direct writes even if they fail partially\n (git-fixes).\n\n - NFSv4.0 fix client reference leak in callback\n (git-fixes).\n\n - NFSv4.1 fix infinite loop on I/O (git-fixes).\n\n - NFSv4.1: Fix a potential layoutget/layoutrecall deadlock\n (git-fixes).\n\n - NFSv4.1: Fix the client behaviour on\n NFS4ERR_SEQ_FALSE_RETRY (git-fixes).\n\n - NFSv4.1: Fix up replays of interrupted requests\n (git-fixes).\n\n - NFSv4: Fix a typo in nfs41_sequence_process (git-fixes).\n\n - PCI/ASPM: Do not initialize link state when\n aspm_disabled is set (bsc#1051510).\n\n - PCI/MSI: Warn and return error if driver enables\n MSI/MSI-X twice (bsc#1051510).\n\n - PCI: Add Device IDs for Intel GPU 'spurious interrupt'\n quirk (bsc#1051510).\n\n - PCI: hv: Use effective affinity mask (bsc#1109772).\n\n - PCI: imx6: Fix link training status detection in link up\n check (bsc#1109806).\n\n - PCI: iproc: Remove PAXC slot check to allow VF support\n (bsc#1109806).\n\n - PCI: vmd: Assign vector zero to all bridges\n (bsc#1109806).\n\n - PCI: vmd: Detach resources after stopping root bus\n (bsc#1109806).\n\n - PCI: vmd: White list for fast interrupt handlers\n (bsc#1109806).\n\n - SUNRPC: Allow connect to return EHOSTUNREACH\n (git-fixes).\n\n - SUNRPC: Fix tracepoint storage issues with svc_recv and\n svc_rqst_status (git-fixes).\n\n - USB: misc: appledisplay: add 20' Apple Cinema Display\n (bsc#1051510).\n\n - USB: omap_udc: fix rejection of out transfers when DMA\n is used (bsc#1051510).\n\n - USB: quirks: Add no-lpm quirk for Raydium touchscreens\n (bsc#1051510).\n\n - USB: serial: option: add two-endpoints device-id flag\n (bsc#1051510).\n\n - USB: serial: option: drop redundant interface-class test\n (bsc#1051510).\n\n - USB: serial: option: improve Quectel EP06 detection\n (bsc#1051510).\n\n - VFS: close race between getcwd() and d_move()\n (git-fixes).\n\n - VMCI: Resource wildcard match fixed (bsc#1051510).\n\n - acpi, nfit: Fix ARS overflow continuation (bsc#1116895).\n\n - acpi/nfit, x86/mce: Handle only uncorrectable machine\n checks (bsc#1114279).\n\n - acpi/nfit, x86/mce: Validate a MCE's address before\n using it (bsc#1114279).\n\n - act_ife: fix a potential use-after-free\n (networking-stable-18_09_11).\n\n - amd/iommu: Fix Guest Virtual APIC Log Tail Address\n Register (bsc#1106105).\n\n - arm64: KVM: Move CPU ID reg trap setup off the world\n switch path (bsc#1110998).\n\n - arm64: KVM: Sanitize PSTATE.M when being set from\n userspace (bsc#1110998).\n\n - arm64: KVM: Tighten guest core register access from\n userspace (bsc#1110998).\n\n - ata: Fix racy link clearance (bsc#1107866).\n\n - ataflop: fix error handling during setup (bsc#1051510).\n\n - ath10k: schedule hardware restart if WMI command times\n out (bsc#1051510).\n\n - autofs: fix autofs_sbi() does not check super block type\n (git-fixes).\n\n - autofs: fix slab out of bounds read in getname_kernel()\n (git-fixes).\n\n - autofs: mount point create should honour passed in mode\n (git-fixes).\n\n - badblocks: fix wrong return value in badblocks_set if\n badblocks are disabled (git-fixes).\n\n - batman-adv: Expand merged fragment buffer for full\n packet (bsc#1051510).\n\n - batman-adv: Use explicit tvlv padding for ELP packets\n (bsc#1051510).\n\n - bitops: protect variables in bit_clear_unless() macro\n (bsc#1051510).\n\n - bitops: protect variables in set_mask_bits() macro\n (bsc#1051510).\n\n - block: copy ioprio in __bio_clone_fast() (bsc#1082653).\n\n - block: respect virtual boundary mask in bvecs\n (bsc#1113412).\n\n - bnxt_en: Fix TX timeout during netpoll\n (networking-stable-18_10_16).\n\n - bnxt_en: free hwrm resources, if driver probe fails\n (networking-stable-18_10_16).\n\n - bonding: avoid possible dead-lock\n (networking-stable-18_10_16).\n\n - bonding: fix length of actor system\n (networking-stable-18_11_02).\n\n - bonding: fix warning message\n (networking-stable-18_10_16).\n\n - bonding: pass link-local packets to bonding master also\n (networking-stable-18_10_16).\n\n - bpf, net: add skb_mac_header_len helper\n (networking-stable-18_09_24).\n\n - bpf: fix partial copy of map_ptr when dst is scalar\n (bsc#1083647).\n\n - bpf: wait for running BPF programs when updating\n map-in-map (bsc#1083647).\n\n - brcmfmac: fix for proper support of 160MHz bandwidth\n (bsc#1051510).\n\n - brcmfmac: fix reporting support for 160 MHz channels\n (bsc#1051510).\n\n - brcmutil: really fix decoding channel info for 160 MHz\n bandwidth (bsc#1051510).\n\n - bridge: do not add port to router list when receives\n query with source 0.0.0.0 (networking-stable-18_11_02).\n\n - btrfs: make sure we create all new block groups\n (bsc#1116699).\n\n - btrfs: protect space cache inode alloc with GFP_NOFS\n (bsc#1116863).\n\n - cachefiles: fix the race between\n cachefiles_bury_object() and rmdir(2) (bsc#1051510).\n\n - can: dev: __can_get_echo_skb(): Do not crash the kernel\n if can_priv::echo_skb is accessed out of bounds\n (bsc#1051510).\n\n - can: dev: __can_get_echo_skb(): print error message, if\n trying to echo non existing skb (bsc#1051510).\n\n - can: dev: __can_get_echo_skb(): replace struct can_frame\n by canfd_frame to access frame length (bsc#1051510).\n\n - can: dev: can_get_echo_skb(): factor out non sending\n code to __can_get_echo_skb() (bsc#1051510).\n\n - can: hi311x: Use level-triggered interrupt\n (bsc#1051510).\n\n - can: raw: check for CAN FD capable netdev in\n raw_sendmsg() (bsc#1051510).\n\n - can: rcar_can: Fix erroneous registration (bsc#1051510).\n\n - can: rx-offload: introduce can_rx_offload_get_echo_skb()\n and can_rx_offload_queue_sorted() functions\n (bsc#1051510).\n\n - cdc-acm: correct counting of UART states in serial state\n notification (bsc#1051510).\n\n - cdc-acm: do not reset notification buffer index upon urb\n unlinking (bsc#1051510).\n\n - ceph: fix dentry leak in ceph_readdir_prepopulate\n (bsc#1114839).\n\n - ceph: quota: fix NULL pointer dereference in quota check\n (bsc#1114839).\n\n - cfg80211: Address some corner cases in scan result\n channel updating (bsc#1051510).\n\n - cfg80211: fix use-after-free in reg_process_hint()\n (bsc#1051510).\n\n - clk: at91: Fix division by zero in PLL recalc_rate()\n (bsc#1051510).\n\n - clk: fixed-factor: fix of_node_get-put imbalance\n (bsc#1051510).\n\n - clk: fixed-rate: fix of_node_get-put imbalance\n (bsc#1051510).\n\n - clk: mmp2: fix the clock id for sdh2_clk and sdh3_clk\n (bsc#1051510).\n\n - clk: rockchip: Fix static checker warning in\n rockchip_ddrclk_get_parent call (bsc#1051510).\n\n - clk: s2mps11: Add used attribute to s2mps11_dt_match\n (bsc#1051510).\n\n - clk: s2mps11: Fix matching when built as module and DT\n node contains compatible (bsc#1051510).\n\n - clk: samsung: exynos5420: Enable PERIS clocks for\n suspend (bsc#1051510).\n\n - clockevents/drivers/i8253: Add support for PIT shutdown\n quirk (bsc#1051510).\n\n - configfs: replace strncpy with memcpy (bsc#1051510).\n\n - crypto: simd - correctly take reqsize of wrapped\n skcipher into account (bsc#1051510).\n\n - do d_instantiate/unlock_new_inode combinations safely\n (git-fixes).\n\n - driver/dma/ioat: Call del_timer_sync() without holding\n prep_lock (bsc#1051510).\n\n - drm/amdgpu: add missing CHIP_HAINAN in\n amdgpu_ucode_get_load_type (bsc#1051510).\n\n - drm/ast: Fix incorrect free on ioregs (bsc#1051510).\n\n - drm/ast: Remove existing framebuffers before loading\n driver (boo#1112963)\n\n - drm/ast: change resolution may cause screen blurred\n (boo#1112963).\n\n - drm/ast: fixed cursor may disappear sometimes\n (bsc#1051510).\n\n - drm/dp_mst: Check if primary mstb is null (bsc#1051510).\n\n - drm/dp_mst: Skip validating ports during destruction,\n just ref (bsc#1051510).\n\n - drm/edid: Add 6 bpc quirk for BOE panel (bsc#1051510).\n\n - drm/edid: Add 6 bpc quirk for BOE panel in HP Pavilion\n 15-n233sl (bsc#1113722)\n\n - drm/i915/execlists: Force write serialisation into\n context image vs execution (bsc#1051510).\n\n - drm/i915/glk: Remove 99% limitation (bsc#1051510).\n\n - drm/i915/hdmi: Add HDMI 2.0 audio clock recovery N\n values (bsc#1051510).\n\n - drm/i915: Do not oops during modeset shutdown after lpe\n audio deinit (bsc#1051510).\n\n - drm/i915: Do not unset intel_connector->mst_port\n (bsc#1051510).\n\n - drm/i915: Fix ilk+ watermarks when disabling pipes\n (bsc#1051510).\n\n - drm/i915: Large page offsets for pread/pwrite\n (bsc#1051510).\n\n - drm/i915: Mark pin flags as u64 (bsc#1051510).\n\n - drm/i915: Skip vcpi allocation for MSTB ports that are\n gone (bsc#1051510).\n\n - drm/i915: Write GPU relocs harder with gen3\n (bsc#1051510).\n\n - drm/meson: Enable fast_io in meson_dw_hdmi_regmap_config\n (bsc#1051510).\n\n - drm/meson: Fix OOB memory accesses in\n meson_viu_set_osd_lut() (bsc#1051510).\n\n - drm/meson: add support for 1080p25 mode (bsc#1051510).\n\n - drm/nouveau: Check backlight IDs are >= 0, not > 0\n (bsc#1051510).\n\n - drm/omap: fix memory barrier bug in DMM driver\n (bsc#1051510).\n\n - drm/rockchip: Allow driver to be shutdown on\n reboot/kexec (bsc#1051510).\n\n - drm: fb-helper: Reject all pixel format changing\n requests (bsc#1113722)\n\n - ext4: add missing brelse() add_new_gdb_meta_bg()'s error\n path (bsc#1117795).\n\n - ext4: add missing brelse() in\n set_flexbg_block_bitmap()'s error path (bsc#1117794).\n\n - ext4: add missing brelse() update_backups()'s error path\n (bsc#1117796).\n\n - ext4: avoid buffer leak in ext4_orphan_add() after prior\n errors (bsc#1117802).\n\n - ext4: avoid buffer leak on shutdown in\n ext4_mark_iloc_dirty() (bsc#1117801).\n\n - ext4: avoid potential extra brelse in\n setup_new_flex_group_blocks() (bsc#1117792).\n\n - ext4: fix buffer leak in __ext4_read_dirblock() on error\n path (bsc#1117807).\n\n - ext4: fix buffer leak in ext4_xattr_move_to_block() on\n error path (bsc#1117806).\n\n - ext4: fix missing cleanup if ext4_alloc_flex_bg_array()\n fails while resizing (bsc#1117798).\n\n - ext4: fix possible inode leak in the retry loop of\n ext4_resize_fs() (bsc#1117799).\n\n - ext4: fix possible leak of s_journal_flag_rwsem in error\n path (bsc#1117804).\n\n - ext4: fix possible leak of sbi->s_group_desc_leak in\n error path (bsc#1117803).\n\n - ext4: fix setattr project check in fssetxattr ioctl\n (bsc#1117789).\n\n - ext4: fix use-after-free race in ext4_remount()'s error\n path (bsc#1117791).\n\n - ext4: initialize retries variable in\n ext4_da_write_inline_data_begin() (bsc#1117788).\n\n - ext4: propagate error from dquot_initialize() in\n EXT4_IOC_FSSETXATTR (bsc#1117790).\n\n - ext4: release bs.bh before re-using in\n ext4_xattr_block_find() (bsc#1117805).\n\n - fbdev: fix broken menu dependencies (bsc#1113722)\n\n - firmware: dcdbas: Add support for WSMT ACPI table\n (bsc#1089350 ).\n\n - firmware: dcdbas: include linux/io.h (bsc#1089350).\n\n - floppy: fix race condition in __floppy_read_block_0()\n (bsc#1051510).\n\n - flow_dissector: do not dissect l4 ports for fragments\n (networking-stable-18_11_21).\n\n - fs/dcache.c: fix kmemcheck splat at\n take_dentry_name_snapshot() (git-fixes).\n\n - fs: Make extension of struct super_block transparent\n (bsc#1117822).\n\n - fs: dcache: Avoid livelock between d_alloc_parallel and\n __d_add (git-fixes).\n\n - fs: dcache: Use READ_ONCE when accessing i_dir_seq\n (git-fixes).\n\n - fscache: fix race between enablement and dropping of\n object (bsc#1107385).\n\n - fsnotify: Fix busy inodes during unmount (bsc#1117822).\n\n - fsnotify: fix ignore mask logic in fsnotify()\n (bsc#1115074).\n\n - ftrace: Fix debug preempt config name in\n stack_tracer_(en,dis)able (bsc#1117172).\n\n - ftrace: Fix kmemleak in unregister_ftrace_graph\n (bsc#1117181).\n\n - ftrace: Fix memleak when unregistering dynamic ops when\n tracing disabled (bsc#1117174).\n\n - ftrace: Remove incorrect setting of glob search field\n (bsc#1117184).\n\n - genirq: Fix race on spurious interrupt detection\n (bsc#1051510).\n\n - getname_kernel() needs to make sure that ->name !=\n ->iname in long case (git-fixes).\n\n - gpio: do not free unallocated ida on\n gpiochip_add_data_with_key() error path (bsc#1051510).\n\n - grace: replace BUG_ON by WARN_ONCE in exit_net hook\n (git-fixes).\n\n - gso_segment: Reset skb->mac_len after modifying network\n header (networking-stable-18_09_24).\n\n - hv_netvsc: ignore devices that are not PCI\n (networking-stable-18_09_11).\n\n - hwmon (ina2xx) Fix NULL id pointer in probe()\n (bsc#1051510).\n\n - hwmon: (core) Fix double-free in\n __hwmon_device_register() (bsc#1051510).\n\n - hwmon: (ibmpowernv) Remove bogus __init annotations\n (bsc#1051510).\n\n - hwmon: (ina2xx) Fix current value calculation\n (bsc#1051510).\n\n - hwmon: (nct6775) Fix potential Spectre v1 (bsc#1051510).\n\n - hwmon: (pmbus) Fix page count auto-detection\n (bsc#1051510).\n\n - hwmon: (pwm-fan) Set fan speed to 0 on suspend\n (bsc#1051510).\n\n - hwmon: (raspberrypi) Fix initial notify (bsc#1051510).\n\n - hwmon: (w83795) temp4_type has writable permission\n (bsc#1051510).\n\n - ibmvnic: fix accelerated VLAN handling ().\n\n - ibmvnic: fix index in release_rx_pools (bsc#1115440,\n bsc#1115433).\n\n - ibmvnic: remove ndo_poll_controller ().\n\n - iio: accel: adxl345: convert address field usage in\n iio_chan_spec (bsc#1051510).\n\n - iio: ad5064: Fix regulator handling (bsc#1051510).\n\n - iio:st_magn: Fix enable device after trigger\n (bsc#1051510).\n\n - ima: fix showing large 'violations' or\n 'runtime_measurements_count' (bsc#1051510).\n\n - include/linux/pfn_t.h: force '~' to be parsed as an\n unary operator (bsc#1051510).\n\n - inet: make sure to grab rcu_read_lock before using\n ireq->ireq_opt (networking-stable-18_10_16).\n\n - iommu/arm-smmu: Ensure that page-table updates are\n visible before TLBI (bsc#1106237).\n\n - iommu/ipmmu-vmsa: Fix crash on early domain free\n (bsc#1106105).\n\n - iommu/vt-d: Fix NULL pointer dereference in\n prq_event_thread() (bsc#1106105).\n\n - iommu/vt-d: Use memunmap to free memremap (bsc#1106105).\n\n - ip6_tunnel: Fix encapsulation layout\n (networking-stable-18_11_02).\n\n - ip6_tunnel: be careful when accessing the inner header\n (networking-stable-18_10_16).\n\n - ip6_vti: fix a NULL pointer deference when destroy vti6\n tunnel (networking-stable-18_09_11).\n\n - ip_tunnel: be careful when accessing the inner header\n (networking-stable-18_10_16).\n\n - ip_tunnel: do not force DF when MTU is locked\n (networking-stable-18_11_21).\n\n - ipmi: Fix timer race with module unload (bsc#1051510).\n\n - ipv4: lock mtu in fnhe when received PMTU\n net.ipv4.route.min_pmtu (networking-stable-18_11_21).\n\n - ipv4: tcp: send zero IPID for RST and ACK sent in\n SYN-RECV and TIME-WAIT state\n (networking-stable-18_09_11).\n\n - ipv6/ndisc: Preserve IPv6 control buffer if protocol\n error handlers are called (networking-stable-18_11_02).\n\n - ipv6: fix possible use-after-free in ip6_xmit()\n (networking-stable-18_09_24).\n\n - ipv6: mcast: fix a use-after-free in inet6_mc_check\n (networking-stable-18_11_02).\n\n - ipv6: take rcu lock in rawv6_send_hdrinc()\n (networking-stable-18_10_16).\n\n - iwlwifi: dbg: allow wrt collection before ALIVE\n (bsc#1051510).\n\n - iwlwifi: do not WARN on trying to dump dead firmware\n (bsc#1051510).\n\n - iwlwifi: mvm: check for short GI only for OFDM\n (bsc#1051510).\n\n - iwlwifi: mvm: check return value of\n rs_rate_from_ucode_rate() (bsc#1051510).\n\n - iwlwifi: mvm: do not use SAR Geo if basic SAR is not\n used (bsc#1051510).\n\n - iwlwifi: mvm: fix BAR seq ctrl reporting (bsc#1051510).\n\n - iwlwifi: mvm: fix regulatory domain update when the\n firmware starts (bsc#1051510).\n\n - iwlwifi: mvm: support sta_statistics() even on older\n firmware (bsc#1051510).\n\n - iwlwifi: pcie: avoid empty free RB queue (bsc#1051510).\n\n - kABI: protect struct fib_nh_exception (kabi).\n\n - kABI: protect struct rtable (kabi).\n\n - kabi/severities: ignore __xive_vm_h_* KVM internal\n symbols.\n\n - kabi/severities: ignore ppc64 realmode helpers. KVM\n fixes remove exports of realmode_pfn_to_page\n iommu_tce_xchg_rm mm_iommu_lookup_rm\n mm_iommu_ua_to_hpa_rm. Some are no longer used and\n others are no longer exported because the code was\n consolideted in one place. These helpers are to be\n called in realmode and linking to them from non-KVM\n modules is a bug. Hence removing them does not break\n KABI.\n\n - kabi: mask raw in struct bpf_reg_state (bsc#1083647).\n\n - kbuild: fix kernel/bounds.c 'W=1' warning (bsc#1051510).\n\n - kbuild: move '_all' target out of $(KBUILD_SRC)\n conditional (bsc#1114279).\n\n - kgdboc: Passing ekgdboc to command line causes panic\n (bsc#1051510).\n\n - libceph: bump CEPH_MSG_MAX_DATA_LEN (bsc#1114839).\n\n - libertas: do not set URB_ZERO_PACKET on IN USB transfer\n (bsc#1051510).\n\n - libnvdimm, region: Fail badblocks listing for inactive\n regions (bsc#1116899).\n\n - libnvdimm: Hold reference on parent while scheduling\n async init (bsc#1116891).\n\n - livepatch: create and include UAPI headers ().\n\n - llc: set SOCK_RCU_FREE in llc_sap_add_socket()\n (networking-stable-18_11_02).\n\n - lockd: fix 'list_add double add' caused by legacy signal\n interface (git-fixes).\n\n - mac80211: Always report TX status (bsc#1051510).\n\n - mac80211: TDLS: fix skb queue/priority assignment\n (bsc#1051510).\n\n - mac80211: fix TX status reporting for ieee80211s\n (bsc#1051510).\n\n - mac80211_hwsim: do not omit multicast announce of first\n added radio (bsc#1051510).\n\n - mach64: fix display corruption on big endian machines\n (bsc#1113722)\n\n - mach64: fix image corruption due to reading accelerator\n registers (bsc#1113722)\n\n - mailbox: PCC: handle parse error (bsc#1051510).\n\n - make sure that __dentry_kill() always invalidates d_seq,\n unhashed or not (git-fixes).\n\n - md/raid10: fix that replacement cannot complete recovery\n after reassemble (git-fixes).\n\n - md/raid1: add error handling of read error from FailFast\n device (git-fixes).\n\n - md/raid5-cache: disable reshape completely (git-fixes).\n\n - md/raid5: fix data corruption of replacements after\n originals dropped (git-fixes).\n\n - md: fix NULL dereference of mddev->pers in\n remove_and_add_spares() (git-fixes).\n\n - memory_hotplug: cond_resched in __remove_pages\n (bnc#1114178).\n\n - mfd: menelaus: Fix possible race condition and leak\n (bsc#1051510).\n\n - mfd: omap-usb-host: Fix dts probe of children\n (bsc#1051510).\n\n - mlxsw: spectrum: Fix IP2ME CPU policer configuration\n (networking-stable-18_11_21).\n\n - mm: handle no memcg case in memcg_kmem_charge() properly\n (bnc#1113677).\n\n - mm: rework memcg kernel stack accounting (bnc#1113677).\n\n - mmc: dw_mmc-rockchip: correct property names in debug\n (bsc#1051510).\n\n - mmc: sdhci-pci-o2micro: Add quirk for O2 Micro dev\n 0x8620 rev 0x01 (bsc#1051510).\n\n - modpost: ignore livepatch unresolved relocations ().\n\n - mount: Do not allow copying MNT_UNBINDABLE|MNT_LOCKED\n mounts (bsc#1117819).\n\n - mount: Prevent MNT_DETACH from disconnecting locked\n mounts (bsc#1117820).\n\n - mount: Retest MNT_LOCKED in do_umount (bsc#1117818).\n\n - neighbour: confirm neigh entries when ARP packet is\n received (networking-stable-18_09_24).\n\n - net-gro: reset skb->pkt_type in napi_reuse_skb()\n (networking-stable-18_11_21).\n\n - net/af_iucv: drop inbound packets with invalid flags\n (bnc#1113501, LTC#172679).\n\n - net/af_iucv: fix skb handling on HiperTransport xmit\n error (bnc#1113501, LTC#172679).\n\n - net/appletalk: fix minor pointer leak to userspace in\n SIOCFINDIPDDPRT (networking-stable-18_09_24).\n\n - net/ibmnvic: Fix deadlock problem in reset ().\n\n - net/ibmvnic: Fix RTNL deadlock during device reset\n (bnc#1115431).\n\n - net/ipv6: Display all addresses in output of\n /proc/net/if_inet6 (networking-stable-18_10_16).\n\n - net/ipv6: Fix index counter for unicast addresses in\n in6_dump_addrs (networking-stable-18_11_02).\n\n - net/mlx5: Check for error in mlx5_attach_interface\n (networking-stable-18_09_18).\n\n - net/mlx5: E-Switch, Fix memory leak when creating\n switchdev mode FDB tables (networking-stable-18_09_18).\n\n - net/mlx5: E-Switch, Fix out of bound access when setting\n vport rate (networking-stable-18_10_16).\n\n - net/mlx5: Fix debugfs cleanup in the device init/remove\n flow (networking-stable-18_09_18).\n\n - net/mlx5: Fix use-after-free in self-healing flow\n (networking-stable-18_09_18).\n\n - net/mlx5: Take only bit 24-26 of wqe.pftype_wq for page\n fault type (networking-stable-18_11_02).\n\n - net/mlx5e: Fix selftest for small MTUs\n (networking-stable-18_11_21).\n\n - net/mlx5e: Set vlan masks for all offloaded TC rules\n (networking-stable-18_10_16).\n\n - net/packet: fix packet drop as of virtio gso\n (networking-stable-18_10_16).\n\n - net/sched: act_pedit: fix dump of extended layered op\n (networking-stable-18_09_11).\n\n - net/sched: act_sample: fix NULL dereference in the data\n path (networking-stable-18_09_24).\n\n - net/usb: cancel pending work when unbinding smsc75xx\n (networking-stable-18_10_16).\n\n - net: aquantia: memory corruption on jumbo frames\n (networking-stable-18_10_16).\n\n - net: bcmgenet: Poll internal PHY for GENETv5\n (networking-stable-18_11_02).\n\n - net: bcmgenet: protect stop from timeout\n (networking-stable-18_11_21).\n\n - net: bcmgenet: use MAC link status for fixed phy\n (networking-stable-18_09_11).\n\n - net: bridge: remove ipv6 zero address check in mcast\n queries (git-fixes).\n\n - net: dsa: bcm_sf2: Call setup during switch resume\n (networking-stable-18_10_16).\n\n - net: dsa: bcm_sf2: Fix unbind ordering\n (networking-stable-18_10_16).\n\n - net: ena: Fix Kconfig dependency on X86 (bsc#1111696\n bsc#1117561).\n\n - net: ena: add functions for handling Low Latency Queues\n in ena_com (bsc#1111696 bsc#1117561).\n\n - net: ena: add functions for handling Low Latency Queues\n in ena_netdev (bsc#1111696 bsc#1117561).\n\n - net: ena: change rx copybreak default to reduce kernel\n memory pressure (bsc#1111696 bsc#1117561).\n\n - net: ena: complete host info to match latest ENA spec\n (bsc#1111696 bsc#1117561).\n\n - net: ena: enable Low Latency Queues (bsc#1111696\n bsc#1117561).\n\n - net: ena: explicit casting and initialization, and\n clearer error handling (bsc#1111696 bsc#1117561).\n\n - net: ena: fix NULL dereference due to untimely napi\n initialization (bsc#1111696 bsc#1117561).\n\n - net: ena: fix auto casting to boolean (bsc#1111696\n bsc#1117561).\n\n - net: ena: fix compilation error in xtensa architecture\n (bsc#1111696 bsc#1117561).\n\n - net: ena: fix crash during failed resume from\n hibernation (bsc#1111696 bsc#1117561).\n\n - net: ena: fix indentations in ena_defs for better\n readability (bsc#1111696 bsc#1117561).\n\n - net: ena: fix rare bug when failed restart/resume is\n followed by driver removal (bsc#1111696 bsc#1117561).\n\n - net: ena: fix warning in rmmod caused by double iounmap\n (bsc#1111696 bsc#1117561).\n\n - net: ena: introduce Low Latency Queues data structures\n according to ENA spec (bsc#1111696 bsc#1117561).\n\n - net: ena: limit refill Rx threshold to 256 to avoid\n latency issues (bsc#1111696 bsc#1117561).\n\n - net: ena: minor performance improvement (bsc#1111696\n bsc#1117561).\n\n - net: ena: remove ndo_poll_controller (bsc#1111696\n bsc#1117561).\n\n - net: ena: remove redundant parameter in\n ena_com_admin_init() (bsc#1111696 bsc#1117561).\n\n - net: ena: update driver version to 2.0.1 (bsc#1111696\n bsc#1117561).\n\n - net: ena: use CSUM_CHECKED device indication to report\n skb's checksum status (bsc#1111696 bsc#1117561).\n\n - net: fec: do not dump RX FIFO register when not\n available (networking-stable-18_11_02).\n\n - net: hns: fix for unmapping problem when SMMU is on\n (networking-stable-18_10_16).\n\n - net: hp100: fix always-true check for link up state\n (networking-stable-18_09_24).\n\n - net: ibm: fix return type of ndo_start_xmit function ().\n\n - net: ipmr: fix unresolved entry dumps\n (networking-stable-18_11_02).\n\n - net: macb: do not disable MDIO bus at open/close time\n (networking-stable-18_09_11).\n\n - net: mvpp2: Extract the correct ethtype from the skb for\n tx csum offload (networking-stable-18_10_16).\n\n - net: mvpp2: fix a txq_done race condition\n (networking-stable-18_10_16).\n\n - net: phy: mdio-gpio: Fix working over slow can_sleep\n GPIOs (networking-stable-18_11_21).\n\n - net: qca_spi: Fix race condition in spi transfers\n (networking-stable-18_09_18).\n\n - net: qmi_wwan: add Wistron Neweb D19Q1 (bsc#1051510).\n\n - net: sched: Fix for duplicate class dump\n (networking-stable-18_11_02).\n\n - net: sched: Fix memory exposure from short TCA_U32_SEL\n (networking-stable-18_09_11).\n\n - net: sched: action_ife: take reference to meta module\n (networking-stable-18_09_11).\n\n - net: sched: gred: pass the right attribute to\n gred_change_table_def() (networking-stable-18_11_02).\n\n - net: smsc95xx: Fix MTU range\n (networking-stable-18_11_21).\n\n - net: socket: fix a missing-check bug\n (networking-stable-18_11_02).\n\n - net: stmmac: Fix stmmac_mdio_reset() when building\n stmmac as modules (networking-stable-18_11_02).\n\n - net: stmmac: Fixup the tail addr setting in xmit path\n (networking-stable-18_10_16).\n\n - net: systemport: Fix wake-up interrupt race during\n resume (networking-stable-18_10_16).\n\n - net: systemport: Protect stop from timeout\n (networking-stable-18_11_21).\n\n - net: udp: fix handling of CHECKSUM_COMPLETE packets\n (networking-stable-18_11_02).\n\n - netlabel: check for IPV4MASK in addrinfo_get\n (networking-stable-18_10_16).\n\n - nfp: wait for posted reconfigs when disabling the device\n (networking-stable-18_09_11).\n\n - nfs: do not wait on commit in nfs_commit_inode() if\n there were no commit requests (git-fixes).\n\n - nfsd4: permit layoutget of executable-only files\n (git-fixes).\n\n - nfsd: CLOSE SHOULD return the invalid special stateid\n for NFSv4.x (x>0) (git-fixes).\n\n - nfsd: Ensure we check stateid validity in the seqid\n operation checks (git-fixes).\n\n - nfsd: Fix another OPEN stateid race (git-fixes).\n\n - nfsd: Fix stateid races between OPEN and CLOSE\n (git-fixes).\n\n - nfsd: check for use of the closed special stateid\n (git-fixes).\n\n - nfsd: deal with revoked delegations appropriately\n (git-fixes).\n\n - nfsd: fix corrupted reply to badly ordered compound\n (git-fixes).\n\n - nfsd: fix potential use-after-free in\n nfsd4_decode_getdeviceinfo (git-fixes).\n\n - nfsd: restrict rd_maxcount to svc_max_payload in\n nfsd_encode_readdir (git-fixes).\n\n - nl80211: Fix possible Spectre-v1 for CQM RSSI thresholds\n (bsc#1051510).\n\n - nl80211: Fix possible Spectre-v1 for NL80211_TXRATE_HT\n (bsc#1051510).\n\n - nospec: Include asm/barrier.h dependency (bsc#1114279).\n\n - nvme: Free ctrl device name on init failure ().\n\n - ocfs2: fix a misuse a of brelse after failing\n ocfs2_check_dir_entry (bsc#1117817).\n\n - ocfs2: fix locking for res->tracking and\n dlm->tracking_list (bsc#1117816).\n\n - ocfs2: fix ocfs2 read block panic (bsc#1117815).\n\n - ocfs2: free up write context when direct IO failed\n (bsc#1117821).\n\n - ocfs2: subsystem.su_mutex is required while accessing\n the item->ci_parent (bsc#1117808).\n\n - openvswitch: Fix push/pop ethernet validation\n (networking-stable-18_11_02).\n\n - pNFS: Always free the session slot on error in\n nfs4_layoutget_handle_exception (git-fixes).\n\n - pNFS: Prevent the layout header refcount going to zero\n in pnfs_roc() (git-fixes).\n\n - pci: dwc: remove duplicate fix References: bsc#1115269\n Patch has been already applied by the following commit:\n 9f73db8b7c PCI: dwc: Fix enumeration end when reaching\n root subordinate (bsc#1051510)\n\n - pcmcia: Implement CLKRUN protocol disabling for Ricoh\n bridges (bsc#1051510).\n\n - percpu: make this_cpu_generic_read() atomic w.r.t.\n interrupts (bsc#1114279).\n\n - perf: fix invalid bit in diagnostic entry (git-fixes).\n\n - pinctrl: at91-pio4: fix has_config check in\n atmel_pctl_dt_subnode_to_map() (bsc#1051510).\n\n - pinctrl: meson: fix pinconf bias disable (bsc#1051510).\n\n - pinctrl: qcom: spmi-mpp: Fix drive strength setting\n (bsc#1051510).\n\n - pinctrl: qcom: spmi-mpp: Fix err handling of\n pmic_mpp_set_mux (bsc#1051510).\n\n - pinctrl: spmi-mpp: Fix pmic_mpp_config_get() to be\n compliant (bsc#1051510).\n\n - pinctrl: ssbi-gpio: Fix pm8xxx_pin_config_get() to be\n compliant (bsc#1051510).\n\n - pipe: match pipe_max_size data type with procfs\n (git-fixes).\n\n - platform/x86: acerhdf: Add BIOS entry for Gateway LT31\n v1.3307 (bsc#1051510).\n\n - platform/x86: intel_telemetry: report debugfs failure\n (bsc#1051510).\n\n - pnfs: Do not release the sequence slot until we've\n processed layoutget on open (git-fixes).\n\n - power: supply: max8998-charger: Fix platform data\n retrieval (bsc#1051510).\n\n - powerpc/64s/hash: Do not use PPC_INVALIDATE_ERAT on CPUs\n before POWER9 (bsc#1065729).\n\n - powerpc/boot: Fix opal console in boot wrapper\n (bsc#1065729).\n\n - powerpc/kvm/booke: Fix altivec related build break\n (bsc#1061840).\n\n - powerpc/kvm: Switch kvm pmd allocator to custom\n allocator (bsc#1061840).\n\n - powerpc/mm/keys: Move pte bits to correct headers\n (bsc#1078248).\n\n - powerpc/mm: Fix typo in comments (bsc#1065729).\n\n - powerpc/mm: Rename find_linux_pte_or_hugepte()\n (bsc#1061840).\n\n - powerpc/npu-dma.c: Fix crash after\n __mmu_notifier_register failure (bsc#1055120).\n\n - powerpc/perf: Update raw-event code encoding comment for\n power8 (bsc#1065729).\n\n - powerpc/powernv/ioda: Allocate indirect TCE levels on\n demand (bsc#1061840).\n\n - powerpc/powernv/ioda: Finish removing explicit max\n window size check (bsc#1061840).\n\n - powerpc/powernv/ioda: Remove explicit max window size\n check (bsc#1061840).\n\n - powerpc/powernv/npu: Add lock to prevent race in\n concurrent context init/destroy (bsc#1055120).\n\n - powerpc/powernv/npu: Do not explicitly flush nmmu tlb\n (bsc#1055120).\n\n - powerpc/powernv/npu: Fix deadlock in mmio_invalidate()\n (bsc#1055120).\n\n - powerpc/powernv/npu: Prevent overwriting of\n pnv_npu2_init_contex() callback parameters\n (bsc#1055120).\n\n - powerpc/powernv/npu: Use flush_all_mm() instead of\n flush_tlb_mm() (bsc#1055120).\n\n - powerpc/powernv/pci: Work around races in PCI bridge\n enabling (bsc#1055120).\n\n - powerpc/powernv: Add indirect levels to it_userspace\n (bsc#1061840).\n\n - powerpc/powernv: Do not select the cpufreq governors\n (bsc#1065729).\n\n - powerpc/powernv: Fix concurrency issue with\n npu->mmio_atsd_usage (bsc#1055120).\n\n - powerpc/powernv: Fix opal_event_shutdown() called with\n interrupts disabled (bsc#1065729).\n\n - powerpc/powernv: Move TCE manupulation code to its own\n file (bsc#1061840).\n\n - powerpc/powernv: Rework TCE level allocation\n (bsc#1061840).\n\n - powerpc/pseries/mobility: Extend start/stop topology\n update scope (bsc#1116950, bsc#1115709).\n\n - powerpc/pseries: Fix DTL buffer registration\n (bsc#1065729).\n\n - powerpc/pseries: Fix how we iterate over the DTL entries\n (bsc#1065729).\n\n - powerpc/xive: Move definition of ESB bits (bsc#1061840).\n\n - powerpc/xmon: Add ISA v3.0 SPRs to SPR dump\n (bsc#1061840).\n\n - pppoe: fix reception of frames with no mac header\n (networking-stable-18_09_24).\n\n - printk: Fix panic caused by passing log_buf_len to\n command line (bsc#1117168).\n\n - provide linux/set_memory.h (bsc#1113295).\n\n - ptp: fix Spectre v1 vulnerability (bsc#1051510).\n\n - pwm: lpss: Release runtime-pm reference from the\n driver's remove callback (bsc#1051510).\n\n - pxa168fb: prepare the clock (bsc#1051510).\n\n - qmi_wwan: Support dynamic config on Quectel EP06\n (bsc#1051510).\n\n - qmi_wwan: apply SET_DTR quirk to the SIMCOM shared\n device ID (bsc#1051510).\n\n - r8169: fix NAPI handling under high load\n (networking-stable-18_11_02).\n\n - race of lockd inetaddr notifiers vs nlmsvc_rqst change\n (git-fixes).\n\n - rds: fix two RCU related problems\n (networking-stable-18_09_18).\n\n - remoteproc: qcom: Fix potential device node leaks\n (bsc#1051510).\n\n - reset: hisilicon: fix potential NULL pointer dereference\n (bsc#1051510).\n\n - reset: imx7: Fix always writing bits as 0 (bsc#1051510).\n\n - resource: Include resource end in walk_*() interfaces\n (bsc#1114279).\n\n - rpm/kernel-binary.spec.in: add macros.s into\n kernel-*-devel Starting with 4.20-rc1, file\n arch/*/kernel/macros.s is needed to build out of tree\n modules. Add it to kernel-$(flavor)-devel packages if it\n exists.\n\n - rpm/kernel-binary.spec.in: allow unsupported modules for\n -extra (bsc#1111183). SLE-15 and later only.\n\n - rpm/kernel-source.spec.in: Add patches.drm for moved DRM\n patches\n\n - rpm: use syncconfig instead of silentoldconfig where\n available Since mainline commit 0085b4191f3e ('kconfig:\n remove silentoldconfig target'), 'make silentoldconfig'\n can be no longer used. Use 'make syncconfig' instead if\n available.\n\n - rtnetlink: Disallow FDB configuration for non-Ethernet\n device (networking-stable-18_11_02).\n\n - rtnetlink: fix rtnl_fdb_dump() for ndmsg header\n (networking-stable-18_10_16).\n\n - rtnl: limit IFLA_NUM_TX_QUEUES and IFLA_NUM_RX_QUEUES to\n 4096 (networking-stable-18_10_16).\n\n - s390/cpum_sf: Add data entry sizes to sampling trailer\n entry (git-fixes).\n\n - s390/kvm: fix deadlock when killed by oom (bnc#1113501,\n LTC#172235).\n\n - s390/mm: Check for valid vma before zapping in\n gmap_discard (git-fixes).\n\n - s390/mm: correct allocate_pgste proc_handler callback\n (git-fixes).\n\n - s390/qeth: fix HiperSockets sniffer (bnc#1113501,\n LTC#172953).\n\n - s390/qeth: handle failure on workqueue creation\n (git-fixes).\n\n - s390/qeth: report 25Gbit link speed (bnc#1113501,\n LTC#172959).\n\n - s390/sclp_tty: enable line mode tty even if there is an\n ascii console (git-fixes).\n\n - s390/sthyi: add cache to store hypervisor info\n (LTC#160415, bsc#1068273).\n\n - s390/sthyi: add s390_sthyi system call (LTC#160415,\n bsc#1068273).\n\n - s390/sthyi: reorganize sthyi implementation (LTC#160415,\n bsc#1068273).\n\n - s390: qeth: Fix potential array overrun in cmd/rc lookup\n (bnc#1113501, LTC#172682).\n\n - s390: qeth_core_mpc: Use ARRAY_SIZE instead of\n reimplementing its function (bnc#1113501, LTC#172682).\n\n - s390: revert ELF_ET_DYN_BASE base changes (git-fixes).\n\n - scripts/git_sort/git_sort.py: add mkp/scsi.git\n 4.21/scsi-queue\n\n - scsi: core: Avoid that SCSI device removal through sysfs\n triggers a deadlock (bsc#1114578).\n\n - scsi: libsas: remove irq save in sas_ata_qc_issue()\n (bsc#1114580).\n\n - scsi: lpfc: Correct LCB RJT handling (bsc#1114015).\n\n - scsi: lpfc: Correct errors accessing fw log\n (bsc#1114015).\n\n - scsi: lpfc: Correct invalid EQ doorbell write on\n if_type=6 (bsc#1114015).\n\n - scsi: lpfc: Correct irq handling via locks when taking