Vulnerabilities > CVE-2018-5390 - Resource Exhaustion vulnerability in multiple products
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
NONE Integrity impact
NONE Availability impact
HIGH Summary
Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service.
Vulnerable Configurations
Common Weakness Enumeration (CWE)
Common Attack Pattern Enumeration and Classification (CAPEC)
- XML Ping of the Death An attacker initiates a resource depletion attack where a large number of small XML messages are delivered at a sufficiently rapid rate to cause a denial of service or crash of the target. Transactions such as repetitive SOAP transactions can deplete resources faster than a simple flooding attack because of the additional resources used by the SOAP protocol and the resources necessary to process SOAP messages. The transactions used are immaterial as long as they cause resource utilization on the target. In other words, this is a normal flooding attack augmented by using messages that will require extra processing on the target.
- XML Entity Expansion An attacker submits an XML document to a target application where the XML document uses nested entity expansion to produce an excessively large output XML. XML allows the definition of macro-like structures that can be used to simplify the creation of complex structures. However, this capability can be abused to create excessive demands on a processor's CPU and memory. A small number of nested expansions can result in an exponential growth in demands on memory.
- Inducing Account Lockout An attacker leverages the security functionality of the system aimed at thwarting potential attacks to launch a denial of service attack against a legitimate system user. Many systems, for instance, implement a password throttling mechanism that locks an account after a certain number of incorrect log in attempts. An attacker can leverage this throttling mechanism to lock a legitimate user out of their own account. The weakness that is being leveraged by an attacker is the very security feature that has been put in place to counteract attacks.
- Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Service (XDoS)) XML Denial of Service (XDoS) can be applied to any technology that utilizes XML data. This is, of course, most distributed systems technology including Java, .Net, databases, and so on. XDoS is most closely associated with web services, SOAP, and Rest, because remote service requesters can post malicious XML payloads to the service provider designed to exhaust the service provider's memory, CPU, and/or disk space. The main weakness in XDoS is that the service provider generally must inspect, parse, and validate the XML messages to determine routing, workflow, security considerations, and so on. It is exactly these inspection, parsing, and validation routines that XDoS targets. There are three primary attack vectors that XDoS can navigate Target CPU through recursion: attacker creates a recursive payload and sends to service provider Target memory through jumbo payloads: service provider uses DOM to parse XML. DOM creates in memory representation of XML document, but when document is very large (for example, north of 1 Gb) service provider host may exhaust memory trying to build memory objects. XML Ping of death: attack service provider with numerous small files that clog the system. All of the above attacks exploit the loosely coupled nature of web services, where the service provider has little to no control over the service requester and any messages the service requester sends.
Nessus
NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-2821-1.NASL description This update for the Linux Kernel 3.12.74-60_64_110 fixes several issues. The following security issues were fixed : CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108). CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 130423 published 2019-10-31 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130423 title SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2821-1) (SACK Panic) (SACK Slowness) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SUSE update advisory SUSE-SU-2019:2821-1. # The text itself is copyright (C) SUSE. # include("compat.inc"); if (description) { script_id(130423); script_version("1.4"); script_cvs_date("Date: 2019/12/18"); script_cve_id("CVE-2018-5390", "CVE-2019-10220", "CVE-2019-11477", "CVE-2019-11478", "CVE-2019-11487", "CVE-2019-14835", "CVE-2019-17133", "CVE-2019-3846"); script_name(english:"SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2821-1) (SACK Panic) (SACK Slowness)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote SUSE host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "This update for the Linux Kernel 3.12.74-60_64_110 fixes several issues. The following security issues were fixed : CVE-2019-10220: Fixed a relative path escape in the Samba client module (bsc#1144903, bsc#1153108). CVE-2019-17133: Fixed a buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c caused by long SSID IEs (bsc#1153158). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1102682" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1103203" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1133191" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1136446" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137597" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1140747" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1144903" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1151021" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153108" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153158" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1153161" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=904970" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=907150" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=920615" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=920633" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=930408" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5390/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-10220/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11477/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11478/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11487/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-14835/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-17133/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-3846/" ); # https://www.suse.com/support/update/announcement/2019/suse-su-20192821-1/ script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?f782fb1b" ); script_set_attribute( attribute:"solution", value: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-2821=1 SUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-2821=1" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-10220"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_110-default"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_110-xen"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/08/06"); script_set_attribute(attribute:"patch_publication_date", value:"2019/10/30"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/10/31"); script_set_attribute(attribute:"in_the_news", value:"true"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE"); os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE"); os_ver = os_ver[1]; if (! preg(pattern:"^(SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES12", "SUSE " + os_ver); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu); if (cpu >!< "x86_64") audit(AUDIT_ARCH_NOT, "x86_64", cpu); sp = get_kb_item("Host/SuSE/patchlevel"); if (isnull(sp)) sp = "0"; if (os_ver == "SLES12" && (! preg(pattern:"^(1)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP1", os_ver + " SP" + sp); flag = 0; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kgraft-patch-3_12_74-60_64_110-default-6-2.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kgraft-patch-3_12_74-60_64_110-xen-6-2.1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel"); }
NASL family Scientific Linux Local Security Checks NASL id SL_20180814_KERNEL_ON_SL7_X.NASL description Security Fix(es) : - Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) - An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-03-18 modified 2018-08-16 plugin id 111778 published 2018-08-16 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111778 title Scientific Linux Security Update : kernel on SL7.x x86_64 (20180814) (Foreshadow) code # # (C) Tenable Network Security, Inc. # # The descriptive text is (C) Scientific Linux. # include("compat.inc"); if (description) { script_id(111778); script_version("1.4"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/24"); script_cve_id("CVE-2017-13215", "CVE-2018-10675", "CVE-2018-3620", "CVE-2018-3646", "CVE-2018-3693", "CVE-2018-5390", "CVE-2018-7566"); script_name(english:"Scientific Linux Security Update : kernel on SL7.x x86_64 (20180814) (Foreshadow)"); script_summary(english:"Checks rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value: "The remote Scientific Linux host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "Security Fix(es) : - Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) - An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side- channel attacks. (CVE-2018-3693) - A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) - kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215) - kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) - kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)" ); # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1808&L=scientific-linux-errata&F=&S=&P=847 script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?e6645d58" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-abi-whitelists"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-debug"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-debug-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-debug-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-debuginfo-common-x86_64"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-headers"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-tools"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-tools-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:kernel-tools-libs-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:perf"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:perf-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:python-perf"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:fermilab:scientific_linux:python-perf-debuginfo"); script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/01/12"); script_set_attribute(attribute:"patch_publication_date", value:"2018/08/14"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/16"); script_set_attribute(attribute:"in_the_news", value:"true"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Scientific Linux Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux"); os_ver = pregmatch(pattern: "Scientific Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Scientific Linux"); os_ver = os_ver[1]; if (! preg(pattern:"^7([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Scientific Linux 7.x", "Scientific Linux " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu); flag = 0; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", reference:"kernel-abi-whitelists-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-debug-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-debug-debuginfo-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-debug-devel-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-debuginfo-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-debuginfo-common-x86_64-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-devel-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", reference:"kernel-doc-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-headers-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-tools-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-tools-debuginfo-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-tools-libs-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"kernel-tools-libs-devel-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"perf-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"perf-debuginfo-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"python-perf-3.10.0-862.11.6.el7")) flag++; if (rpm_check(release:"SL7", cpu:"x86_64", reference:"python-perf-debuginfo-3.10.0-862.11.6.el7")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel / kernel-abi-whitelists / kernel-debug / etc"); }
NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-1870-1.NASL description The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed : CVE-2018-5390 aka last seen 2020-06-01 modified 2020-06-02 plugin id 126811 published 2019-07-19 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/126811 title SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1870-1) (SACK Slowness) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from SUSE update advisory SUSE-SU-2019:1870-1. # The text itself is copyright (C) SUSE. # include("compat.inc"); if (description) { script_id(126811); script_version("1.3"); script_cvs_date("Date: 2020/01/08"); script_cve_id("CVE-2018-20836", "CVE-2018-5390", "CVE-2018-7191", "CVE-2019-11478", "CVE-2019-11487", "CVE-2019-12456", "CVE-2019-12614", "CVE-2019-12818"); script_name(english:"SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1870-1) (SACK Slowness)"); script_summary(english:"Checks rpm output for the updated packages."); script_set_attribute( attribute:"synopsis", value:"The remote SUSE host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "The SUSE Linux Enterprise 12 SP1 kernel was updated to receive various security and bugfixes. The following security bugs were fixed : CVE-2018-5390 aka 'SegmentSmack': A remote attacker even with relatively low bandwidth could have caused lots of CPU usage by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340) CVE-2018-7191: In the tun subsystem in the Linux kernel, dev_get_valid_name was not called before register_netdevice. This allowed local users to cause a denial of service (NULL pointer dereference and panic) via an ioctl(TUNSETIFF) call with a dev name containing a / character. (bnc#1135603) CVE-2018-20836: A race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, could have lead to a use-after-free. (bnc#1134395) CVE-2019-12614: An unchecked kstrdup might have allowed an attacker to cause denial of service (a NULL pointer dereference and system crash). (bnc#1137194) CVE-2019-12818: The nfc_llcp_build_tlv function in net/nfc/llcp_commands.c may have returned NULL. If the caller did not check for this, it would trigger a NULL pointer dereference. This would cause denial of service. (bnc#1138293) CVE-2019-12456: An issue in the MPT3COMMAND case in _ctl_ioctl_main() allowed local users to cause a denial of service or possibly have unspecified other impact by changing the value of ioc_number between two kernel reads of that value, aka a 'double fetch' vulnerability. (bsc#1136922) CVE-2019-11487: An attacker could have triggered use-after-free via page reference count overflow on slow filesystems with at least of 140 GiB of RAM available. (bnc#1133190) The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1102340" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1112824" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1130159" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1133190" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1134395" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1135603" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1136922" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1137194" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1138293" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.suse.com/show_bug.cgi?id=1139751" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-20836/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-5390/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2018-7191/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-11487/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-12456/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-12614/" ); script_set_attribute( attribute:"see_also", value:"https://www.suse.com/security/cve/CVE-2019-12818/" ); # https://www.suse.com/support/update/announcement/2019/suse-su-20191870-1/ script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?ce50e84b" ); script_set_attribute( attribute:"solution", value: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or 'zypper patch'. Alternatively you can run the command listed for your product : SUSE Linux Enterprise Server for SAP 12-SP1:zypper in -t patch SUSE-SLE-SAP-12-SP1-2019-1870=1 SUSE Linux Enterprise Server 12-SP1-LTSS:zypper in -t patch SUSE-SLE-SERVER-12-SP1-2019-1870=1 SUSE Linux Enterprise Module for Public Cloud 12:zypper in -t patch SUSE-SLE-Module-Public-Cloud-12-2019-1870=1" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-base-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-default-man"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-syms"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-xen"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-xen-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-xen-base-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-xen-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-xen-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kernel-xen-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_118-default"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:suse_linux:kgraft-patch-3_12_74-60_64_118-xen"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:suse_linux:12"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/08/06"); script_set_attribute(attribute:"patch_publication_date", value:"2019/07/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/07/19"); script_set_attribute(attribute:"in_the_news", value:"true"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/SuSE/release", "Host/SuSE/rpm-list"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release !~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "SUSE"); os_ver = pregmatch(pattern: "^(SLE(S|D)\d+)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "SUSE"); os_ver = os_ver[1]; if (! preg(pattern:"^(SLES12)$", string:os_ver)) audit(AUDIT_OS_NOT, "SUSE SLES12", "SUSE " + os_ver); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if (cpu !~ "^i[3-6]86$" && "x86_64" >!< cpu && "s390x" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "SUSE " + os_ver, cpu); sp = get_kb_item("Host/SuSE/patchlevel"); if (isnull(sp)) sp = "0"; if (os_ver == "SLES12" && (! preg(pattern:"^(1)$", string:sp))) audit(AUDIT_OS_NOT, "SLES12 SP1", os_ver + " SP" + sp); flag = 0; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kernel-xen-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kernel-xen-base-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kernel-xen-base-debuginfo-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kernel-xen-debuginfo-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kernel-xen-debugsource-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kernel-xen-devel-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kgraft-patch-3_12_74-60_64_118-default-1-2.3.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", cpu:"x86_64", reference:"kgraft-patch-3_12_74-60_64_118-xen-1-2.3.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", cpu:"s390x", reference:"kernel-default-man-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"kernel-default-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"kernel-default-base-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"kernel-default-base-debuginfo-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"kernel-default-debuginfo-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"kernel-default-debugsource-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"kernel-default-devel-3.12.74-60.64.118.1")) flag++; if (rpm_check(release:"SLES12", sp:"1", reference:"kernel-syms-3.12.74-60.64.118.1")) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel"); }
NASL family SuSE Local Security Checks NASL id OPENSUSE-2018-826.NASL description The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes. The following security bugs were fixed : - CVE-2018-5390 aka last seen 2020-06-05 modified 2018-08-08 plugin id 111590 published 2018-08-08 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111590 title openSUSE Security Update : the Linux Kernel (openSUSE-2018-826) code #%NASL_MIN_LEVEL 80502 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from openSUSE Security Update openSUSE-2018-826. # # The text description of this plugin is (C) SUSE LLC. # include("compat.inc"); if (description) { script_id(111590); script_version("1.6"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/06/04"); script_cve_id("CVE-2017-18344", "CVE-2018-5390"); script_name(english:"openSUSE Security Update : the Linux Kernel (openSUSE-2018-826)"); script_summary(english:"Check for the openSUSE-2018-826 patch"); script_set_attribute( attribute:"synopsis", value:"The remote openSUSE host is missing a security update." ); script_set_attribute( attribute:"description", value: "The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes. The following security bugs were fixed : - CVE-2018-5390 aka 'SegmentSmack': A remote attacker even with relatively low bandwidth could have caused lots of CPU usage by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340) - CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel doesn't properly validate the sigevent->sigev_notify field, which leads to out-of-bounds access in the show_timer function (called when /proc/$PID/timers is read). This allowed userspace applications to read arbitrary kernel memory (on a kernel built with CONFIG_POSIX_TIMERS and CONFIG_CHECKPOINT_RESTORE) (bnc#1102851). The following non-security bugs were fixed : - acpi, APEI, EINJ: Subtract any matching Register Region from Trigger resources (bsc#1051510). - acpi/nfit: fix cmd_rc for acpi_nfit_ctl to always return a value (bsc#1051510). - acpi, nfit: Fix scrub idle detection (bsc#1094119). - acpi / processor: Finish making acpi_processor_ppc_has_changed() void (bsc#1051510). - ahci: Disable LPM on Lenovo 50 series laptops with a too old BIOS (bsc#1051510). - alsa: emu10k1: add error handling for snd_ctl_add (bsc#1051510). - alsa: emu10k1: Rate-limit error messages about page errors (bsc#1051510). - alsa: fm801: add error handling for snd_ctl_add (bsc#1051510). - alsa: hda: add mute led support for HP ProBook 455 G5 (bsc#1051510). - alsa: hda - Handle pm failure during hotplug (bsc#1051510). - alsa: hda/realtek - Add Panasonic CF-SZ6 headset jack quirk (bsc#1051510). - alsa: hda/realtek - two more lenovo models need fixup of MIC_LOCATION (bsc#1051510). - alsa: hda/realtek - Yet another Clevo P950 quirk entry (bsc#1101143). - alsa: rawmidi: Change resized buffers atomically (bsc#1051510). - alsa: usb-audio: Apply rate limit to warning messages in URB complete callback (bsc#1051510). - alx: take rtnl before calling __alx_open from resume (bsc#1051510). - arm64: Correct type for PUD macros (bsc#1103723). - arm64: Disable unhandled signal log messages by default (bsc#1103724). - arm64: kpti: Use early_param for kpti= command-line option (bsc#1103220). - arm64: KVM: fix VTTBR_BADDR_MASK BUG_ON off-by-one (bsc#1103725). - arm64: mm: Fix set_memory_valid() declaration (bsc#1103726). - arm64: perf: correct PMUVer probing (bsc#1103727). - arm64: ptrace: Avoid setting compat FPR to garbage if get_user fails (bsc#1103728). - arm64: spinlock: Fix theoretical trylock() A-B-A with LSE atomics (bsc#1103729). - arm64: vdso: fix clock_getres for 4GiB-aligned res (bsc#1103730). - arm: module: fix modsign build error (bsc#1093666). - ASoC: dpcm: fix BE dai not hw_free and shutdown (bsc#1051510). - ASoC: mediatek: preallocate pages use platform device (bsc#1051510). - ASoC: topology: Add missing clock gating parameter when parsing hw_configs (bsc#1051510). - ASoC: topology: Fix bclk and fsync inversion in set_link_hw_format() (bsc#1051510). - ath9k_htc: Add a sanity check in ath9k_htc_ampdu_action() (bsc#1051510). - ath: Add regulatory mapping for APL13_WORLD (bsc#1051510). - ath: Add regulatory mapping for APL2_FCCA (bsc#1051510). - ath: Add regulatory mapping for Bahamas (bsc#1051510). - ath: Add regulatory mapping for Bermuda (bsc#1051510). - ath: Add regulatory mapping for ETSI8_WORLD (bsc#1051510). - ath: Add regulatory mapping for FCC3_ETSIC (bsc#1051510). - ath: Add regulatory mapping for Serbia (bsc#1051510). - ath: Add regulatory mapping for Tanzania (bsc#1051510). - ath: Add regulatory mapping for Uganda (bsc#1051510). - atl1c: reserve min skb headroom (bsc#1051510). - audit: ensure that 'audit=1' actually enables audit for PID 1 (bsc#1051510). - audit: Fix wrong task in comparison of session ID (bsc#1051510). - audit: return on memory error to avoid NULL pointer dereference (bsc#1051510). - b44: Initialize 64-bit stats seqcount (bsc#1051510). - backlight: as3711_bl: Fix Device Tree node leaks (bsc#1051510). - backlight: lm3630a: Bump REG_MAX value to 0x50 instead of 0x1F (bsc#1051510). - backlight: pwm_bl: Do not use GPIOF_* with gpiod_get_direction (bsc#1051510). - batman-adv: Accept only filled wifi station info (bsc#1051510). - batman-adv: Always initialize fragment header priority (bsc#1051510). - batman-adv: Avoid race in TT TVLV allocator helper (bsc#1051510). - batman-adv: Avoid storing non-TT-sync flags on singular entries too (bsc#1051510). - batman-adv: Fix bat_ogm_iv best gw refcnt after netlink dump (bsc#1051510). - batman-adv: Fix bat_v best gw refcnt after netlink dump (bsc#1051510). - batman-adv: Fix check of retrieved orig_gw in batadv_v_gw_is_eligible (bsc#1051510). - batman-adv: Fix debugfs path for renamed hardif (bsc#1051510). - batman-adv: Fix debugfs path for renamed softif (bsc#1051510). - batman-adv: fix header size check in batadv_dbg_arp() (bsc#1051510). - batman-adv: Fix internal interface indices types (bsc#1051510). - batman-adv: Fix lock for ogm cnt access in batadv_iv_ogm_calc_tq (bsc#1051510). - batman-adv: Fix multicast packet loss with a single WANT_ALL_IPV4/6 flag (bsc#1051510). - batman-adv: fix multicast-via-unicast transmission with AP isolation (bsc#1051510). - batman-adv: Fix netlink dumping of BLA backbones (bsc#1051510). - batman-adv: Fix netlink dumping of BLA claims (bsc#1051510). - batman-adv: fix packet checksum in receive path (bsc#1051510). - batman-adv: fix packet loss for broadcasted DHCP packets to a server (bsc#1051510). - batman-adv: Fix skbuff rcsum on packet reroute (bsc#1051510). - batman-adv: fix TT sync flag inconsistencies (bsc#1051510). - batman-adv: Fix TT sync flags for intermediate TT responses (bsc#1051510). - batman-adv: Ignore invalid batadv_iv_gw during netlink send (bsc#1051510). - batman-adv: Ignore invalid batadv_v_gw during netlink send (bsc#1051510). - batman-adv: invalidate checksum on fragment reassembly (bsc#1051510). - batman-adv: update data pointers after skb_cow() (bsc#1051510). - batman-adv: Use default throughput value on cfg80211 error (bsc#1051510). - blk-mq: count allocated but not started requests in iostats inflight (bsc#1077989). - blk-mq: fix sysfs inflight counter (bsc#1077989). - block: always set partition number to '0' in blk_partition_remap() (bsc#1054245). - block: always set partition number to '0' in blk_partition_remap() (bsc#1077989). - block: bio_check_eod() needs to consider partitions (bsc#1077989). - block: fail op_is_write() requests to read-only partitions (bsc#1077989). - block: pass 'run_queue' to blk_mq_request_bypass_insert (bsc#1077989). - block: set request_list for request (bsc#1077989). - bluetooth: avoid recursive locking in hci_send_to_channel() (bsc#1051510). - bluetooth: btusb: Add a new Realtek 8723DE ID 2ff8:b011 (bsc#1051510). - bluetooth: btusb: add ID for LiteOn 04ca:301a (bsc#1051510). - bluetooth: hci_ll: Add support for the external clock (bsc#1051510). - bluetooth: hci_ll: Fix download_firmware() return when __hci_cmd_sync fails (bsc#1051510). - bluetooth: hci_nokia: select BT_HCIUART_H4 (bsc#1051510). - bluetooth: hci_qca: Fix 'Sleep inside atomic section' warning (bsc#1051510). - bluetooth: hci_uart: fix kconfig dependency (bsc#1051510). - bnxt_en: Always set output parameters in bnxt_get_max_rings() (bsc#1050242). - bnxt_en: Do not modify max IRQ count after rdma driver requests/frees IRQs (bsc#1050242). - bnxt_en: Fix for system hang if request_irq fails (bsc#1050242 ). - bnxt_en: Fix inconsistent BNXT_FLAG_AGG_RINGS logic (bsc#1050242 ). - bnxt_en: Fix the vlan_tci exact match check (bsc#1050242 ). - bonding: re-evaluate force_primary when the primary slave name changes (networking-stable-18_06_20). - brcmfmac: Add support for bcm43364 wireless chipset (bsc#1051510). - btrfs: Do not remove block group still has pinned down bytes (bsc#1086457). - bus: arm-cci: Fix use of smp_processor_id() in preemptible context (bsc#1051510). - bus: arm-ccn: Check memory allocation failure (bsc#1051510). - bus: arm-ccn: fix module unloading Error: Removing state 147 which has instances left (bsc#1051510). - bus: arm-ccn: Fix use of smp_processor_id() in preemptible context (bsc#1051510). - can: bcm: check for null sk before deferencing it via the call to sock_net (bsc#1051510). - can: m_can.c: fix setup of CCCR register: clear CCCR NISO bit before checking can.ctrlmode (bsc#1051510). - can: mpc5xxx_can: check of_iomap return before use (bsc#1051510). - can: peak_canfd: fix firmware < v3.3.0: limit allocation to 32-bit DMA addr only (bsc#1051510). - can: xilinx_can: fix device dropping off bus on RX overrun (bsc#1051510). - can: xilinx_can: fix incorrect clear of non-processed interrupts (bsc#1051510). - can: xilinx_can: fix power management handling (bsc#1051510). - can: xilinx_can: fix recovery from error states not being propagated (bsc#1051510). - can: xilinx_can: fix RX loop if RXNEMP is asserted without RXOK (bsc#1051510). - can: xilinx_can: fix RX overflow interrupt not being enabled (bsc#1051510). - can: xilinx_can: keep only 1-2 frames in TX FIFO to fix TX accounting (bsc#1051510). - cdc_ncm: avoid padding beyond end of skb (networking-stable-18_06_20). - cfg80211: initialize sinfo in cfg80211_get_station (bsc#1051510). - checkpatch: add 6 missing types to --list-types (bsc#1051510). - cifs: do not allow creating sockets except with SMB1 posix exensions (bsc#1102097). - cifs: Fix infinite loop when using hard mount option (bsc#1091171). - clk: at91: fix clk-generated parenting (bsc#1051510). - clk: at91: PLL recalc_rate() now using cached MUL and DIV values (bsc#1051510). - clk: axi-clkgen: Correctly handle nocount bit in recalc_rate() (bsc#1051510). - clk: bcm2835: De-assert/assert PLL reset signal when appropriate (bsc#1051510). - clk: Do not show the incorrect clock phase (bsc#1051510). - clk: Do not write error code into divider register (bsc#1051510). - clk: fix false-positive Wmaybe-uninitialized warning (bsc#1051510). - clk: fix mux clock documentation (bsc#1051510). - clk: Fix __set_clk_rates error print-string (bsc#1051510). - clk: fix set_rate_range when current rate is out of range (bsc#1051510). - clk: hi3660: fix incorrect uart3 clock freqency (bsc#1051510). - clk: hi6220: change watchdog clock source (bsc#1051510). - clk: hi6220: mark clock cs_atb_syspll as critical (bsc#1051510). - clk: hisilicon: fix potential NULL dereference in hisi_clk_alloc() (bsc#1051510). - clk: hisilicon: mark wdt_mux_p[] as const (bsc#1051510). - clk: honor CLK_MUX_ROUND_CLOSEST in generic clk mux (bsc#1051510). - clk: imx6: refine hdmi_isfr's parent to make HDMI work on i.MX6 SoCs w/o VPU (bsc#1051510). - clk: imx7d: fix mipi dphy div parent (bsc#1051510). - clk: mediatek: add the option for determining PLL source clock (bsc#1051510). - clk: mediatek: mark mtk_infrasys_init_early __init (bsc#1051510). - clk: meson: gxbb: fix clk_mclk_i958 divider flags (bsc#1051510). - clk: meson: gxbb: fix meson cts_amclk divider flags (bsc#1051510). - clk: meson: gxbb: fix wrong clock for SARADC/SANA (bsc#1051510). - clk: meson: meson8b: fix protection against undefined clks (bsc#1051510). - clk: meson: mpll: fix mpll0 fractional part ignored (bsc#1051510). - clk: meson: mpll: use 64-bit maths in params_from_rate (bsc#1051510). - clk: meson: remove unnecessary rounding in the pll clock (bsc#1051510). - clk: mvebu: use correct bit for 98DX3236 NAND (bsc#1051510). - clk: qcom: Base rcg parent rate off plan frequency (bsc#1051510). - clk: qcom: clk-smd-rpm: Fix the reported rate of branches (bsc#1051510). - clk: qcom: common: fix legacy board-clock registration (bsc#1051510). - clk: qcom: msm8916: Fix bimc gpu clock ops (bsc#1051510). - clk: qcom: msm8916: fix mnd_width for codec_digcodec (bsc#1051510). - clk: renesas: div6: Document fields used for parent selection (bsc#1051510). - clk: renesas: r8a7745: Remove nonexisting scu-src[0789] clocks (bsc#1051510). - clk: renesas: r8a7745: Remove PLL configs for MD19=0 (bsc#1051510). - clk: renesas: r8a7795: Correct pwm, gpio, and i2c parent clocks on ES2.0 (bsc#1051510). - clk: renesas: rcar-gen2: Fix PLL0 on R-Car V2H and E2 (bsc#1051510). - clk: rockchip: Fix wrong parent for SDMMC phase clock for rk3228 (bsc#1051510). - clk: rockchip: Prevent calculating mmc phase if clock rate is zero (bsc#1051510). - clk: samsung: exynos3250: Fix PLL rates (bsc#1051510). - clk: samsung: exynos5250: Add missing clocks for FIMC LITE SYSMMU devices (bsc#1051510). - clk: samsung: exynos5250: Fix PLL rates (bsc#1051510). - clk: samsung: exynos5260: Fix PLL rates (bsc#1051510). - clk: samsung: exynos5433: Fix PLL rates (bsc#1051510). - clk: samsung: exynos7: Fix PLL rates (bsc#1051510). - clk: samsung: Fix m2m scaler clock on Exynos542x (bsc#1051510). - clk: samsung: s3c2410: Fix PLL rates (bsc#1051510). - clk: scpi: error when clock fails to register (bsc#1051510). - clk: scpi: fix return type of __scpi_dvfs_round_rate (bsc#1051510). - clk: si5351: fix PLL reset (bsc#1051510). - clk: si5351: Rename internal plls to avoid name collisions (bsc#1051510). - clk: socfpga: Fix the smplsel on Arria10 and Stratix10 (bsc#1051510). - clk: sunxi: fix build warning (bsc#1051510). - clk: sunxi: fix uninitialized access (bsc#1051510). - clk: sunxi-ng: a31: Fix CLK_OUT_* clock ops (bsc#1051510). - clk: sunxi-ng: add CLK_SET_RATE_PARENT flag to H3 GPU clock (bsc#1051510). - clk: sunxi-ng: add CLK_SET_RATE_UNGATE to all H3 PLLs (bsc#1051510). - clk: sunxi-ng: allow set parent clock (PLL_CPUX) for CPUX clock on H3 (bsc#1051510). - clk: sunxi-ng: Fix fractional mode for N-M clocks (bsc#1051510). - clk: sunxi-ng: h3: gate then ungate PLL CPU clk after rate change (bsc#1051510). - clk: sunxi-ng: Make fractional helper less chatty (bsc#1051510). - clk: sunxi-ng: multiplier: Fix fractional mode (bsc#1051510). - clk: sunxi-ng: nm: Check if requested rate is supported by fractional clock (bsc#1051510). - clk: sunxi-ng: sun5i: Fix bit offset of audio PLL post-divider (bsc#1051510). - clk: sunxi-ng: sun6i: Export video PLLs (bsc#1051510). - clk: sunxi-ng: sun6i: Rename HDMI DDC clock to avoid name collision (bsc#1051510). - clk: sunxi-ng: Wait for lock when using fractional mode (bsc#1051510). - clk: tegra: Fix cclk_lp divisor register (bsc#1051510). - clk: tegra: Fix pll_u rate configuration (bsc#1051510). - clk: tegra: Use readl_relaxed_poll_timeout_atomic() in tegra210_clock_init() (bsc#1051510). - clk: ti: dra7-atl-clock: fix child-node lookups (bsc#1051510). - clk: uniphier: fix DAPLL2 clock rate of Pro5 (bsc#1051510). - clk: x86: Do not gate clocks enabled by the firmware (bsc#1051510). - clockevents/drivers/cs5535: Improve resilience to spurious interrupts (bsc#1051510). - clocksource/drivers/stm32: Fix kernel panic with multiple timers (bsc#1051510). - cnic: Fix an error handling path in 'cnic_alloc_bnx2x_resc()' (bsc#1086324). - cpufreq: cppc_cpufreq: Fix cppc_cpufreq_init() failure path (bsc#1100884). - cpufreq: CPPC: Initialize shared perf capabilities of CPUs (bsc#1100884). - cpufreq: docs: Add missing cpuinfo_cur_freq description (bsc#1051510). - cpufreq: docs: Drop intel-pstate.txt from index.txt (bsc#1051510). - cpufreq: Fix new policy initialization during limits updates via sysfs (bsc#1100884). - cpufreq: governors: Fix long idle detection logic in load calculation (bsc#1100884). - cpufreq: intel_pstate: Limit the scope of HWP dynamic boost platforms (bsc#1066110). - cpufreq: powernv: Fix hardlockup due to synchronous smp_call in timer interrupt (bsc#1100884). - cpuidle: powernv: Fix promotion from snooze if next state disabled (bsc#1100884). - crash_dump: is_kdump_kernel can be boolean (bsc#1103230). - crypto: caam/qi - explicitly set dma_ops (bsc#1051510). - crypto: ccp - remove unused variable qim (bsc#1051510). - crypto: change transient busy return code to -ENOSPC (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Add authenc versions of ctr and sha (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Check error code with IS_ERR macro (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - check for sg null (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - do not leak pointers to authenc keys (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Fix an error code in chcr_hash_dma_map() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Fix Indentation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Fix indentation warning (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Fix iv passed in fallback path for rfc3686 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Fix IV updated in XTS operation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Fix src buffer dma length (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Make function aead_ccm_validate_input static (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Move DMA un/mapping to chcr from lld cxgb4 driver (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Remove allocation of sg list to implement 2K limit of dsgl header (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Remove dst sg size zero check (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Remove unused parameter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Update IV before sending request to HW (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Use kernel round function to align lengths (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: chelsio - Use x8_ble gf multiplication to calculate IV (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: crypto4xx - fix crypto4xx_build_pdr, crypto4xx_build_sdr leak (bsc#1051510). - crypto: crypto4xx - remove bad list_del (bsc#1051510). - crypto: gf128mul - The x8_ble multiplication functions (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - crypto: sha512-mb - add some missing unlock on error (bsc#1051510). - cxgb4: Add FORCE_PAUSE bit to 32 bit port caps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Add HMA support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Add new T5 device id (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: add new T5 device id's (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Add new T6 device ids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Adds CPL support for Shared Receive Queues (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Add support for ethtool i2c dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Add support to initialise/read SRQ entries (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Add support to query HW SRQ parameters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Add TP Congestion map entry for single-port (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: avoid schedule while atomic (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: change the port capability bits definition (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Check alignment constraint for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Check for kvzalloc allocation failure (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: clean up init_one (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: collect SGE PF/VF queue map (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: copy adap index to PF0-3 adapter instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: copy mbox log size to PF0-3 adap instances (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: copy the length of cpl_tx_pkt_core to fw_wr (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: copy vlan_id in ndo_get_vf_config (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4/cxgb4vf: add support for ndo_set_vf_vlan (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4/cxgb4vf: check fw caps to set link mode mask (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4/cxgb4vf: link management changes for new SFP (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4/cxgb4vf: Notify link changes to OS-dependent code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: depend on firmware event for link status (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: do L1 config when module is inserted (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: do not display 50Gbps as unsupported speed (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: do not fail vf instatiation in slave mode (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: do not set needs_free_netdev for mgmt dev's (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: enable inner header checksum calculation (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: enable ZLIB_DEFLATE when building cxgb4 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Fix error handling path in 'init_one()' (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Fix queue free path of ULD drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: fix the wrong conversion of Mbps to Kbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Fix {vxlan/geneve}_port initialization (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: free up resources of pf 0-3 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: increase max tx rate limit to 100 Gbps (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: IPv6 filter takes 2 tids (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: notify fatal error to uld drivers (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: remove dead code when allocating filter (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: restructure VF mgmt code (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: rework on-chip memory read (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Setup FW queues before registering netdev (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Support firmware rdma write completion work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: Support firmware rdma write with immediate work request (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: support new ISSI flash parts (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: update dump collection logic to use compression (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: update latest firmware version supported (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: update latest firmware version supported (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: update LE-TCAM collection for T6 (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: use CLIP with LIP6 on T6 for TCAM filters (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: use zlib deflate to compress firmware dump (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4vf: display pause settings (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4vf: Forcefully link up virtual interfaces (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgb4: zero the HMA memory (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - cxgbit: call neigh_event_send() to update MAC address (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - dccp: do not free ccid2_hc_tx_sock struct in dccp_disconnect() (networking-stable-18_06_08). - device property: Allow iterating over available child fwnodes (bsc#1098633). - device property: Introduce fwnode_call_bool_op() for ops that return bool (bsc#1098633). - device property: Introduce fwnode_device_is_available() (bsc#1098633). - device property: Introduce fwnode_get_mac_address() (bsc#1098633). - device property: Introduce fwnode_get_phy_mode() (bsc#1098633). - device property: Introduce fwnode_irq_get() (bsc#1098633). - device property: Move fwnode graph ops to firmware specific locations (bsc#1098633). - device property: Move FW type specific functionality to FW specific files (bsc#1098633). - device property: preserve usecount for node passed to of_fwnode_graph_get_port_parent() (bsc#1098633). - dmaengine: fsl-edma: disable clks on all error paths (bsc#1051510). - dmaengine: k3dma: Off by one in k3_of_dma_simple_xlate() (bsc#1051510). - dmaengine: mv_xor_v2: Fix clock resource by adding a register clock (bsc#1051510). - dmaengine: omap-dma: port_window support correction for both direction (bsc#1051510). - dmaengine: pl330: fix a race condition in case of threaded irqs (bsc#1051510). - dmaengine: pl330: report BURST residue granularity (bsc#1051510). - dmaengine: qcom: bam_dma: get num-channels and num-ees from dt (bsc#1051510). - dmaengine: qcom_hidma: check pending interrupts (bsc#1051510). - dmaengine: rcar-dmac: Check the done lists in rcar_dmac_chan_get_residue() (bsc#1051510). - dmaengine: rcar-dmac: fix max_chunk_size for R-Car Gen3 (bsc#1051510). - dmaengine: tegra210-adma: fix of_irq_get() error check (bsc#1051510). - dmaengine: tegra-apb: Really fix runtime-pm usage (bsc#1051510). - dmaengine: xilinx_dma: Fix error code format specifier (bsc#1051510). - dmaengine: zynqmp_dma: Fix race condition in the probe (bsc#1051510). - doc: Rename .system_keyring to .builtin_trusted_keys (bsc#1051510). - doc: SKB_GSO_[IPIP|SIT] have been replaced (bsc#1051510). - docs-rst: fix broken links to dynamic-debug-howto in kernel-parameters (bsc#1051510). - docs: segmentation-offloads.txt: Fix ref to SKB_GSO_TUNNEL_REMCSUM (bsc#1051510). - documentation: admin-guide: intel_pstate: Fix sysfs path (bsc#1051510). - dp83640: Ensure against premature access to PHY registers after reset (bsc#1051510). - drbd: fix access after free (bsc#1051510). - driver core: Fix link to device power management documentation (bsc#1051510). - driver core: Partially revert 'driver core: correct device's shutdown order' (bsc#1051510). - drivers/firmware: psci_checker: Add missing destroy_timer_on_stack() (bsc#1051510). - drivers/net/ethernet/qlogic/qed: Fix __qed_spq_block() ordering (bsc#1086314 bsc#1086313 bsc#1086301 ). - drivers: net: i40evf: use setup_timer() helper (bsc#1101816 ). - drivers: soc: sunxi: fix error processing on base address when claiming (bsc#1051510). - drm: Add DP PSR2 sink enable bit (bsc#1051510). - drm/amdgpu: Remove VRAM from shared bo domains (bsc#1051510). - drm/atomic: Check old_plane_state->crtc in drm_atomic_helper_async_check() (bsc#1051510). - drm/atomic: Handling the case when setting old crtc for plane (bsc#1051510). - drm/atomic-helper: Drop plane->fb references only for drm_atomic_helper_shutdown() (bsc#1051510). - drm/atomic: Initialize variables in drm_atomic_helper_async_check() to make gcc happy (bsc#1051510). - drm/atomic: Make async plane update checks work as intended, v2 (bsc#1051510). - drm/bridge/sii8620: fix potential buffer overflow (bsc#1051510). - drm/dp/mst: Fix off-by-one typo when dump payload table (bsc#1051510). - drm/exynos: Fix dma-buf import (bsc#1051510). - drm/gma500: fix psb_intel_lvds_mode_valid()'s return type (bsc#1051510). - drm/i915/dp: Send DPCD ON for MST before phy_up (bsc#1051510). - drm/i915: Fix hotplug irq ack on i965/g4x (bsc#1051510). - drm/i915: Only call tasklet_kill() on the first prepare_reset (bsc#1051510). - drm: mali-dp: Uninitialized variable in malidp_se_check_scaling() (bsc#1087092). - drm/nouveau: Avoid looping through fake MST connectors (bsc#1051510). - drm/nouveau/drm/nouveau: Fix runtime PM leak in nv50_disp_atomic_commit() (bsc#1090888). - drm/nouveau/fifo/gk104-: poll for runlist update completion (bsc#1051510). - drm/nouveau/gem: off by one bugs in nouveau_gem_pushbuf_reloc_apply() (bsc#1051510). - drm/nouveau: Use drm_connector_list_iter_* for iterating connectors (bsc#1051510). - drm/radeon: fix mode_valid's return type (bsc#1051510). - drm: rcar-du: lvds: Fix LVDCR1 for R-Car gen3 (bsc#1085539). - drm: rcar-du: Remove zpos field from rcar_du_vsp_plane_state structure (bsc#1085539). - drm: re-enable error handling (bsc#1051510). - drm/rockchip: analogix_dp: Remove unnecessary init code (bsc#1085536). - drm/rockchip: dw_hdmi: Move HDMI vpll clock enable to bind() (bsc#1087092). - drm/rockchip: Fix build warning in analogix_dp-rockchip.c (bsc#1085536). - drm/rockchip: inno_hdmi: Fix error handling path (bsc#1087092). - drm/rockchip: inno_hdmi: reorder clk_disable_unprepare call in unbind (bsc#1087092). - drm/tegra: Acquire a reference to the IOVA cache (bsc#1090888). - drm/udl: fix display corruption of the last line (bsc#1101337). - drm: Use kvzalloc for allocating blob property memory (bsc#1101352). - drm/vc4: Reset ->{x, y}_scaling[1] when dealing with uniplanar formats (bsc#1051510). - dvb_frontend: do not use-after-free the frontend struct (bsc#1051510). - efi/efi_test: Prevent an Oops in efi_runtime_query_capsulecaps() (bsc#1051510). - enic: do not overwrite error code (bsc#1037697). - enic: enable rq before updating rq descriptors (bsc#1037697). - enic: set DMA mask to 47 bit (networking-stable-18_06_08). - ethtool: add ethtool_intersect_link_masks (bsc#1101816 ). - firewire: net: max MTU off by one (bsc#1051510). - firmware: arm_scpi: fix endianness of dev_id in struct dev_pstate_set (bsc#1051510). - firmware: dmi: Optimize dmi_matches (bsc#1051510). - firmware: tegra: Fix locking bugs in BPMP (bsc#1051510). - Fix English in description of GCC_PLUGIN_STRUCTLEAK (bsc#1051510). - Fix kABI breakage for of/device change (bsc#1051510). - fix kabi due to perf_event.h uapi field change (). - Fix kABI for rtl_deinit_deferred_work() rewrite (bsc#1051510). - fix Patch-mainline header - fm10k: add missing fall through comment (bsc#1101813 ). - fm10k: avoid divide by zero in rare cases when device is resetting (bsc#1101813). - fm10k: avoid needless delay when loading driver (bsc#1101813 ). - fm10k: avoid possible truncation of q_vector->name (bsc#1101813 ). - fm10k: bump version number (bsc#1101813). - fm10k: bump version number (bsc#1101813). - fm10k: clarify action when updating the VLAN table (bsc#1101813 ). - fm10k: cleanup unnecessary parenthesis in fm10k_iov.c (bsc#1101813). - fm10k: correct typo in fm10k_pf.c (bsc#1101813). - fm10k: do not assume VLAN 1 is enabled (bsc#1101813). - fm10k: do not loop while resetting VFs due to VFLR event (bsc#1101813). - fm10k: do not protect fm10k_queue_mac_request by fm10k_host_mbx_ready (bsc#1101813). - fm10k: Fix configuration for macvlan offload (bsc#1101813 ). - fm10k: fix 'failed to kill vid' message for VF (bsc#1101813 ). - fm10k: fix function doxygen comments (bsc#1101813). - fm10k: fix incorrect warning for function prototype (bsc#1101813 ). - fm10k: Fix misuse of net_ratelimit() (bsc#1101813). - fm10k: fix typos on fall through comments (bsc#1101813 ). - fm10k: introduce a message queue for MAC/VLAN messages (bsc#1101813). - fm10k: mark PM functions as __maybe_unused (bsc#1101813 ). - fm10k: move fm10k_prepare_for_reset and fm10k_handle_reset (bsc#1101813). - fm10k: prefer %s and __func__ for diagnostic prints (bsc#1101813 ). - fm10k: prepare_for_reset() when we lose PCIe Link (bsc#1101813 ). - fm10k: prevent race condition of __FM10K_SERVICE_SCHED (bsc#1101813). - fm10k: reduce duplicate fm10k_stat macro code (bsc#1101813 ). - fm10k: reschedule service event if we stall the PF<->SM mailbox (bsc#1101813). - fm10k: setup VLANs for l2 accelerated macvlan interfaces (bsc#1101813). - fm10k: simplify reading PFVFLRE register (bsc#1101813 ). - fm10k: stop adding VLAN 0 to the VLAN table (bsc#1101813 ). - fm10k: stop spurious link down messages when Tx FIFO is full (bsc#1101813). - fm10k: use generic PM hooks instead of legacy PCIe power hooks (bsc#1101813). - fm10k: use macro to avoid passing the array and size separately (bsc#1101813). - fm10k: Use seq_putc() in fm10k_dbg_desc_break() (bsc#1101813 ). - fm10k: use spinlock to implement mailbox lock (bsc#1101813 ). - fm10k: use the MAC/VLAN queue for VF<->PF MAC/VLAN requests (bsc#1101813). - fm10k: use variadic arguments to fm10k_add_stat_strings (bsc#1101813). - fm10k: warn if the stat size is unknown (bsc#1101813 ). - fsi: core: register with postcore_initcall (bsc#1051510). - fuse: atomic_o_trunc should truncate pagecache (bsc#1051510). - fuse: do not keep dead fuse_conn at fuse_fill_super() (bsc#1051510). - fuse: fix congested state leak on aborted connections (bsc#1051510). - fuse: fix control dir setup and teardown (bsc#1051510). - fuse: Remove the buggy retranslation of pids in fuse_dev_do_read (bsc#1051510). - genirq: Check __free_irq() return value for NULL (bsc#1103517). - gpio: acpi: work around false-positive -Wstring-overflow warning (bsc#1051510). - gpio: brcmstb: allow all instances to be wakeup sources (bsc#1051510). - gpio: brcmstb: check return value of gpiochip_irqchip_add() (bsc#1051510). - gpio: brcmstb: correct the configuration of level interrupts (bsc#1051510). - gpio: brcmstb: release the bgpio lock during irq handlers (bsc#1051510). - gpio: brcmstb: switch to handle_level_irq flow (bsc#1051510). - gpio: pca953x: fix vendor prefix for PCA9654 (bsc#1051510). - gpio: reject invalid gpio before getting gpio_desc (bsc#1051510). - gpio: tegra: fix unbalanced chained_irq_enter/exit (bsc#1051510). - gpu: host1x: Acquire a reference to the IOVA cache (bsc#1090888). - hid: hid-plantronics: Re-resend Update to map button for PTT products (bsc#1051510). - hid: i2c-hid: check if device is there before really probing (bsc#1051510). - hippi: Fix a Fix a possible sleep-in-atomic bug in rr_close (bsc#1051510). - hwmon: (aspeed-pwm) add THERMAL dependency (bsc#1051510). - hwmon: Deal with errors from the thermal subsystem (bsc#1051510). - hwmon: (ftsteutates) Fix clearing alarm sysfs entries (bsc#1051510). - hwmon: (ltc2990) Fix incorrect conversion of negative temperatures (bsc#1051510). - hwmon: (nct6683) Enable EC access if disabled at boot (bsc#1051510). - hwmon: (stts751) buffer overrun on wrong chip configuration (bsc#1051510). - hwmon: (tmp102) Fix first temperature reading (bsc#1051510). - hwrng: stm32 - add reset during probe (bsc#1051510). - i2c: axxia: enable clock before calling clk_get_rate() (bsc#1051510). - i2c: designware: Round down ACPI provided clk to nearest supported clk (bsc#1051510). - i2c: mux: pinctrl: mention correct module name in Kconfig help text (bsc#1051510). - i2c: tegra: Fix NACK error handling (bsc#1051510). - i40e: Add advertising 10G LR mode (bsc#1101816). - i40e: add check for return from find_first_bit call (bsc#1101816 ). - i40e: Add delay after EMP reset for firmware to recover (bsc#1101816). - i40e: add doxygen comment for new mode parameter (bsc#1101816 ). - i40e: add function doc headers for ethtool stats functions (bsc#1101816). - i40e: add function header for i40e_get_rxfh (bsc#1101816 ). - i40e: add helper conversion function for link_speed (bsc#1101816 ). - i40e: Add infrastructure for queue channel support (bsc#1101816 ). - i40e: Add macro for PF reset bit (bsc#1101816). - i40e: Add new PHY types for 25G AOC and ACC support (bsc#1101816 ). - i40e: Add returning AQ critical error to SW (bsc#1101816 ). - i40e: Add support for 'ethtool -m' (bsc#1101816). - i40e: add tx_busy to ethtool stats (bsc#1101816). - i40e: allow XPS with QoS enabled (bsc#1101816). - i40e: always return all queue stat strings (bsc#1101816 ). - i40e: always return VEB stat strings (bsc#1101816). - i40e: avoid divide by zero (bsc#1101816). - i40e: avoid overflow in i40e_ptp_adjfreq() (bsc#1101816 ). - i40e: broadcast filters can trigger overflow promiscuous (bsc#1101816). - i40e: calculate ethtool stats size in a separate function (bsc#1101816). - i40e: change flags to use 64 bits (bsc#1101816). - i40e: change ppp name to ddp (bsc#1101816). - i40e: check for invalid DCB config (bsc#1101816). - i40e: Cleanup i40e_vlan_rx_register (bsc#1101816). - i40e: cleanup unnecessary parens (bsc#1101816). - i40e: cleanup whitespace for some ethtool stat definitions (bsc#1101816). - i40e: cleanup wording in a header comment (bsc#1101816 ). - i40e: convert i40e_get_settings_link_up to new API (bsc#1101816 ). - i40e: convert i40e_phy_type_to_ethtool to new API (bsc#1101816 ). - i40e: convert i40e_set_link_ksettings to new API (bsc#1101816 ). - i40e: Delete an error message for a failed memory allocation in i40e_init_interrupt_scheme() (bsc#1101816). - i40e: Disable iWARP VSI PETCP_ENA flag on netdev down events (bsc#1101816). - i40e: disallow programming multiple filters with same criteria (bsc#1101816). - i40e: Display error message if module does not meet thermal requirements (bsc#1101816). - i40e: display priority_xon and priority_xoff stats (bsc#1101816 ). - i40e: do not clear suspended state until we finish resuming (bsc#1101816). - i40e: do not enter PHY debug mode while setting LEDs behaviour (bsc#1101816). - i40e: do not force filter failure in overflow promiscuous (bsc#1101816). - i40e: do not hold spinlock while resetting VF (bsc#1101816 ). - i40e: do not leak memory addresses (bsc#1101816). - i40e: drop i40e_pf *pf from i40e_vc_disable_vf() (bsc#1101816 ). - i40e: Enable VF to negotiate number of allocated queues (bsc#1101816). - i40e: ensure reset occurs when disabling VF (bsc#1101816 ). - i40e: factor out re-enable functions for ATR and SB (bsc#1101816 ). - i40e: Fix a potential NULL pointer dereference (bsc#1101816 ). - i40e: fix a typo (bsc#1101816). - i40e: fix a typo in i40e_pf documentation (bsc#1101816 ). - i40e: fix clearing link masks in i40e_get_link_ksettings (bsc#1101816). - i40e: fix comment typo (bsc#1101816). - i40e: fix flags declaration (bsc#1101816). - i40e: Fix FLR reset timeout issue (bsc#1101816). - i40e: Fix for adding multiple ethtool filters on the same location (bsc#1101816). - i40e: Fix for blinking activity instead of link LEDs (bsc#1101816). - i40e: fix for flow director counters not wrapping as expected (bsc#1101816). - i40e: Fix for NUP NVM image downgrade failure (bsc#1101816 ). - i40e: fix for wrong partition id calculation on OCP mezz cards (bsc#1101816). - i40e: fix handling of vf_states variable (bsc#1101816 ). - i40e: fix i40e_phy_type_to_ethtool function header (bsc#1101816 ). - i40e: fix incorrect register definition (bsc#1101816). - i40e: Fix kdump failure (bsc#1101816). - i40e: Fix link down message when interface is brought up (bsc#1101816). - i40e: fix link reporting (bsc#1101816). - i40e: fix merge error (bsc#1101816). - i40e: Fix multiple issues with UDP tunnel offload filter configuration (bsc#1101816). - i40e: Fix permission check for VF MAC filters (bsc#1101816 ). - i40e: fix reading LLDP configuration (bsc#1101816). - i40e: Fix recalculation of MSI-X vectors for VMDq (bsc#1101816 ). - i40e: Fix reporting of supported link modes (bsc#1101816 ). - i40e: Fix the polling mechanism of GLGEN_RSTAT.DEVSTATE (bsc#1101816). - i40e: fix typo in function description (bsc#1101816). - i40e: Fix unqualified module message while bringing link up (bsc#1101816). - i40e: fix whitespace issues in i40e_ethtool.c (bsc#1101816 ). - i40e: fold prefix strings directly into stat names (bsc#1101816 ). - i40e: free skb after clearing lock in ptp_stop (bsc#1101816 ). - i40e: free the skb after clearing the bitlock (bsc#1101816 ). - i40e: group autoneg PHY types together (bsc#1101816). - i40e: hold the RTNL lock while changing interrupt schemes (bsc#1101816). - i40e/i40evf: Add support for new mechanism of updating adaptive ITR (bsc#1101816). - i40e/i40evf: always set the CLEARPBA flag when re-enabling interrupts (bsc#1101816). - i40e/i40evf: Bump driver versions (bsc#1101816). - i40e/i40evf: bundle more descriptors when allocating buffers (bsc#1101816). - i40e/i40evf: cleanup incorrect function doxygen comments (bsc#1101816). - i40e/i40evf: Clean up logic for adaptive ITR (bsc#1101816 ). - i40e/i40evf: Clean-up of bits related to using q_vector->reg_idx (bsc#1101816). - i40e/i40evf: Detect and recover hung queue scenario (bsc#1101816 ). - i40e/i40evf: Do not bother setting the CLEARPBA bit (bsc#1101816 ). - i40e/i40evf: do not trust VF to reset itself (bsc#1101816 ). - i40e/i40evf: Enable NVMUpdate to retrieve AdminQ and add preservation flags for NVM update (bsc#1101816). - i40e/i40evf: fix incorrect default ITR values on driver load (bsc#1101816). - i40e/i40evf: Only track one ITR setting per ring instead of Tx/Rx (bsc#1101816). - i40e/i40evf: organize and re-number feature flags (bsc#1101816 ). - i40e/i40evf: Record ITR register location in the q_vector (bsc#1101816). - i40e/i40evf: rename bytes_per_int to bytes_per_usec (bsc#1101816 ). - i40e/i40evf: Split container ITR into current_itr and target_itr (bsc#1101816). - i40e/i40evf: Update DESC_NEEDED value to reflect larger value (bsc#1101816). - i40e/i40evf: use DECLARE_BITMAP for state (bsc#1101816 ). - i40e/i40evf: Use ring pointers to clean up _set_itr_per_queue (bsc#1101816). - i40e/i40evf: use SW variables for hang detection (bsc#1101816 ). - i40e/i40evf: Use usec value instead of reg value for ITR defines (bsc#1101816). - i40e: ignore skb->xmit_more when deciding to set RS bit (bsc#1101816). - i40e: implement split PCI error reset handler (bsc#1101816 ). - i40e: limit lan queue count in large CPU count machine (bsc#1101816). - i40e: make const array patterns static, reduces object code size (bsc#1101816). - i40e: make i40evf_map_rings_to_vectors void (bsc#1101816 ). - i40e: make use of i40e_vc_disable_vf (bsc#1101816). - i40e: mark PM functions as __maybe_unused (bsc#1101816 ). - i40e: move AUTO_DISABLED flags into the state field (bsc#1101816 ). - i40e: move client flags into state bits (bsc#1101816). - i40e: move I40E_FLAG_FILTER_SYNC to a state bit (bsc#1101816 ). - i40e: move I40E_FLAG_TEMP_LINK_POLLING to state field (bsc#1101816). - i40e: move I40E_FLAG_UDP_FILTER_SYNC to the state field (bsc#1101816). - i40e: prevent service task from running while we're suspended (bsc#1101816). - i40e: Prevent setting link speed on I40E_DEV_ID_25G_B (bsc#1101816). - i40e: Prevent setting link speed on KX_X722 (bsc#1101816 ). - i40e: Properly maintain flow director filters list (bsc#1101816 ). - i40e: redfine I40E_PHY_TYPE_MAX (bsc#1101816). - i40e: reduce lrxqthresh from 2 to 1 (bsc#1101816). - i40e: re-enable PTP L4 capabilities for XL710 if FW >6.0 (bsc#1101816). - i40e: refactor FW version checking (bsc#1101816). - i40e: refactor promisc_changed in i40e_sync_vsi_filters (bsc#1101816). - i40e: relax warning message in case of version mismatch (bsc#1101816). - i40e: remove duplicate pfc stats (bsc#1101816). - i40e: remove i40e_fcoe files (bsc#1101816). - i40e: remove ifdef SPEED_25000 (bsc#1101816). - i40e: Remove limit of 64 max queues per channel (bsc#1101816 ). - i40e: remove logically dead code (bsc#1101816). - i40e: remove redundant initialization of read_size (bsc#1101816 ). - i40e: rename 'change' variable to 'autoneg_changed' (bsc#1101816 ). - i40e: rename 'cmd' variables in ethtool interface (bsc#1101816 ). - i40e: re-number feature flags to remove gaps (bsc#1101816 ). - i40e: restore promiscuous after reset (bsc#1101816). - i40e: restore TCPv4 input set when re-enabling ATR (bsc#1101816 ). - i40e: Retry AQC GetPhyAbilities to overcome I2CRead hangs (bsc#1101816). - i40e: shutdown all IRQs and disable MSI-X when suspended (bsc#1101816). - i40e: simplify member variable accesses (bsc#1101816). - i40e: split i40e_get_strings() into smaller functions (bsc#1101816). - i40e: Stop dropping 802.1ad tags - eth proto 0x88a8 (bsc#1101816 ). - i40e: stop using cmpxchg flow in i40e_set_priv_flags() (bsc#1101816). - i40e: track filter type statistics when deleting invalid filters (bsc#1101816). - i40e: track id can be 0 (bsc#1101816). - i40e: update data pointer directly when copying to the buffer (bsc#1101816). - i40e: update VFs of link state after GET_VF_RESOURCES (bsc#1101816). - i40e: use admin queue for setting LEDs behavior (bsc#1101816 ). - i40e: use a local variable instead of calculating multiple times (bsc#1101816). - i40e: use newer generic PM support instead of legacy PM callbacks (bsc#1101816). - i40e: use separate state bit for miscellaneous IRQ setup (bsc#1101816). - i40e: use the more traditional 'i' loop variable (bsc#1101816 ). - i40e: use WARN_ONCE to replace the commented BUG_ON size check (bsc#1101816). - i40evf: Allow turning off offloads when the VF has VLAN set (bsc#1101816). - i40evf: Clean-up flags for promisc mode to avoid high polling rate (bsc#1101816). - i40evf: Correctly populate rxitr_idx and txitr_idx (bsc#1101816 ). - i40evf: Do not clear MSI-X PBA manually (bsc#1101816). - i40evf: Drop i40evf_fire_sw_int as it is prone to races (bsc#1101816). - i40evf: enable support for VF VLAN tag stripping control (bsc#1101816). - i40evf: Enable VF to request an alternate queue allocation (bsc#1101816). - i40evf: Fix a hardware reset support in VF driver (bsc#1101816 ). - i40evf: fix client notify of l2 params (bsc#1101816). - i40evf: Fix double locking the same resource (bsc#1101816 ). - i40evf: Fix link up issue when queues are disabled (bsc#1101816 ). - i40evf: fix ring to vector mapping (bsc#1101816). - i40evf: Fix turning TSO, GSO and GRO on after (bsc#1101816 ). - i40evf: hold the critical task bit lock while opening (bsc#1101816). - i40evf: lower message level (bsc#1101816). - i40evf: Make VF reset warning message more clear (bsc#1101816 ). - i40evf: release bit locks in reverse order (bsc#1101816 ). - i40evf: remove flags that are never used (bsc#1101816 ). - i40evf: remove flush_scheduled_work call in i40evf_remove (bsc#1101816). - i40evf: Replace GFP_ATOMIC with GFP_KERNEL in i40evf_add_vlan (bsc#1101816). - i40evf: Use an iterator of the same type as the list (bsc#1101816). - i40evf: use __dev_c_sync routines in .set_rx_mode (bsc#1101816 ). - i40evf: use GFP_ATOMIC under spin lock (bsc#1101816). - i40evf: use spinlock to protect (mac|vlan)_filter_list (bsc#1101816). - i40e/virtchnl: fix application of sizeof to pointer (bsc#1101816 ). - i40iw: Fix memory leak in error path of create QP (bsc#1058659 ). - i40iw: Refactor of driver generated AEs (bsc#1058659 ). - i40iw: Tear-down connection after CQP Modify QP failure (bsc#1058659). - i40iw: Use correct address in dst_neigh_lookup for IPv6 (bsc#1058659). - ib/core: Fix error code for invalid GID entry (bsc#1046306 ). - ib/core: Honor port_num while resolving GID for IB link layer (bsc#1046306). - ib/core: Make ib_mad_client_id atomic (bsc#1046306). - ib/core: Make testing MR flags for writability a static inline function (bsc#1046306). - ib/core: Remove duplicate declaration of gid_cache_wq (bsc#1046306). - ib/hfi1: Add bypass register defines and replace blind constants (bsc#1060463). - ib/hfi1: Fix fault injection init/exit issues (bsc#1060463 ). - ib/hfi1: Fix incorrect mixing of ERR_PTR and NULL return values (bsc#1060463). - ib/hfi1: Fix user context tail allocation for DMA_RTAIL (bsc#1060463). - ib/hfi1: Return actual error value from program_rcvarray() (bsc#1060463). - ib/iser: Do not reduce max_sectors (bsc#1046306). - ib/isert: Fix for lib/dma_debug check_sync warning (bsc#1046306 ). - ib/isert: fix T10-pi check mask setting (bsc#1046306 ). - ib/mlx4: Fix an error handling path in 'mlx4_ib_rereg_user_mr()' (bsc#1046302). - ib/mlx4: Mark user MR as writable if actual virtual memory is writable (bsc#1046302). - ib/mlx5: Fetch soft WQE's on fatal error state (bsc#1046305 ). - ib/mlx5: Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046305). - ibmvnic: Fix error recovery on login failure (bsc#1101789). - ib/qedr: Remove GID add/del dummy routines (bsc#1086314 bsc#1086313 bsc#1086301). - ib/rxe: add RXE_START_MASK for rxe_opcode IB_OPCODE_RC_SEND_ONLY_INV (bsc#1046306). - ib/rxe: avoid double kfree_skb (bsc#1046306). - ib/rxe: Fix for oops in rxe_register_device on ppc64le arch (bsc#1046306). - ib/umem: Use the correct mm during ib_umem_release (bsc#1046306 ). - ib/uverbs: Fix possible oops with duplicate ioctl attributes (bsc#1046306). - igb: Fix not adding filter elements to the list (bsc#1056651 ). - igb: Fix queue selection on MAC filters on i210 (bsc#1056651 ). - iio: accel: st_accel: fix data-ready line configuration (bsc#1051510). - iio: accel: st_accel_i2c: fix i2c_device_id table (bsc#1051510). - iio: accel: st_accel_spi: fix spi_device_id table (bsc#1051510). - iio: adc: sun4i-gpadc-iio: fix unbalanced irq enable/disable (bsc#1051510). - iio: adc: twl4030: Return an error if we can not enable the vusb3v1 regulator in 'twl4030_madc_probe()' (bsc#1051510). - iio: BME280: Updates to Humidity readings need ctrl_reg write! (bsc#1051510). - iio: gyro: st_gyro: fix L3GD20H support (bsc#1051510). - iio: humidity: hts221: remove warnings in hts221_parse_{temp,rh}_caldata() (bsc#1051510). - iio: imu: inv_mpu6050: test whoami first and against all known values (bsc#1051510). - iio: magnetometer: st_magn_core: enable multiread by default for LIS3MDL (bsc#1051510). - iio: magnetometer: st_magn: fix drdy line configuration for LIS3MDL (bsc#1051510). - iio: magnetometer: st_magn_spi: fix spi_device_id table (bsc#1051510). - iio: pressure: bmp280: fix relative humidity unit (bsc#1051510). - iio: pressure: st_pressure: fix drdy configuration for LPS22HB and LPS25H (bsc#1051510). - iio: pressure: zpa2326: Remove always-true check which confuses gcc (bsc#1051510). - iio: pressure: zpa2326: report interrupted case as failure (bsc#1051510). - iio: trigger: stm32-timer: fix quadrature mode get routine (bsc#1051510). - iio: trigger: stm32-timer: fix write_raw return value (bsc#1051510). - iio: tsl2583: correct values in integration_time_available (bsc#1051510). - infiniband: fix a possible use-after-free bug (bsc#1046306 ). - input: elan_i2c - add ACPI ID for lenovo ideapad 330 (bsc#1051510). - input: elan_i2c - add another ACPI ID for Lenovo Ideapad 330-15AST (bsc#1051510). - input: i8042 - add Lenovo LaVie Z to the i8042 reset list (bsc#1051510). - iommu/vt-d: Clear Page Request Overflow fault bit (). - ip6_tunnel: remove magic mtu value 0xFFF8 (networking-stable-18_06_08). - ipc/shm: fix use-after-free of shm file via remap_file_pages() (bnc#1102512). - ipmr: properly check rhltable_init() return value (networking-stable-18_06_08). - ipv4: remove warning in ip_recv_error (networking-stable-18_06_08). - ipv6: allow PMTU exceptions to local routes (networking-stable-18_06_20). - ipv6: sr: fix memory OOB access in seg6_do_srh_encap/inline (networking-stable-18_06_08). - iw_cxgb4: Add ib_device->get_netdev support (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - iw_cxgb4: correctly enforce the max reg_mr depth (bsc#1046543 ). - iw_cxgb4: initialize ib_mr fields for user mrs (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - iwlwifi: pcie: fix race in Rx buffer allocator (bsc#1051510). - ixgbe: add counter for times Rx pages gets allocated, not recycled (bsc#1101674). - ixgbe: add error checks when initializing the PHY (bsc#1101674 ). - ixgbe: Add receive length error counter (bsc#1101674). - ixgbe: add status reg reads to ixgbe_check_remove (bsc#1101674 ). - ixgbe: Add support for macvlan offload RSS on X550 and clean-up pool handling (bsc#1101674). - ixgbe: add support for reporting 5G link speed (bsc#1101674 ). - ixgbe: advertise highest capable link speed (bsc#1101674 ). - ixgbe: Assume provided MAC filter has been verified by macvlan (bsc#1101674). - ixgbe: avoid bringing rings up/down as macvlans are added/removed (bsc#1101674). - ixgbe: Avoid to write the RETA table when unnecessary (bsc#1101674). - ixgbe: Clear SWFW_SYNC register during init (bsc#1101674 ). - ixgbe: declare ixgbe_mac_operations structures as const (bsc#1101674). - ixgbe: Default to 1 pool always being allocated (bsc#1101674 ). - ixgbe: Do not assume dev->num_tc is equal to hardware TC config (bsc#1101674). - ixgbe: Do not manipulate macvlan Tx queues when performing macvlan offload (bsc#1101674). - ixgbe: Do not report unsupported timestamping filters for X550 (bsc#1101674). - ixgbe: Drop l2_accel_priv data pointer from ring struct (bsc#1101674). - ixgbe: Drop support for macvlan specific unicast lists (bsc#1101674). - ixgbe: enable multicast on shutdown for WOL (bsc#1101674 ). - ixgbe: extend firmware version support (bsc#1101674). - ixgbe: Fix && vs || typo (bsc#1101674). - ixgbe: fix crash when injecting AER after failed reset (bsc#1101674). - ixgbe: fix disabling hide VLAN on VF reset (bsc#1101674 ). - ixgbe: Fix handling of macvlan Tx offload (bsc#1101674 ). - ixgbe: Fix interaction between SR-IOV and macvlan offload (bsc#1101674). - ixgbe: Fix kernel-doc format warnings (bsc#1101674). - ixgbe: Fix limitations on macvlan so we can support up to 63 offloaded devices (bsc#1101674). - ixgbe: fix possible race in reset subtask (bsc#1101674 ). - ixgbe: fix read-modify-write in x550 phy setup (bsc#1101674 ). - ixgbe: Fix setting of TC configuration for macvlan case (bsc#1101674). - ixgbe: fix the FWSM.PT check in ixgbe_mng_present() (bsc#1101674 ). - ixgbe/fm10k: Record macvlan stats instead of Rx queue for macvlan offloaded rings (bsc#1101674). - ixgbe: force VF to grab new MAC on driver reload (bsc#1101674 ). - ixgbe: introduce a helper to simplify code (bsc#1101674 ). - ixgbe/ixgbevf: Free IRQ when PCI error recovery removes the device (bsc#1101674). - ixgbe: Perform reinit any time number of VFs change (bsc#1101674 ). - ixgbe: Remove an obsolete comment about ITR (bsc#1101674 ). - ixgbe: remove redundant initialization of 'pool' (bsc#1101674 ). - ixgbe: remove unused enum latency_range (bsc#1101674). - ixgbe: restore normal RSS after last macvlan offload is removed (bsc#1101674). - ixgbe: return error on unsupported SFP module when resetting (bsc#1101674). - ixgbe: split Tx/Rx ring clearing for ethtool loopback test (bsc#1101674). - ixgbe: There is no need to update num_rx_pools in L2 fwd offload (bsc#1101674). - ixgbe: Update adaptive ITR algorithm (bsc#1101674). - ixgbe: use ARRAY_SIZE for array sizing calculation on array buf (bsc#1101674). - ixgbe: Use ring values to test for Tx pending (bsc#1101674 ). - ixgbevf: add build_skb support (bsc#1101674). - ixgbevf: add counters for Rx page allocations (bsc#1101674 ). - ixgbevf: add ethtool private flag for legacy Rx (bsc#1101674 ). - ixgbevf: add function for checking if we can reuse page (bsc#1101674). - ixgbevf: add support for DMA_ATTR_SKIP_CPU_SYNC/WEAK_ORDERING (bsc#1101674). - ixgbevf: add support for padding packet (bsc#1101674). - ixgbevf: add support for using order 1 pages to receive large frames (bsc#1101674). - ixgbevf: allocate the rings as part of q_vector (bsc#1101674 ). - ixgbevf: break out Rx buffer page management (bsc#1101674 ). - ixgbevf: clear rx_buffer_info in configure instead of clean (bsc#1101674). - ixgbevf: do not bother clearing tx_buffer_info in ixgbevf_clean_tx_ring() (bsc#1101674). - ixgbevf: fix ixgbevf_xmit_frame()'s return type (bsc#1101674 ). - ixgbevf: Fix kernel-doc format warnings (bsc#1101674). - ixgbevf: fix MAC address changes through ixgbevf_set_mac() (bsc#1101674). - ixgbevf: fix possible race in the reset subtask (bsc#1101674 ). - ixgbevf: fix unused variable warning (bsc#1101674). - ixgbevf: improve performance and reduce size of ixgbevf_tx_map() (bsc#1101674). - ixgbevf: make sure all frames fit minimum size requirements (bsc#1101674). - ixgbevf: only DMA sync frame length (bsc#1101674). - ixgbevf: remove redundant initialization of variable 'dma' (bsc#1101674). - ixgbevf: remove redundant setting of xcast_mode (bsc#1101674 ). - ixgbevf: setup queue counts (bsc#1101674). - ixgbevf: update code to better handle incrementing page count (bsc#1101674). - ixgbevf: use ARRAY_SIZE for various array sizing calculations (bsc#1101674). - ixgbevf: use length to determine if descriptor is done (bsc#1101674). - ixgbevf: use page_address offset from page (bsc#1101674 ). - jump_label: Add branch hints to static_branch_{un,}likely() (bnc#1101669 optimise numa balancing for fast migrate). - kabi cxgb4 MU (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - kcm: Fix use-after-free caused by clonned sockets (networking-stable-18_06_08). - kernel/params.c: downgrade warning for unsafe parameters (bsc#1051510). - keys: DNS: fix parsing multiple options (bsc#1051510). - kvm: PPC: Check if IOMMU page is contained in the pinned physical page (bsc#1077761, git-fixes). - kvm: x86: fix vcpu initialization with userspace lapic (bsc#1101564). - kvm: x86: move LAPIC initialization after VMCS creation (bsc#1101564). - libnvdimm: add an api to cast a 'struct nd_region' to its 'struct device' (bsc#1094119). - libnvdimm, label: fix index block size calculation (bsc#1102147). - mailbox: bcm2835: Fix of_xlate return value (bsc#1051510). - mailbox: PCC: erroneous error message when parsing ACPI PCCT (bsc#1096330). - mdio-sun4i: Fix a memory leak (bsc#1051510). - media: coda/imx-vdoa: Check for platform_get_resource() error (bsc#1051510). - media: cx25840: Use subdev host data for PLL override (bsc#1051510). - media: cx88: Get rid of spurious call to cx8800_start_vbi_dma() (bsc#1051510). - media: cxusb: restore RC_MAP for MyGica T230 (bsc#1051510). - media: dt-bindings: media: rcar_vin: Use status 'okay' (bsc#1051510). - media: dvb-core: always call invoke_release() in fe_free() (bsc#1051510). - media: dvb_frontend: fix ifnullfree.cocci warnings (bsc#1051510). - media: dvb_frontend: only use kref after initialized (bsc#1051510). - media: dvb_net: ensure that dvb_net_ule_handle is fully initialized (bsc#1051510). - media: media-device: fix ioctl function types (bsc#1051510). - media: mxl111sf: Fix potential NULL pointer dereference (bsc#1051510). - media: omap3isp/isp: remove an unused static var (bsc#1051510). - media: rcar_jpu: Add missing clk_disable_unprepare() on error in jpu_open() (bsc#1051510). - media: s5p-jpeg: fix number of components macro (bsc#1051510). - media: s5p-mfc: Fix lock contention - request_firmware() once (bsc#1051510). - media: saa7164: Fix driver name in debug output (bsc#1051510). - media: si470x: fix __be16 annotations (bsc#1051510). - media: siano: get rid of __le32/__le16 cast warnings (bsc#1051510). - media: staging: omap4iss: Include asm/cacheflush.h after generic includes (bsc#1051510). - media: tw686x: Fix incorrect vb2_mem_ops GFP flags (bsc#1051510). - media: vivid: potential integer overflow in vidioc_g_edid() (bsc#1051510). - mfd: tps65218: Reorder tps65218_regulator_id enum (bsc#1051510). - mfd: tps65911-comparator: Fix a build error (bsc#1051510). - mfd: tps65911-comparator: Fix an off by one bug (bsc#1051510). - mlxsw: spectrum: Forbid creation of VLAN 1 over port/LAG (networking-stable-18_06_08). - mmc: cavium: Fix use-after-free in of_platform_device_destroy (bsc#1051510). - mmc: dw_mmc: fix card threshold control configuration (bsc#1051510). - mmc: dw_mmc: update actual clock for mmc debugfs (bsc#1051510). - mmc: meson-gx: remove CLK_DIVIDER_ALLOW_ZERO clock flag (bsc#1051510). - mmc: pwrseq: Use kmalloc_array instead of stack VLA (bsc#1051510). - mmc: sdhci-msm: fix issue with power irq (bsc#1051510). - mmc: sdhci-of-esdhc: disable SD clock for clock value 0 (bsc#1051510). - mmc: sdhci-of-esdhc: fix eMMC couldn't work after kexec (bsc#1051510). - mmc: sdhci-of-esdhc: fix the mmc error after sleep on ls1046ardb (bsc#1051510). - mmc: sdhci-xenon: Fix clock resource by adding an optional bus clock (bsc#1051510). - mmc: sdhci-xenon: wait 5ms after set 1.8V signal enable (bsc#1051510). - mmc: tmio: remove outdated comment (bsc#1051510). - modsign: log module name in the event of an error (bsc#1093666). - modsign: print module name along with error message (bsc#1093666). - module: make it clear when we're handling the module copy in info->hdr (bsc#1093666). - module: setup load info before module_sig_check() (bsc#1093666). - mvpp2: fix multicast address filter (bsc#1098633). - mwifiex: correct histogram data with appropriate index (bsc#1051510). - mwifiex: handle race during mwifiex_usb_disconnect (bsc#1051510). - net: add rb_to_skb() and other rb tree helpers (bsc#1102340). - net: cxgb3_main: fix potential Spectre v1 (bsc#1046533 ). - net: define the TSO header size in net/tso.h (bsc#1098633). - netdev-FAQ: clarify DaveM's position for stable backports (networking-stable-18_06_08). - net: dsa: add error handling for pskb_trim_rcsum (networking-stable-18_06_20). - net: ethernet: davinci_emac: fix error handling in probe() (networking-stable-18_06_08). - net: ethernet: ti: cpdma: correct error handling for chan create (networking-stable-18_06_08). - net: ethtool: Add macro to clear a link mode setting (bsc#1101816). - net: in virtio_net_hdr only add VLAN_HLEN to csum_start if payload holds vlan (networking-stable-18_06_20). - net: ipv4: add missing RTA_TABLE to rtm_ipv4_policy (networking-stable-18_06_08). - net: metrics: add proper netlink validation (networking-stable-18_06_08). - net/mlx4_core: Fix error handling in mlx4_init_port_info (bsc#1046300). - net/mlx4_core: Save the qpn from the input modifier in RST2INIT wrapper (bsc#1046300). - net/mlx4_en: Do not reuse RX page when XDP is set (bsc#1046299 ). - net/mlx4: Fix irq-unsafe spinlock usage (networking-stable-18_06_08). - net/mlx5: Adjust clock overflow work period (bsc#1046303). - net/mlx5e: Do not allow aRFS for encapsulated packets (bsc#1046303). - net/mlx5e: Do not attempt to dereference the ppriv struct if not being eswitch manager (bsc#1046300). - net/mlx5e: Fix quota counting in aRFS expire flow (bsc#1046303 ). - net/mlx5e: Refine ets validation function (bsc#1075360). - net/mlx5e: Remove redundant vport context vlan update (bsc#1046303). - net/mlx5: Eswitch, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303). - net/mlx5e: When RXFCS is set, add FCS data into checksum calculation (networking-stable-18_06_08). - net/mlx5: Fix command interface race in polling mode (bsc#1046300). - net/mlx5: Fix dump_command mailbox length printed (bsc#1046303 ). - net/mlx5: Fix incorrect raw command length parsing (bsc#1046300 ). - net/mlx5: Fix wrong size allocation for QoS ETC TC regitster (bsc#1046300). - net/mlx5: FPGA, Call DMA unmap with the right size (bsc#1046303 ). - net/mlx5: Free IRQs in shutdown path (bsc#1046303). - net/mlx5: IPSec, Fix a race between concurrent sandbox QP commands (bsc#1046303). - net/mlx5: Properly deal with flow counters when deleting rules (bsc#1046303). - net/mlx5: Protect from command bit overflow (bsc#1046303 ). - net/mlx5: Refactor num of blocks in mailbox calculation (bsc#1046303). - net/mlx5: Vport, Use 'kvfree()' for memory allocated by 'kvzalloc()' (bsc#1046303). - net: mvmdio: add xmdio xsmi support (bsc#1098633). - net: mvmdio: check the MII_ADDR_C45 bit is not set for smi operations (bsc#1098633). - net: mvmdio: introduce an ops structure (bsc#1098633). - net: mvmdio: put the poll intervals in the ops structure (bsc#1098633). - net: mvmdio: remove duplicate locking (bsc#1098633). Refresh patches.suse/net-mvmdio-disable-unprepare-clocks-in-EPRO BE_DEFER-.patch. - net: mvmdio: reorder headers alphabetically (bsc#1098633). - net: mvmdio: simplify the smi read and write error paths (bsc#1098633). - net: mvmdio: use GENMASK for masks (bsc#1098633). - net: mvmdio: use tabs for defines (bsc#1098633). - net: mvpp2: add comments about smp_processor_id() usage (bsc#1098633). - net: mvpp2: add ethtool GOP statistics (bsc#1098633). - net: mvpp2: Add hardware offloading for VLAN filtering (bsc#1098633). - net: mvpp2: add support for TX interrupts and RX queue distribution modes (bsc#1098633). - net: mvpp2: Add support for unicast filtering (bsc#1098633). - net: mvpp2: adjust the coalescing parameters (bsc#1098633). - net: mvpp2: align values in ethtool get_coalesce (bsc#1098633). - net: mvpp2: allocate zeroed tx descriptors (bsc#1098633). - net: mvpp2: check ethtool sets the Tx ring size is to a valid min value (bsc#1098633). - net: mvpp2: cleanup probed ports in the probe error path (bsc#1098633). - net: mvpp2: do not call txq_done from the Tx path when Tx irqs are used (bsc#1098633). - net: mvpp2: do not disable GMAC padding (bsc#1098633). - net: mvpp2: do not select the internal source clock (bsc#1098633). - net: mvpp2: do not set GMAC autoneg when using XLG MAC (bsc#1098633). - net: mvpp2: do not sleep in set_rx_mode (bsc#1098633). - net: mvpp2: do not unmap TSO headers buffers (bsc#1098633). - net: mvpp2: Do not use dynamic allocs for local variables (bsc#1098633). - net: mvpp2: dynamic reconfiguration of the comphy/GoP/MAC (bsc#1098633). - net: mvpp2: enable ACPI support in the driver (bsc#1098633). - net: mvpp2: enable basic 10G support (bsc#1098633). - net: mvpp2: enable UDP/TCP checksum over IPv6 (bsc#1098633). - net: mvpp2: fallback using h/w and random mac if the dt one isn't valid (bsc#1098633). - net: mvpp2: Fix clk error path in mvpp2_probe (bsc#1098633). - net: mvpp2: Fix clock resource by adding an optional bus clock (bsc#1098633). - net: mvpp2: Fix clock resource by adding missing mg_core_clk (bsc#1098633). - net: mvpp2: Fix DMA address mask size (bsc#1098633). - net: mvpp2: fix GOP statistics loop start and stop conditions (bsc#1098633). - net: mvpp2: fix invalid parameters order when calling the tcam init (bsc#1098633). - net: mvpp2: fix MVPP21_ISR_RXQ_GROUP_REG definition (bsc#1098633). - net: mvpp2: Fix parser entry init boundary check (bsc#1098633). - net: mvpp2: fix parsing fragmentation detection (bsc#1098633). - net: mvpp2: fix port list indexing (bsc#1098633). - net: mvpp2: Fix TCAM filter reserved range (bsc#1098633). - net: mvpp2: fix the packet size configuration for 10G (bsc#1098633). - net: mvpp2: fix the RSS table entry offset (bsc#1098633). - net: mvpp2: fix the synchronization module bypass macro name (bsc#1098633). - net: mvpp2: fix the txq_init error path (bsc#1098633). - net: mvpp2: fix TSO headers allocation and management (bsc#1098633). - net: mvpp2: fix typo in the tcam setup (bsc#1098633). - net: mvpp2: fix use of the random mac address for PPv2.2 (bsc#1098633). - net: mvpp2: improve the link management function (bsc#1098633). - net: mvpp2: initialize the comphy (bsc#1098633). - net: mvpp2: initialize the GMAC when using a port (bsc#1098633). - net: mvpp2: initialize the GoP (bsc#1098633). - net: mvpp2: initialize the RSS tables (bsc#1098633). - net: mvpp2: initialize the Tx FIFO size (bsc#1098633). - net: mvpp2: initialize the XLG MAC when using a port (bsc#1098633). - net: mvpp2: introduce per-port nrxqs/ntxqs variables (bsc#1098633). - net: mvpp2: introduce queue_vector concept (bsc#1098633). - net: mvpp2: jumbo frames support (bsc#1098633). - net: mvpp2: limit TSO segments and use stop/wake thresholds (bsc#1098633). - net: mvpp2: Make mvpp2_prs_hw_read a parser entry init function (bsc#1098633). - net: mvpp2: make the phy optional (bsc#1098633). - net: mvpp2: move from cpu-centric naming to 'software thread' naming (bsc#1098633). - net: mvpp2: move the mac retrieval/copy logic into its own function (bsc#1098633). - net: mvpp2: move the mii configuration in the ndo_open path (bsc#1098633). - net: mvpp2: mvpp2_check_hw_buf_num() can be static (bsc#1098633). - net: mvpp2: only free the TSO header buffers when it was allocated (bsc#1098633). - net: mvpp2: Prevent userspace from changing TX affinities (bsc#1098633). - net: mvpp2: remove mvpp2_pool_refill() (bsc#1098633). - net: mvpp2: remove RX queue group reset code (bsc#1098633). - net: mvpp2: remove unused mvpp2_bm_cookie_pool_set() function (bsc#1098633). - net: mvpp2: remove useless goto (bsc#1098633). - net: mvpp2: report the tx-usec coalescing information to ethtool (bsc#1098633). - net: mvpp2: set maximum packet size for 10G ports (bsc#1098633). - net: mvpp2: set the Rx FIFO size depending on the port speeds for PPv2.2 (bsc#1098633). - net: mvpp2: Simplify MAC filtering function parameters (bsc#1098633). - net: mvpp2: simplify maintaining enabled ports' list (bsc#1098633). - net: mvpp2: simplify the link_event function (bsc#1098633). - net: mvpp2: simplify the Tx desc set DMA logic (bsc#1098633). - net: mvpp2: software tso support (bsc#1098633). - net: mvpp2: split the max ring size from the default one (bsc#1098633). - net: mvpp2: take advantage of the is_rgmii helper (bsc#1098633). - net: mvpp2: unify register definitions coding style (bsc#1098633). - net: mvpp2: unify the txq size define use (bsc#1098633). - net: mvpp2: update the BM buffer free/destroy logic (bsc#1098633). - net: mvpp2: use a data size of 10kB for Tx FIFO on port 0 (bsc#1098633). - net: mvpp2: use correct index on array mvpp2_pools (bsc#1098633). - net: mvpp2: use device_*/fwnode_* APIs instead of of_* (bsc#1098633). - net: mvpp2: Use relaxed I/O in data path (bsc#1098633). - net: mvpp2: use the aggr txq size define everywhere (bsc#1098633). - net: mvpp2: use the GoP interrupt for link status changes (bsc#1098633). - net: mvpp2: use the same buffer pool for all ports (bsc#1098633). - net/packet: refine check for priv area size (networking-stable-18_06_08). - net: phy: add XAUI and 10GBASE-KR PHY connection types (bsc#1098633). - net: phy: broadcom: Fix auxiliary control register reads (networking-stable-18_06_08). - net: phy: broadcom: Fix bcm_write_exp() (networking-stable-18_06_08). - net: phy: dp83822: use BMCR_ANENABLE instead of BMSR_ANEGCAPABLE for DP83620 (networking-stable-18_06_20). - net: qed: use correct strncpy() size (bsc#1086314 bsc#1086313 bsc#1086301). - net/sched: act_simple: fix parsing of TCA_DEF_DATA (networking-stable-18_06_20). - net/sched: act_tunnel_key: fix NULL dereference when 'goto chain' is used (bsc#1056787). - net/sched: fix NULL dereference in the error path of tcf_sample_init() (bsc#1056787). - net: sched: red: avoid hashing NULL child (bsc#1056787). - net-sysfs: Fix memory leak in XPS configuration (networking-stable-18_06_08). - net: usb: cdc_mbim: add flag FLAG_SEND_ZLP (networking-stable-18_06_08). - nfc: nfcmrvl_uart: fix device-node leak during probe (bsc#1051510). - nfc: pn533: Fix wrong GFP flag usage (bsc#1051510). - nfit, address-range-scrub: add module option to skip initial ars (bsc#1094119). - nfit, address-range-scrub: determine one platform max_ars value (bsc#1094119). - nfit, address-range-scrub: fix scrub in-progress reporting (bsc#1051510). - nfit, address-range-scrub: introduce nfit_spa->ars_state (bsc#1094119). - nfit, address-range-scrub: rework and simplify ARS state machine (bsc#1094119). - nfit: fix region registration vs block-data-window ranges (bsc#1051510). - nfit: fix unchecked dereference in acpi_nfit_ctl (bsc#1051510). - nvme: add ANA support (bsc#1054245). - nvme: add bio remapping tracepoint (bsc#1054245). - nvme: centralize ctrl removal prints (bsc#1054245). - nvme: cleanup double shift issue (bsc#1054245). - nvme: do not enable AEN if not supported (bsc#1077989). - nvme: do not hold nvmf_transports_rwsem for more than transport lookups (bsc#1054245). - nvme: do not rely on the changed namespace list log (bsc#1054245). - nvme: enforce 64bit offset for nvme_get_log_ext fn (bsc#1054245). - nvme: fix handling of metadata_len for NVME_IOCTL_IO_CMD (). - nvme: Fix sync controller reset return (bsc#1077989). - nvme: fix use-after-free in nvme_free_ns_head (bsc#1054245). - nvme: guard additional fields in nvme command structures (bsc#1054245). - nvme.h: add AEN configuration symbols (bsc#1054245). - nvme.h: add ANA definitions (bsc#1054245). - nvme.h: add support for the log specific field (bsc#1054245). - nvme.h: add the changed namespace list log (bsc#1054245). - nvme: host: core: fix precedence of ternary operator (bsc#1054245). - nvme.h: untangle AEN notice definitions (bsc#1054245). - nvme: if_ready checks to fail io to deleting controller (bsc#1077989). - nvme: implement log page low/high offset and dwords (bsc#1054245). - nvme: kabi fixes for nvme_ctrl (bsc#1054245). - nvme: kABI fixes for nvmet_ctrl (bsc#1054245). - nvme: kABI fix for ANA support in nvme_ctrl (bsc#1054245). - nvme-loop: add support for multiple ports (bsc#1054245). - nvme: make nvme_get_log_ext non-static (bsc#1054245). - nvme: mark nvme_queue_scan static (bsc#1054245). - nvme/multipath: Disable runtime writable enabling parameter (bsc#1054245). - nvme: partially revert 'nvme: remove nvme_req_needs_failover' (bsc#1054245). - nvme: reintruduce nvme_get_log_ext() (bsc#1054245). - nvme: remove nvme_req_needs_failover (bsc#1054245). - nvme: simplify the API for getting log pages (bsc#1054245). - nvme: submit AEN event configuration on startup (bsc#1054245). - nvmet: add AEN configuration support (bsc#1054245). - nvmet: add a new nvmet_zero_sgl helper (bsc#1054245). - nvmet: add minimal ANA support (bsc#1054245). - nvmet: constify struct nvmet_fabrics_ops (bsc#1054245). - nvmet-fc: fix target sgl list on large transfers (). - nvmet: filter newlines from user input (bsc#1054245). - nvmet: fixup crash on NULL device path (bsc#1054245). - nvmet: implement the changed namespaces log (bsc#1054245). - nvmet: kABI fixes for ANA support (bsc#1054245). - nvmet: keep a port pointer in nvmet_ctrl (bsc#1054245). - nvmet: mask pending AENs (bsc#1054245). - nvmet: reset keep alive timer in controller enable (bsc#1054245). - nvmet: return all zeroed buffer when we can't find an active namespace (bsc#1054245). - nvmet: split log page implementation (bsc#1054245). - nvmet: support configuring ANA groups (bsc#1054245). - nvmet: track and limit the number of namespaces per subsystem (1054245). - nvmet: use Retain Async Event bit to clear AEN (bsc#1054245). - nvme: use the changed namespaces list log to clear ns data changed AENs (bsc#1054245). - of: fix DMA mask generation (bsc#1051510). - of: Make of_fwnode_handle() safer (bsc#1098633). - of/pci: Fix theoretical NULL dereference (bsc#1051510). - of: restrict DMA configuration (bsc#1051510). - pci: Account for all bridges on bus when distributing bus numbers (bsc#1100132). - pci: altera: Fix bool initialization in tlp_read_packet() (bsc#1051510). - pci: dwc: Fix enumeration end when reaching root subordinate (bsc#1100132). - pci: endpoint: Fix kernel panic after put_device() (bsc#1051510). - pci: endpoint: Populate func_no before calling pci_epc_add_epf() (bsc#1051510). - pci: exynos: Fix a potential init_clk_resources NULL pointer dereference (bsc#1051510). - pci: faraday: Fix of_irq_get() error check (bsc#1051510). - pci: ibmphp: Fix use-before-set in get_max_bus_speed() (bsc#1051510). - pci: pciehp: Assume NoCompl+ for Thunderbolt ports (bsc#1051510). - pci: pciehp: Request control of native hotplug only if supported (bsc#1051510). - pci: Prevent sysfs disable of device while driver is attached (bsc#1051510). - pci: shpchp: Fix AMD POGO identification (bsc#1051510). - perf intel-pt: Always set no branch for dummy event (bsc#1087217). - perf intel-pt: Set no_aux_samples for the tracking event (bsc#1087217). - perf/x86: Fix data source decoding for Skylake (). - perf/x86/intel/uncore: Add event constraint for BDX PCU (bsc#1087202). - perf/x86/intel/uncore: Fix missing marker for skx_uncore_cha_extra_regs (bsc#1087233). - perf/x86/intel/uncore: Fix SKX CHA event extra regs (bsc#1087233). - perf/x86/intel/uncore: Fix Skylake server CHA LLC_LOOKUP event umask (bsc#1087233). - perf/x86/intel/uncore: Fix Skylake server PCU PMU event format (bsc#1087233). - perf/x86/intel/uncore: Fix Skylake UPI PMU event masks (bsc#1087233). - perf/x86/intel/uncore: Remove invalid Skylake server CHA filter field (bsc#1087233). - phy: add sgmii and 10gkr modes to the phy_mode enum (bsc#1098633). - pinctrl: at91-pio4: add missing of_node_put (bsc#1051510). - pinctrl: bcm2835: Avoid warning from __irq_do_set_handler (bsc#1051510). - pinctrl: imx: fix debug message for SHARE_MUX_CONF_REG case (bsc#1051510). - pinctrl: intel: Initialize GPIO properly when used through irqchip (bsc#1087092). - pinctrl: intel: Read back TX buffer state (bsc#1051510). - pinctrl: meson-gxbb: remove non-existing pin GPIOX_22 (bsc#1051510). - pinctrl: meson-gxl: Fix typo in AO I2S pins (bsc#1051510). - pinctrl: meson-gxl: Fix typo in AO SPDIF pins (bsc#1051510). - pinctrl: mvebu: use correct MPP sel value for dev pins (bsc#1051510). - pinctrl: nand: meson-gxbb: fix missing data pins (bsc#1051510). - pinctrl: nsp: Fix potential NULL dereference (bsc#1051510). - pinctrl: nsp: off by ones in nsp_pinmux_enable() (bsc#1100132). - pinctrl: pinctrl-single: Fix pcs_request_gpio() when bits_per_mux != 0 (bsc#1051510). - pinctrl: sh-pfc: r8a7790: Add missing TX_ER pin to avb_mii group (bsc#1051510). - pinctrl: sh-pfc: r8a7795: Fix MOD_SEL register pin assignment for SSI pins group (bsc#1051510). - pinctrl: sh-pfc: r8a7795: Fix to delete A20..A25 pins function definitions (bsc#1051510). - pinctrl: sh-pfc: r8a7796: Fix IPSR and MOD_SEL register pin assignment for NDFC pins group (bsc#1051510). - pinctrl: sh-pfc: r8a7796: Fix to delete A20..A25 pins function definitions (bsc#1051510). - pinctrl: sh-pfc: r8a7796: Fix to delete FSCLKST pin and IPSR7 bit[15:12] register definitions (bsc#1051510). - pinctrl: sunxi: fix V3s pinctrl driver IRQ bank base (bsc#1051510). - pinctrl: sunxi: fix wrong irq_banks number for H5 pinctrl (bsc#1051510). - pinctrl: uniphier: fix members of rmii group for Pro4 (bsc#1051510). - pinctrl: uniphier: fix pin_config_get() for input-enable (bsc#1051510). - pm / core: Fix supplier device runtime PM usage counter imbalance (bsc#1051510). - pm / hibernate: Fix oops at snapshot_write() (bsc#1051510). - pm / hibernate: Use CONFIG_HAVE_SET_MEMORY for include condition (bsc#1051510). - pm / wakeup: Only update last time for active wakeup sources (bsc#1051510). - power: gemini-poweroff: Avoid spurious poweroff (bsc#1051510). - powerpc/64: Fix smp_wmb barrier definition use use lwsync consistently (bnc#1012382). - powerpc/64s: Clear PCR on boot (bnc#1012382). - powerpc/64s: Fix section mismatch warnings from setup_rfi_flush() (bsc#1068032, bsc#1075087, bsc#1091041). - powerpc: Add missing prototype for arch_irq_work_raise() (bnc#1012382). - powerpc/eeh: Fix enabling bridge MMIO windows (bnc#1012382). - powerpc/fadump: Unregister fadump on kexec down path (bnc#1012382). - powerpc/mm/hash: Add missing isync prior to kernel stack SLB switch (bnc#1012382). - powerpc/mpic: Check if cpu_possible() in mpic_physmask() (bnc#1012382). - powerpc/powernv: define a standard delay for OPAL_BUSY type retry loops (bnc#1012382). - powerpc/powernv: Fix NVRAM sleep in invalid context when crashing (bnc#1012382). - powerpc/powernv: Fix OPAL NVRAM driver OPAL_BUSY loops (bnc#1012382). - powerpc/powernv: Handle unknown OPAL errors in opal_nvram_write() (bnc#1012382). - powerpc/ptrace: Fix setting 512B aligned breakpoints with PTRACE_SET_DEBUGREG (bnc#1012382). - power: supply: act8945a_charger: fix of_irq_get() error check (bsc#1051510). - power: supply: cpcap-charger: add OMAP_USB2 dependency (bsc#1051510). - pwm: meson: Fix allocation of PWM channel array (bsc#1051510). - pwm: meson: Improve PWM calculation precision (bsc#1051510). - pwm: stm32: Enforce dependency on CONFIG_MFD_STM32_TIMERS (bsc#1051510). - pwm: stm32: Remove unused struct device (bsc#1051510). - pwm: tiehrpwm: fix clock imbalance in probe error path (bsc#1051510). - pwm: tiehrpwm: Fix runtime PM imbalance at unbind (bsc#1051510). - qed: Adapter flash update support (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Add APIs for flash access (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Add configuration information to register dump and debug data (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Add driver infrastucture for handling mfw requests (bsc#1086314 bsc#1086313 bsc#1086301 ). - qed: Add MFW interfaces for TLV request support (bsc#1086314 bsc#1086313 bsc#1086301). - qed* : Add new TLV to request PF to update MAC in bulletin board (bsc#1086314 bsc#1086313 bsc#1086301 ). - qed: Add sanity check for SIMD fastpath handler (bsc#1050536 ). - qed: Add support for multi function mode with 802.1ad tagging (bsc#1086314 bsc#1086313 bsc#1086301 ). - qed: Add support for processing fcoe tlv request (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Add support for processing iscsi tlv request (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Add support for tlv request processing (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Add support for Unified Fabric Port (bsc#1086314 bsc#1086313 bsc#1086301). - qed*: Advance drivers' version to 8.33.0.20 (bsc#1086314 ). - qed: code indent should use tabs where possible (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Correct Multicast API to reflect existence of 256 approximate buckets (bsc#1050536). - qed: Delete unused parameter p_ptt from mcp APIs (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Do not advertise DCBX_LLD_MANAGED capability (bsc#1050536 ). - qede: Add build_skb() support (bsc#1086314 bsc#1086313 bsc#1086301). - qede: Add support for populating ethernet TLVs (bsc#1086314 bsc#1086313 bsc#1086301). - qede: Adverstise software timestamp caps when PHC is not available (bsc#1050538). - qede: Do not drop rx-checksum invalidated packets (bsc#1086314 bsc#1086313 bsc#1086301). - qede: Ethtool flash update support (bsc#1086314 bsc#1086313 bsc#1086301). - qede: Fix barrier usage after tx doorbell write (bsc#1086314 bsc#1086313 bsc#1086301). - qede: Fix ref-cnt usage count (bsc#1086314 bsc#1086313 bsc#1086301). - qede: fix spelling mistake: 'registeration' -> 'registration' (bsc#1086314 bsc#1086313 bsc#1086301 ). - qede: Refactor ethtool rx classification flow (bsc#1086314 bsc#1086313 bsc#1086301). - qede: Support flow classification to the VFs (bsc#1086314 bsc#1086313 bsc#1086301). - qede: Use NETIF_F_GRO_HW (bsc#1086314 bsc#1086313 bsc#1086301). - qede: Validate unsupported configurations (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Fix copying 2 strings (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Fix link flap issue due to mismatching EEE capabilities (bsc#1050536). - qed: Fix LL2 race during connection terminate (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Fix mask for physical address in ILT entry (networking-stable-18_06_08). - qed: Fix possibility of list corruption during rmmod flows (bsc#1086314 bsc#1086313 bsc#1086301 ). - qed: Fix possible memory leak in Rx error path handling (bsc#1050536). - qed: Fix possible race for the link state value (bsc#1050536 ). - qed: Fix potential use-after-free in qed_spq_post() (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Fix PTT entry leak in the selftest error flow (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Fix reading stale configuration information (bsc#1086314 ). - qed: Fix setting of incorrect eswitch mode (bsc#1050536 ). - qed: Fix shared memory inconsistency between driver and the MFW (bsc#1086314 bsc#1086313 bsc#1086301 ). - qed: fix spelling mistake: 'checksumed' -> 'checksummed' (bsc#1086314 bsc#1086313 bsc#1086301 ). - qed: fix spelling mistake: 'offloded' -> 'offloaded' (bsc#1086314 bsc#1086313 bsc#1086301 ). - qed: fix spelling mistake: 'taskelt' -> 'tasklet' (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Fix use of incorrect shmem address (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Fix use of incorrect size in memcpy call (bsc#1050536 ). - qed: Free reserved MR tid (bsc#1086314 bsc#1086313 bsc#1086301). - qed*: HSI renaming for different types of HW (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Limit msix vectors in kdump kernel to the minimum required count (bsc#1050536). - qed: LL2 flush isles when connection is closed (bsc#1086314 bsc#1086313 bsc#1086301). - qed: off by one in qed_parse_mcp_trace_buf() (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Populate nvm image attribute shadow (bsc#1086314 bsc#1086313 bsc#1086301). - qed*: Refactoring and rearranging FW API with no functional impact (bsc#1086314 bsc#1086313 bsc#1086301). - qed*: Refactor mf_mode to consist of bits (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Remove reserveration of dpi for kernel (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Remove unused data member 'is_mf_default' (bsc#1086314 bsc#1086313 bsc#1086301). - qedr: Fix spelling mistake: 'hanlde' -> 'handle' (bsc#1086314 bsc#1086313 bsc#1086301). - qed*: Support drop action classification (bsc#1086314 bsc#1086313 bsc#1086301). - qed*: Support other classification modes (bsc#1086314 bsc#1086313 bsc#1086301). - qed: use kzalloc instead of kmalloc and memset (bsc#1086314 bsc#1086313 bsc#1086301). - qed: Use true and false for boolean values (bsc#1086314 bsc#1086313 bsc#1086301). - qed* : use trust mode to allow VF to override forced MAC (bsc#1086314 bsc#1086313 bsc#1086301 ). - qed: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301 ). - qed*: Utilize FW 8.33.1.0 (bsc#1086314 bsc#1086313 bsc#1086301). - qed*: Utilize FW 8.33.11.0 (bsc#1086314 bsc#1086313 bsc#1086301). - qlogic: check kstrtoul() for errors (bsc#1050540). - qlogic/qed: Constify *pkt_type_str (bsc#1086314 bsc#1086313 bsc#1086301). - qmi_wwan: add support for Quectel EG91 (bsc#1051510). - qmi_wwan: add support for the Dell Wireless 5821e module (bsc#1051510). - qmi_wwan: fix interface number for DW5821e production firmware (bsc#1051510). - qmi_wwan: set FLAG_SEND_ZLP to avoid network initiated disconnect (bsc#1051510). - r8152: fix tx packets accounting (bsc#1051510). - r8152: napi hangup fix after disconnect (bsc#1051510). - r8169: Be drop monitor friendly (bsc#1051510). - rbd: flush rbd_dev->watch_dwork after watch is unregistered (bsc#1103216). - rdma/cma: Do not query GID during QP state transition to RTR (bsc#1046306). - rdma/cma: Fix use after destroy access to net namespace for IPoIB (bsc#1046306). - rdma/cxgb4: release hw resources on device removal (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - rdma/cxgb4: Use structs to describe the uABI instead of opencoding (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - rdma/i40iw: Avoid panic when objects are being created and destroyed (bsc#1058659). - rdma/i40iw: Avoid reference leaks when processing the AEQ (bsc#1058659). - rdma/ipoib: Update paths on CLIENT_REREG/SM_CHANGE events (bsc#1046307). - rdma/iwpm: fix memory leak on map_info (bsc#1046306 ). - rdma/mlx4: Discard unknown SQP work requests (bsc#1046302 ). - rdma/mlx5: Do not assume that medium blueFlame register exists (bsc#1046305). - rdma/mlx5: Fix memory leak in mlx5_ib_create_srq() error path (bsc#1046305). - rdma/mlx5: Fix multiple NULL-ptr deref errors in rereg_mr flow (bsc#1046305). - rdma/mlx5: Fix NULL dereference while accessing XRC_TGT QPs (bsc#1046305). - rdma/mlx5: Protect from shift operand overflow (bsc#1046305 ). - rdma/mlx5: Use proper spec flow label type (bsc#1046305 ). - rdma/qedr: Annotate iomem pointers correctly (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: Declare local functions static (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: eliminate duplicate barriers on weakly-ordered archs (bsc#1086314 bsc#1086313 bsc#1086301 ). - rdma/qedr: Fix doorbell bar mapping for dpi > 1 (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: Fix endian problems around imm_data (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: Fix ipv6 destination address resolution (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: Fix iWARP connect with port mapper (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: Fix iWARP write and send with immediate (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: Fix kernel panic when running fio over NFSoRDMA (bsc#1086314 bsc#1086313 bsc#1086301 ). - rdma/qedr: Fix wmb usage in qedr (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: lower print level of flushed CQEs (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: Remove set-but-not-used variables (bsc#1086314 bsc#1086313 bsc#1086301). - rdma/qedr: Use NULL instead of 0 to represent a pointer (bsc#1086314 bsc#1086313 bsc#1086301 ). - rdma/qedr: Use zeroing memory allocator than allocator/memset (bsc#1086314 bsc#1086313 bsc#1086301 ). - rdma/qedr: Zero stack memory before copying to user space (bsc#1086314 bsc#1086313 bsc#1086301 ). - rdma/ucma: Do not allow setting RDMA_OPTION_IB_PATH without an RDMA device (bsc#1046306). - rdma/ucma: ucma_context reference leak in error path (bsc#1046306). - rdma/uverbs: Protect from attempts to create flows on unsupported QP (bsc#1046306). - rdma/uverbs: Use an unambiguous errno for method not supported (bsc#1046306). - regulator: max8998: Fix platform data retrieval (bsc#1051510). - regulator: pfuze100: add .is_enable() for pfuze100_swb_regulator_ops (bsc#1051510). - regulator: qcom_spmi: Include offset when translating voltages (bsc#1051510). - regulator: tps65218: Fix strobe assignment (bsc#1051510). - Revert 'drm/nouveau/drm/therm/fan: add a fallback if no fan control is specified in the vbios' (bsc#1103356). - Revert 'nvme: mark nvme_queue_scan static' (bsc#1054245). - Revert 'nvmet: constify struct nvmet_fabrics_ops' (bsc#1054245). - Revert 'xhci: plat: Register shutdown for xhci_plat' (bsc#1090888). - rpm/kernel-source.spec.in: Add more stuff to Recommends ... and move bc to Recommends as well. All these packages are needed for building a kernel manually from scratch with kernel-source files. - rpm/kernel-source.spec.in: require bc for kernel-source This is needed for building include/generated/timeconst.h from kernel/time/timeconst.bc. - rtc: ac100: Fix ac100 determine rate bug (bsc#1051510). - rtc: pxa: fix probe function (bsc#1051510). - rtlwifi: Fix kernel Oops 'Fw download fail!!' (bsc#1051510). - rtlwifi: rtl8821ae: fix firmware is not ready to run (bsc#1051510). - rtnetlink: validate attributes in do_setlink() (networking-stable-18_06_08). - s390: add assembler macros for CPU alternatives (git-fixes f19fbd5ed6). - s390/cio: clear timer when terminating driver I/O (bsc#1103421). - s390/cio: fix return code after missing interrupt (bsc#1103421). - s390: correct module section names for expoline code revert (git-fixes f19fbd5ed6). - s390: Correct register corruption in critical section cleanup (git-fixes 6dd85fbb87). - s390/crc32-vx: use expoline for indirect branches (git-fixes f19fbd5ed6). - s390/dasd: fix handling of internal requests (bsc#1103421). - s390/dasd: fix wrongly assigned configuration data (bsc#1103421). - s390/dasd: prevent prefix I/O error (bsc#1103421). - s390/eadm: fix CONFIG_BLOCK include dependency (bsc#1103421). - s390: extend expoline to BC instructions (git-fixes, bsc#1103421). - s390/ftrace: use expoline for indirect branches (git-fixes f19fbd5ed6). - s390/gs: add compat regset for the guarded storage broadcast control block (git-fixes e525f8a6e696). - s390/ipl: ensure loadparm valid flag is set (bsc#1103421). - s390/kernel: use expoline for indirect branches (git-fixes f19fbd5ed6). - s390/lib: use expoline for indirect branches (git-fixes f19fbd5ed6). - s390: move expoline assembler macros to a header (git-fixes f19fbd5ed6). - s390: move spectre sysfs attribute code (bsc#1090098). - s390: optimize memset implementation (git-fixes f19fbd5ed6). - s390/pci: do not require AIS facility (bsc#1103421). - s390/qdio: do not release memory in qdio_setup_irq() (bsc#1103421). - s390/qdio: do not retry EQBS after CCQ 96 (bsc#1102088, LTC#169699). - s390/qeth: fix error handling in adapter command callbacks (bsc#1102088, LTC#169699). - s390/qeth: fix race when setting MAC address (bnc#1093148, LTC#167307). - s390: remove indirect branch from do_softirq_own_stack (git-fixes f19fbd5ed6). - s390: use expoline thunks in the BPF JIT (git-fixes, bsc#1103421). - sched/core: Optimize ttwu_stat() (bnc#1101669 optimise numa balancing for fast migrate). - sched/core: Optimize update_stats_*() (bnc#1101669 optimise numa balancing for fast migrate). - scripts/dtc: fix '%zx' warning (bsc#1051510). - scripts/gdb/linux/tasks.py: fix get_thread_info (bsc#1051510). - scripts/git_sort/git_sort.py: add modules-next tree - scripts/git_sort/git_sort.py: Add 'nvme-4.18' to the list of repositories - scripts/kernel-doc: Do not fail with status != 0 if error encountered with -none (bsc#1051510). - scsi: aacraid: Correct hba_send to include iu_type (bsc#1077989). - scsi: core: clean up generated file scsi_devinfo_tbl.c (bsc#1077989). - scsi: cxgb4i: silence overflow warning in t4_uld_rx_handler() (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - scsi: megaraid_sas: Do not log an error if FW successfully initializes (bsc#1077989). - scsi: qla2xxx: Fix inconsistent DMA mem alloc/free (bsc#1077989). - scsi: qla2xxx: Fix kernel crash due to late workqueue allocation (bsc#1077338). - scsi: zfcp: fix infinite iteration on ERP ready list (bsc#1102088, LTC#169699). - scsi: zfcp: fix misleading REC trigger trace where erp_action setup failed (bsc#1102088, LTC#169699). - scsi: zfcp: fix missing REC trigger trace for all objects in ERP_FAILED (bsc#1102088, LTC#169699). - scsi: zfcp: fix missing REC trigger trace on enqueue without ERP thread (bsc#1102088, LTC#169699). - scsi: zfcp: fix missing REC trigger trace on terminate_rport_io early return (bsc#1102088, LTC#169699). - scsi: zfcp: fix missing REC trigger trace on terminate_rport_io for ERP_FAILED (bsc#1102088, LTC#169699). - scsi: zfcp: fix missing SCSI trace for result of eh_host_reset_handler (bsc#1102088, LTC#169699). - scsi: zfcp: fix missing SCSI trace for retry of abort / scsi_eh TMF (bsc#1102088, LTC#169699). - sctp: not allow transport timeout value less than HZ/5 for hb_timer (networking-stable-18_06_08). - serial: earlycon: Only try fdt when specify 'earlycon' exactly (bsc#1051510). - serial: imx: drop if that always evaluates to true (bsc#1051510). - serial: pxa: Fix out-of-bounds access through serial port index (bsc#1051510). - serial: sh-sci: Update warning message in sci_request_dma_chan() (bsc#1051510). - serial: sh-sci: Use spin_{try}lock_irqsave instead of open coding version (bsc#1051510). - serial: sirf: Fix out-of-bounds access through DT alias (bsc#1051510). - sfc: stop the TX queue before pushing new buffers (bsc#1058169 ). - smsc75xx: Add workaround for gigabit link up hardware errata (bsc#1051510). - smsc75xx: fix smsc75xx_set_features() (bsc#1051510). - smsc95xx: Configure pause time to 0xffff when tx flow control enabled (bsc#1051510). - soc: bcm2835: Make !RASPBERRYPI_FIRMWARE dummies return failure (bsc#1051510). - soc: bcm: raspberrypi-power: Fix use of __packed (bsc#1051510). - soc: imx: gpc: de-register power domains only if initialized (bsc#1051510). - soc: imx: gpc: restrict register range for regmap access (bsc#1051510). - soc: imx: gpcv2: correct PGC offset (bsc#1051510). - soc: imx: gpcv2: Do not pass static memory as platform data (bsc#1051510). - soc: imx: gpcv2: fix regulator deferred probe (bsc#1051510). - socket: close race condition between sock_close() and sockfs_setattr() (networking-stable-18_06_20). - soc: mediatek: pwrap: fix compiler errors (bsc#1051510). - soc: qcom: wcnss_ctrl: Fix increment in NV upload (bsc#1051510). - soc: rockchip: power-domain: Fix wrong value when power up pd with writemask (bsc#1051510). - soc/tegra: Fix bad of_node_put() in powergate init (bsc#1051510). - soc/tegra: flowctrl: Fix error handling (bsc#1051510). - soc: ti: ti_sci_pm_domains: Populate name for genpd (bsc#1051510). - soc: zte: Restrict SOC_ZTE to ARCH_ZX or COMPILE_TEST (bsc#1051510). - spi: bcm2835aux: ensure interrupts are enabled for shared handler (bsc#1051510). - spi/bcm63xx-hspi: Enable the clock before calling clk_get_rate() (bsc#1051510). - spi: bcm-qspi: Always read and set BSPI_MAST_N_BOOT_CTRL (bsc#1051510). - spi: bcm-qspi: Avoid setting MSPI_CDRAM_PCS for spi-nor master (bsc#1051510). - spi: bcm-qspi: fIX some error handling paths (bsc#1051510). - spi: cadence: Add usleep_range() for cdns_spi_fill_tx_fifo() (bsc#1051510). - spi: core: Fix devm_spi_register_master() function name in kerneldoc (bsc#1051510). - spi: pxa2xx: Allow 64-bit DMA (bsc#1051510). - spi: pxa2xx: check clk_prepare_enable() return value (bsc#1051510). - spi: pxa2xx: Do not touch CS pin until we have a transfer pending (bsc#1051510). - spi: sh-msiof: Fix bit field overflow writes to TSCR/RSCR (bsc#1051510). - staging: comedi: quatech_daqp_cs: fix no-op loop daqp_ao_insn_write() (bsc#1051510). - staging: fbtft: array underflow in fbtft_request_gpios_match() (bsc#1051510). - staging: iio: ade7759: fix signed extension bug on shift of a u8 (bsc#1051510). - staging:iio:ade7854: Fix error handling on read/write (bsc#1051510). - staging:iio:ade7854: Fix the wrong number of bits to read (bsc#1051510). - staging: rtl8723bs: add missing range check on id (bsc#1051510). - staging: rtl8723bs: fix u8 less than zero check (bsc#1051510). - staging: rtl8723bs: Prevent an underflow in rtw_check_beacon_data() (bsc#1051510). - staging: rts5208: Fix 'seg_no' calculation in reset_ms_card() (bsc#1051510). - staging: sm750fb: Fix parameter mistake in poke32 (bsc#1051510). - tcp: verify the checksum of the first data segment in a new connection (networking-stable-18_06_20). - team: use netdev_features_t instead of u32 (networking-stable-18_06_08). - thermal: bcm2835: fix an error code in probe() (bsc#1051510). - thermal/drivers/hisi: Fix kernel panic on alarm interrupt (bsc#1051510). - thermal/drivers/hisi: Fix missing interrupt enablement (bsc#1051510). - thermal/drivers/hisi: Fix multiple alarm interrupts firing (bsc#1051510). - thermal/drivers/hisi: Simplify the temperature/step computation (bsc#1051510). - thermal: exynos: fix setting rising_threshold for Exynos5433 (bsc#1051510). - thermal: fix INTEL_SOC_DTS_IOSF_CORE dependencies (bsc#1051510). - timekeeping: Use proper timekeeper for debug code (bsc#1051510). - time: Make sure jiffies_to_msecs() preserves non-zero time periods (bsc#1051510). - tools/libbpf: handle issues with bpf ELF objects containing .eh_frames (bsc#1051510). - tools/lib/lockdep: Define the ARRAY_SIZE() macro (bsc#1051510). - tools/lib/lockdep: Fix undefined symbol prandom_u32 (bsc#1051510). - tools lib traceevent: Fix get_field_str() for dynamic strings (bsc#1051510). - tools lib traceevent: Simplify pointer print logic and fix %pF (bsc#1051510). - tools/power turbostat: Correct SNB_C1/C3_AUTO_UNDEMOTE defines (bsc#1051510). - tools/thermal: tmon: fix for segfault (bsc#1051510). - tools/usbip: fixes build with musl libc toolchain (bsc#1051510). - tty: Fix data race in tty_insert_flip_string_fixed_flag (bsc#1051510). - ubi: fastmap: Correctly handle interrupted erasures in EBA (bsc#1051510). - ubifs: Fix data node size for truncating uncompressed nodes (bsc#1051510). - ubifs: Fix potential integer overflow in allocation (bsc#1051510). - ubifs: Fix uninitialized variable in search_dh_cookie() (bsc#1051510). - ubifs: Fix unlink code wrt. double hash lookups (bsc#1051510). - udp: fix rx queue len reported by diag and proc interface (networking-stable-18_06_20). - Update config files: enable CONFIG_I2C_PXA for arm64 (bsc#1101465) - usb: audio-v2: Correct the comment for struct uac_clock_selector_descriptor (bsc#1051510). - usb: cdc_acm: Add quirk for Castles VEGA3000 (bsc#1051510). - usb: cdc_acm: Add quirk for Uniden UBC125 scanner (bsc#1051510). - usb: cdc_acm: prevent race at write to acm while system resumes (bsc#1087092). - usb: core: handle hub C_PORT_OVER_CURRENT condition (bsc#1051510). - usb: do not reset if a low-speed or full-speed device timed out (bsc#1051510). - usb: dwc2: debugfs: Do not touch RX FIFO during register dump (bsc#1051510). - usb: dwc2: Fix DMA alignment to start at allocated boundary (bsc#1051510). - usb: dwc2: Fix dwc2_hsotg_core_init_disconnected() (bsc#1051510). - usb: dwc2: fix the incorrect bitmaps for the ports of multi_tt hub (bsc#1051510). - usb: dwc2: hcd: Fix host channel halt flow (bsc#1051510). - usb: dwc2: host: Fix transaction errors in host mode (bsc#1051510). - usb: dwc2: Improve gadget state disconnection handling (bsc#1085539). - usb: dwc3: Add SoftReset PHY synchonization delay (bsc#1051510). - usb: dwc3: ep0: Reset TRB counter for ep0 IN (bsc#1051510). - usb: dwc3: Fix GDBGFIFOSPACE_TYPE values (bsc#1051510). - usb: dwc3: gadget: Fix list_del corruption in dwc3_ep_dequeue (bsc#1051510). - usb: dwc3: gadget: Set maxpacket size for ep0 IN (bsc#1051510). - usb: dwc3: Makefile: fix link error on randconfig (bsc#1051510). - usb: dwc3: of-simple: fix use-after-free on remove (bsc#1051510). - usb: dwc3: omap: do not miss events during suspend/resume (bsc#1051510). - usb: dwc3: pci: Properly cleanup resource (bsc#1051510). - usb: dwc3: prevent setting PRTCAP to OTG from debugfs (bsc#1051510). - usb: dwc3: Undo PHY init if soft reset fails (bsc#1051510). - usb: dwc3: Update DWC_usb31 GTXFIFOSIZ reg fields (bsc#1051510). - usb: gadget: bdc: 64-bit pointer capability check (bsc#1051510). - usb: gadget: composite: fix incorrect handling of OS desc requests (bsc#1051510). - usb: gadget: core: Fix use-after-free of usb_request (bsc#1051510). - usb: gadget: dummy: fix nonsensical comparisons (bsc#1051510). - usb: gadget: ffs: Execute copy_to_user() with USER_DS set (bsc#1051510). - usb: gadget: f_fs: Fix use-after-free in ffs_fs_kill_sb() (bsc#1051510). - usb: gadget: ffs: Let setup() return USB_GADGET_DELAYED_STATUS (bsc#1051510). - usb: gadget: f_fs: Only return delayed status when len is 0 (bsc#1051510). - usb: gadget: f_fs: Process all descriptors during bind (bsc#1051510). - usb: gadget: f_fs: Use config_ep_by_speed() (bsc#1051510). - usb/gadget: Fix 'high bandwidth' check in usb_gadget_ep_match_desc() (bsc#1051510). - usb: gadget: f_mass_storage: Fix the logic to iterate all common->luns (bsc#1051510). - usb: gadget: f_midi: fixing a possible double-free in f_midi (bsc#1051510). - usb: gadget: fsl_udc_core: fix ep valid checks (bsc#1051510). - usb: gadget: f_uac2: fix bFirstInterface in composite gadget (bsc#1051510). - usb: gadget: f_uac2: fix endianness of 'struct cntrl_*_lay3' (bsc#1051510). - usb: gadget: f_uac2: fix error handling in afunc_bind (again) (bsc#1051510). - usb: gadget: udc: Add missing platform_device_put() on error in bdc_pci_probe() (bsc#1051510). - usb: gadget: udc: change comparison to bitshift when dealing with a mask (bsc#1051510). - usb: gadget: udc: core: update usb_ep_queue() documentation (bsc#1051510). - usb: gadget: udc: renesas_usb3: disable the controller's irqs for reconnecting (bsc#1051510). - usb: host: ehci: use correct device pointer for dma ops (bsc#1087092). - usb: host: xhci-plat: revert 'usb: host: xhci-plat: enable clk in resume timing' (bsc#1051510). - usb: hub: Do not wait for connect state at resume for powered-off ports (bsc#1051510). - usb: Increment wakeup count on remote wakeup (bsc#1051510). - usbip: Correct maximum value of CONFIG_USBIP_VHCI_HC_PORTS (bsc#1051510). - usbip: usbip_detach: Fix memory, udev context and udev leak (bsc#1051510). - usbip: usbip_event: fix to not print kernel pointer address (bsc#1051510). - usbip: usbip_host: refine probe and disconnect debug msgs to be useful (bsc#1051510). - usbip: vhci_hcd: Fix usb device and sockfd leaks (bsc#1051510). - usbip: vhci_sysfs: fix potential Spectre v1 (bsc#1051510). - usb: ldusb: add PIDs for new CASSY devices supported by this driver (bsc#1051510). - usb: musb: call pm_runtime_{get,put}_sync before reading vbus registers (bsc#1051510). - usb: musb: fix enumeration after resume (bsc#1051510). - usb: musb: Fix external abort in musb_remove on omap2430 (bsc#1051510). - usb: musb: fix remote wakeup racing with suspend (bsc#1051510). - usb: musb: gadget: misplaced out of bounds check (bsc#1051510). - usb: musb: host: fix potential NULL pointer dereference (bsc#1051510). - usb: musb: trace: fix NULL pointer dereference in musb_g_tx() (bsc#1051510). - usb: OHCI: Fix NULL dereference in HCDs using HCD_LOCAL_MEM (bsc#1087092). - usb: option: Add support for FS040U modem (bsc#1087092). - usb: quirks: add delay quirks for Corsair Strafe (bsc#1051510). - usb: serial: ch341: fix type promotion bug in ch341_control_in() (bsc#1051510). - usb: serial: cp210x: add another USB ID for Qivicon ZigBee stick (bsc#1051510). - usb: serial: cp210x: add CESINEL device ids (bsc#1051510). - usb: serial: cp210x: add ELDAT Easywave RX09 id (bsc#1051510). - usb: serial: cp210x: add ID for NI USB serial console (bsc#1051510). - usb: serial: cp210x: add Silicon Labs IDs for Windows Update (bsc#1051510). - usb: serial: ftdi_sio: add RT Systems VX-8 cable (bsc#1051510). - usb: serial: ftdi_sio: add support for Harman FirmwareHubEmulator (bsc#1051510). - usb: serial: ftdi_sio: use jtag quirk for Arrow USB Blaster (bsc#1051510). - usb: serial: keyspan_pda: fix modem-status error handling (bsc#1100132). - usb: serial: mos7840: fix status-register error handling (bsc#1051510). - usb: serial: option: adding support for ublox R410M (bsc#1051510). - usb: serial: option: Add support for Quectel EP06 (bsc#1051510). - usb: serial: option: reimplement interface masking (bsc#1051510). - usb: serial: simple: add libtransistor console (bsc#1051510). - usb: serial: visor: handle potential invalid device configuration (bsc#1051510). - usb-storage: Add compatibility quirk flags for G-Technologies G-Drive (bsc#1051510). - usb-storage: Add support for FL_ALWAYS_SYNC flag in the UAS driver (bsc#1051510). - usb: yurex: fix out-of-bounds uaccess in read handler (bsc#1100132). - vfio/pci: Fix potential Spectre v1 (bsc#1051510). - vfio/spapr: Use IOMMU pageshift rather than pagesize (bsc#1077761, git-fixes). - vhost: synchronize IOTLB message with dev cleanup (networking-stable-18_06_08). - video/omap: add module license tags (bsc#1090888). - video: remove unused kconfig SH_LCD_MIPI_DSI (bsc#1087092). - virtio_balloon: fix another race between migration and ballooning (bsc#1051510). - virtio-net: correctly transmit XDP buff after linearizing (networking-stable-18_06_08). - virtio_net: Disable interrupts if napi_complete_done rescheduled napi (bsc#1051510). - virtio-net: fix leaking page for gso packet during mergeable XDP (networking-stable-18_06_08). - virtio-net: fix module unloading (bsc#1051510). - virtio-net: Fix operstate for virtio when no VIRTIO_NET_F_STATUS (bsc#1051510). - virtio_net: fix XDP code path in receive_small() (bsc#1051510). - vmcore: add API to collect hardware dump in second kernel (bsc#1097585 bsc#1097586 bsc#1097587 bsc#1097588 bsc#1097583 bsc#1097584). - vrf: check the original netdevice for generating redirect (networking-stable-18_06_08). - wlcore: add missing nvs file name info for wilink8 (bsc#1051510). - wlcore: sdio: check for valid platform device data before suspend (bsc#1051510). - x.509: unpack RSA signatureValue field from BIT STRING (bsc#1051510). - x86/efi: Access EFI MMIO data as unencrypted when SEV is active (bsc#1099193). - xen/grant-table: log the lack of grants (bnc#1085042). - xhci: Fix kernel oops in trace_xhci_free_virt_device (bsc#1100132). - xhci: Fix USB3 NULL pointer dereference at logical disconnect (bsc#1090888). - xhci: Fix use-after-free in xhci_free_virt_device (bsc#1100132). - xhci: xhci-mem: off by one in xhci_stream_id_to_ring() (bsc#1100132)." ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1012382" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1037697" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046299" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046300" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046302" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046303" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046305" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046306" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046307" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046533" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1046543" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1050242" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1050536" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1050538" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1050540" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1051510" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1054245" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056651" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1056787" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1058169" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1058659" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1060463" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1066110" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1068032" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1075087" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1075360" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1077338" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1077761" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1077989" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1085042" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1085536" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1085539" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1086301" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1086313" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1086314" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1086324" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1086457" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1087092" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1087202" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1087217" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1087233" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1090098" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1090888" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1091041" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1091171" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1093148" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1093666" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1094119" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1096330" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1097583" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1097584" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1097585" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1097586" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1097587" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1097588" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1098633" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1099193" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1100132" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1100884" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101143" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101337" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101352" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101465" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101564" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101669" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101674" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101789" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101813" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1101816" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1102088" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1102097" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1102147" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1102340" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1102512" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1102851" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103216" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103220" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103230" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103356" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103421" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103517" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103723" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103724" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103725" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103726" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103727" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103728" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103729" ); script_set_attribute( attribute:"see_also", value:"https://bugzilla.opensuse.org/show_bug.cgi?id=1103730" ); script_set_attribute( attribute:"solution", value:"Update the affected the Linux Kernel packages." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss_temporal_vector("CVSS2#E:F/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:F/RL:O/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-debug"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-debug-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-debug-base-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-debug-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-debug-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-debug-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-debug-devel-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-default"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-default-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-default-base-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-default-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-default-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-default-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-default-devel-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-docs-html"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-kvmsmall"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-kvmsmall-base-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-kvmsmall-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-kvmsmall-devel-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-macros"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-obs-build"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-obs-build-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-obs-qa"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-source"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-source-vanilla"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-syms"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-vanilla"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-vanilla-base"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-vanilla-base-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-vanilla-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-vanilla-debugsource"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-vanilla-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:novell:opensuse:kernel-vanilla-devel-debuginfo"); script_set_attribute(attribute:"cpe", value:"cpe:/o:novell:opensuse:15.0"); script_set_attribute(attribute:"patch_publication_date", value:"2018/08/07"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/08/08"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"SuSE Local Security Checks"); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/SuSE/release", "Host/SuSE/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/SuSE/release"); if (isnull(release) || release =~ "^(SLED|SLES)") audit(AUDIT_OS_NOT, "openSUSE"); if (release !~ "^(SUSE15\.0)$") audit(AUDIT_OS_RELEASE_NOT, "openSUSE", "15.0", release); if (!get_kb_item("Host/SuSE/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); ourarch = get_kb_item("Host/cpu"); if (!ourarch) audit(AUDIT_UNKNOWN_ARCH); if (ourarch !~ "^(x86_64)$") audit(AUDIT_ARCH_NOT, "x86_64", ourarch); flag = 0; if ( rpm_check(release:"SUSE15.0", reference:"kernel-debug-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-debug-base-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-debug-base-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-debug-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-debug-debugsource-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-debug-devel-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-debug-devel-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-default-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-default-base-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-default-base-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-default-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-default-debugsource-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-default-devel-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-default-devel-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-devel-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-docs-html-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-kvmsmall-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-kvmsmall-base-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-kvmsmall-base-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-kvmsmall-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-kvmsmall-debugsource-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-kvmsmall-devel-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-kvmsmall-devel-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-macros-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-obs-build-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-obs-build-debugsource-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-obs-qa-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-source-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-source-vanilla-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-syms-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-vanilla-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-vanilla-base-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-vanilla-base-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-vanilla-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-vanilla-debugsource-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-vanilla-devel-4.12.14-lp150.12.10.1") ) flag++; if ( rpm_check(release:"SUSE15.0", reference:"kernel-vanilla-devel-debuginfo-4.12.14-lp150.12.10.1") ) flag++; if (flag) { if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get()); else security_hole(0); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel-debug / kernel-debug-base / kernel-debug-base-debuginfo / etc"); }
NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2789.NASL description An update for kernel-rt is now available for Red Hat Enterprise MRG 2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es) : * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. Bug Fix(es) : * The kernel-rt packages have been upgraded to the 3.10.0-693.39.1 source tree, which provides a number of bug fixes over the previous version. (BZ# 1616431) * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1618466) last seen 2020-06-01 modified 2020-06-02 plugin id 117816 published 2018-09-28 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117816 title RHEL 6 : MRG (RHSA-2018:2789) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Red Hat Security Advisory RHSA-2018:2789. The text # itself is copyright (C) Red Hat, Inc. # include("compat.inc"); if (description) { script_id(117816); script_version("1.8"); script_cvs_date("Date: 2019/10/24 15:35:45"); script_cve_id("CVE-2018-5390"); script_xref(name:"RHSA", value:"2018:2789"); script_name(english:"RHEL 6 : MRG (RHSA-2018:2789)"); script_summary(english:"Checks the rpm output for the updated packages"); script_set_attribute( attribute:"synopsis", value:"The remote Red Hat host is missing one or more security updates." ); script_set_attribute( attribute:"description", value: "An update for kernel-rt is now available for Red Hat Enterprise MRG 2. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es) : * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. Bug Fix(es) : * The kernel-rt packages have been upgraded to the 3.10.0-693.39.1 source tree, which provides a number of bug fixes over the previous version. (BZ# 1616431) * Previously, preemption was enabled too early after a context switch. If a task was migrated to another CPU after a context switch, a mismatch between CPU and runqueue during load balancing sometimes occurred. Consequently, a runnable task on an idle CPU failed to run, and the operating system became unresponsive. This update disables preemption in the schedule_tail() function. As a result, CPU migration during post-schedule processing no longer occurs, which prevents the above mismatch. The operating system no longer hangs due to this bug. (BZ#1618466)" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/errata/RHSA-2018:2789" ); script_set_attribute( attribute:"see_also", value:"https://access.redhat.com/security/cve/cve-2018-5390" ); script_set_attribute(attribute:"solution", value:"Update the affected packages."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debug-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-debuginfo-common-x86_64"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-doc"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-firmware"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-trace-devel"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-vanilla"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-vanilla-debuginfo"); script_set_attribute(attribute:"cpe", value:"p-cpe:/a:redhat:enterprise_linux:kernel-rt-vanilla-devel"); script_set_attribute(attribute:"cpe", value:"cpe:/o:redhat:enterprise_linux:6"); script_set_attribute(attribute:"vuln_publication_date", value:"2018/08/06"); script_set_attribute(attribute:"patch_publication_date", value:"2018/09/25"); script_set_attribute(attribute:"plugin_publication_date", value:"2018/09/28"); script_set_attribute(attribute:"generated_plugin", value:"current"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof."); script_family(english:"Red Hat Local Security Checks"); script_dependencies("ssh_get_info.nasl", "linux_alt_patch_detect.nasl"); script_require_keys("Host/local_checks_enabled", "Host/RedHat/release", "Host/RedHat/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("misc_func.inc"); include("rpm.inc"); include("ksplice.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/RedHat/release"); if (isnull(release) || "Red Hat" >!< release) audit(AUDIT_OS_NOT, "Red Hat"); os_ver = pregmatch(pattern: "Red Hat Enterprise Linux.*release ([0-9]+(\.[0-9]+)?)", string:release); if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Red Hat"); os_ver = os_ver[1]; if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Red Hat 6.x", "Red Hat " + os_ver); if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$" && "s390" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Red Hat", cpu); if (get_one_kb_item("Host/ksplice/kernel-cves")) { rm_kb_item(name:"Host/uptrack-uname-r"); cve_list = make_list("CVE-2018-5390"); if (ksplice_cves_check(cve_list)) { audit(AUDIT_PATCH_INSTALLED, "KSplice hotfix for RHSA-2018:2789"); } else { __rpm_report = ksplice_reporting_text(); } } yum_updateinfo = get_kb_item("Host/RedHat/yum-updateinfo"); if (!empty_or_null(yum_updateinfo)) { rhsa = "RHSA-2018:2789"; yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa); if (!empty_or_null(yum_report)) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : yum_report ); exit(0); } else { audit_message = "affected by Red Hat security advisory " + rhsa; audit(AUDIT_OS_NOT, audit_message); } } else { flag = 0; if (! (rpm_exists(release:"RHEL6", rpm:"mrg-release"))) audit(AUDIT_PACKAGE_NOT_INSTALLED, "MRG"); if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-debug-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-debug-debuginfo-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-debug-devel-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-debuginfo-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-debuginfo-common-x86_64-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-devel-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", reference:"kernel-rt-doc-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", reference:"kernel-rt-firmware-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-trace-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-trace-debuginfo-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-trace-devel-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-vanilla-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-vanilla-debuginfo-3.10.0-693.39.1.rt56.629.el6")) flag++; if (rpm_check(release:"RHEL6", cpu:"x86_64", reference:"kernel-rt-vanilla-devel-3.10.0-693.39.1.rt56.629.el6")) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : rpm_report_get() + redhat_report_package_caveat() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel-rt / kernel-rt-debug / kernel-rt-debug-debuginfo / etc"); } }
NASL family NewStart CGSL Local Security Checks NASL id NEWSTART_CGSL_NS-SA-2019-0143_KERNEL.NASL description The remote NewStart CGSL host, running version MAIN 4.05, has kernel packages installed that are affected by multiple vulnerabilities: - A flaw was found in the Linux kernel last seen 2020-03-18 modified 2019-08-12 plugin id 127408 published 2019-08-12 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127408 title NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0143) code # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from ZTE advisory NS-SA-2019-0143. The text # itself is copyright (C) ZTE, Inc. include('compat.inc'); if (description) { script_id(127408); script_version("1.4"); script_set_attribute(attribute:"plugin_modification_date", value:"2020/02/20"); script_cve_id( "CVE-2016-9555", "CVE-2017-5753", "CVE-2017-5754", "CVE-2017-7308", "CVE-2017-8824", "CVE-2017-13166", "CVE-2017-1000112", "CVE-2018-3639", "CVE-2018-3693", "CVE-2018-5390", "CVE-2018-5391", "CVE-2018-10675", "CVE-2018-10901", "CVE-2018-14634" ); script_bugtraq_id( 102371, 102378, 104976, 105407, 106128 ); script_name(english:"NewStart CGSL MAIN 4.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0143)"); script_set_attribute(attribute:"synopsis", value: "The remote machine is affected by multiple vulnerabilities."); script_set_attribute(attribute:"description", value: "The remote NewStart CGSL host, running version MAIN 4.05, has kernel packages installed that are affected by multiple vulnerabilities: - A flaw was found in the Linux kernel's implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash. (CVE-2016-9555) - An exploitable memory corruption flaw was found in the Linux kernel. The append path can be erroneously switched from UFO to non-UFO in ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If unprivileged user namespaces are available, this flaw can be exploited to gain root privileges. (CVE-2017-1000112) - A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation. (CVE-2017-13166) - An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side- channel attacks. (CVE-2017-5753) - An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. (CVE-2017-5754) - It was found that the packet_set_ring() function of the Linux kernel's networking implementation did not properly validate certain block-size data. A local attacker with CAP_NET_RAW capability could use this flaw to trigger a buffer overflow resulting in a system crash or a privilege escalation. (CVE-2017-7308) - A use-after-free vulnerability was found in DCCP socket code affecting the Linux kernel since 2.6.16. This vulnerability could allow an attacker to their escalate privileges. (CVE-2017-8824) - The do_get_mempolicy() function in mm/mempolicy.c in the Linux kernel allows local users to hit a use-after-free bug via crafted system calls and thus cause a denial of service (DoS) or possibly have unspecified other impact. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2018-10675) - A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges. (CVE-2018-10901) - An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. (CVE-2018-14634) - An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) - An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3693) - A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) - A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number."); script_set_attribute(attribute:"see_also", value:"http://security.gd-linux.com/notice/NS-SA-2019-0143"); script_set_attribute(attribute:"solution", value: "Upgrade the vulnerable CGSL kernel packages. Note that updated packages may not be available yet. Please contact ZTE for more information."); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C"); script_set_cvss_temporal_vector("CVSS2#E:H/RL:OF/RC:C"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"); script_set_cvss3_temporal_vector("CVSS:3.0/E:H/RL:O/RC:C"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-9555"); script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available"); script_set_attribute(attribute:"exploit_available", value:"true"); script_set_attribute(attribute:"exploit_framework_core", value:"true"); script_set_attribute(attribute:"exploited_by_malware", value:"true"); script_set_attribute(attribute:"metasploit_name", value:'AF_PACKET packet_set_ring Privilege Escalation'); script_set_attribute(attribute:"exploit_framework_metasploit", value:"true"); script_set_attribute(attribute:"exploit_framework_canvas", value:"true"); script_set_attribute(attribute:"canvas_package", value:'CANVAS'); script_set_attribute(attribute:"vuln_publication_date", value:"2016/11/28"); script_set_attribute(attribute:"patch_publication_date", value:"2019/07/17"); script_set_attribute(attribute:"plugin_publication_date", value:"2019/08/12"); script_set_attribute(attribute:"plugin_type", value:"local"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_family(english:"NewStart CGSL Local Security Checks"); script_copyright(english:"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof."); script_dependencies("ssh_get_info.nasl"); script_require_keys("Host/local_checks_enabled", "Host/ZTE-CGSL/release", "Host/ZTE-CGSL/rpm-list", "Host/cpu"); exit(0); } include("audit.inc"); include("global_settings.inc"); include("rpm.inc"); if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED); release = get_kb_item("Host/ZTE-CGSL/release"); if (isnull(release) || release !~ "^CGSL (MAIN|CORE)") audit(AUDIT_OS_NOT, "NewStart Carrier Grade Server Linux"); if (release !~ "CGSL MAIN 4.05") audit(AUDIT_OS_NOT, 'NewStart CGSL MAIN 4.05'); if (!get_kb_item("Host/ZTE-CGSL/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING); cpu = get_kb_item("Host/cpu"); if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH); if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "NewStart Carrier Grade Server Linux", cpu); flag = 0; pkgs = { "CGSL MAIN 4.05": [ "kernel-2.6.32-642.13.1.el6.cgsl7763", "kernel-abi-whitelists-2.6.32-642.13.1.el6.cgsl7763", "kernel-debug-2.6.32-642.13.1.el6.cgsl7763", "kernel-debug-debuginfo-2.6.32-642.13.1.el6.cgsl7763", "kernel-debug-devel-2.6.32-642.13.1.el6.cgsl7763", "kernel-debuginfo-2.6.32-642.13.1.el6.cgsl7763", "kernel-debuginfo-common-x86_64-2.6.32-642.13.1.el6.cgsl7763", "kernel-devel-2.6.32-642.13.1.el6.cgsl7763", "kernel-doc-2.6.32-642.13.1.el6.cgsl7763", "kernel-firmware-2.6.32-642.13.1.el6.cgsl7763", "kernel-headers-2.6.32-642.13.1.el6.cgsl7763", "perf-2.6.32-642.13.1.el6.cgsl7763", "perf-debuginfo-2.6.32-642.13.1.el6.cgsl7763", "python-perf-2.6.32-642.13.1.el6.cgsl7763", "python-perf-debuginfo-2.6.32-642.13.1.el6.cgsl7763" ] }; pkg_list = pkgs[release]; foreach (pkg in pkg_list) if (rpm_check(release:"ZTE " + release, reference:pkg)) flag++; if (flag) { security_report_v4( port : 0, severity : SECURITY_HOLE, extra : rpm_report_get() ); exit(0); } else { tested = pkg_tests_get(); if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested); else audit(AUDIT_PACKAGE_NOT_INSTALLED, "kernel"); }
NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3732-2.NASL description USN-3732-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu 16.04 LTS. Juha-Matti Tilli discovered that the TCP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packets. A remote attacker could use this to cause a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 111580 published 2018-08-07 reporter Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111580 title Ubuntu 16.04 LTS : linux-hwe, linux-azure, linux-gcp vulnerability (USN-3732-2) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2018-1278.NASL description According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) - A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) - A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.(CVE-2018-5391) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-05-06 modified 2018-09-04 plugin id 112237 published 2018-09-04 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/112237 title EulerOS 2.0 SP2 : kernel (EulerOS-SA-2018-1278) NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2018-2390.NASL description An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16th August 2018] The original errata text was missing reference to CVE-2018-5390 fix. We have updated the errata text to correct this issue. No changes have been made to the packages. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 111704 published 2018-08-15 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111704 title CentOS 6 : kernel (CESA-2018:2390) (Foreshadow) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2223-1.NASL description The SUSE Linux Enterprise 15 kernel was updated to receive various security and bugfixes. The following security bugs were fixed: CVE-2018-5390 aka SegmentSmack: A remote attacker even with relatively low bandwidth could have caused lots of CPU usage by triggering the worst case scenario during IP and/or TCP fragment reassembly (bsc#1102340) - CVE-2017-18344: The timer_create syscall implementation didn last seen 2020-03-19 modified 2019-01-02 plugin id 120071 published 2019-01-02 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/120071 title SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2018:2223-1) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2785.NASL description An update for kernel is now available for Red Hat Enterprise Linux 7.3 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391. Bug Fix(es) : * On systems running Red Hat Enterprise Linux 7 with Red Hat OpenShift Container Platform 3.5, a node sometimes got into last seen 2020-06-01 modified 2020-06-02 plugin id 117781 published 2018-09-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117781 title RHEL 7 : kernel (RHSA-2018:2785) NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-0955-1.NASL description This update for the Linux Kernel 4.4.121-92_104 fixes one issue. The following security issue was fixed : CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 124110 published 2019-04-17 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/124110 title SUSE SLES12 Security Update : kernel (SUSE-SU-2019:0955-1) NASL family Amazon Linux Local Security Checks NASL id AL2_ALAS-2018-1050.NASL description Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service. An attacker can induce a denial of service condition by sending specially modified packets within ongoing TCP sessions. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port. Thus, the attacks cannot be performed using spoofed IP addresses. ( https://www.kb.cert.org/vuls/id/962459 ) last seen 2020-06-01 modified 2020-06-02 plugin id 111550 published 2018-08-07 reporter This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111550 title Amazon Linux 2 : kernel (ALAS-2018-1050) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2018-1322.NASL description According to the version of the kernel packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerability : - A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 118367 published 2018-10-25 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118367 title EulerOS Virtualization 2.5.1 : kernel (EulerOS-SA-2018-1322) NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-2230-1.NASL description This update for the Linux Kernel 4.4.121-92_117 fixes one issue. The following security issue was fixed : CVE-2018-5390: Fixed expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which could have led to a denial of service (bsc#1102682). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 128315 published 2019-08-29 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/128315 title SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2230-1) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2384.NASL description An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 111727 published 2018-08-15 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111727 title RHEL 7 : kernel (RHSA-2018:2384) (Foreshadow) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2018-4189.NASL description Description of changes: [4.14.35-1818.0.14.el7uek] - tcp: add tcp_ooo_try_coalesce() helper (Eric Dumazet) [Orabug: 28453849] {CVE-2018-5390} - tcp: call tcp_drop() from tcp_data_queue_ofo() (Eric Dumazet) [Orabug: 28453849] {CVE-2018-5390} - tcp: detect malicious patterns in tcp_collapse_ofo_queue() (Eric Dumazet) [Orabug: 28453849] {CVE-2018-5390} - tcp: avoid collapses in tcp_prune_queue() if possible (Eric Dumazet) [Orabug: 28453849] {CVE-2018-5390} - tcp: free batches of packets in tcp_prune_ofo_queue() (Eric Dumazet) [Orabug: 28453849] {CVE-2018-5390} last seen 2020-06-01 modified 2020-06-02 plugin id 111562 published 2018-08-07 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111562 title Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2018-4189) NASL family SuSE Local Security Checks NASL id OPENSUSE-2019-597.NASL description The openSUSE Leap 15.0 kernel was updated to receive various security and bugfixes. The following security bugs were fixed : - CVE-2018-5390 aka last seen 2020-06-01 modified 2020-06-02 plugin id 123260 published 2019-03-27 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/123260 title openSUSE Security Update : the Linux Kernel (openSUSE-2019-597) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2403.NASL description An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts (RHVH) are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host last seen 2020-06-01 modified 2020-06-02 plugin id 112027 published 2018-08-21 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/112027 title RHEL 7 : Virtualization (RHSA-2018:2403) (Foreshadow) NASL family NewStart CGSL Local Security Checks NASL id NEWSTART_CGSL_NS-SA-2019-0034_KERNEL.NASL description The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has kernel packages installed that are affected by multiple vulnerabilities: - The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIMIT_INFINITY, but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. (CVE-2017-1000365) - An integer overflow flaw was found in the Linux kernel last seen 2020-06-01 modified 2020-06-02 plugin id 127202 published 2019-08-12 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127202 title NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0034) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2787-1.NASL description This update for the Linux Kernel 3.12.61-52_122 fixes several issues. The following security issues were fixed : CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682). CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 117663 published 2018-09-24 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117663 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2787-1) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2018-4216.NASL description Description of changes: [4.1.12-124.19.2.el7uek] - tcp: add tcp_ooo_try_coalesce() helper (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390} - tcp: call tcp_drop() from tcp_data_queue_ofo() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390} - tcp: detect malicious patterns in tcp_collapse_ofo_queue() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390} - tcp: avoid collapses in tcp_prune_queue() if possible (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390} - tcp: free batches of packets in tcp_prune_ofo_queue() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390} - tcp: use an RB tree for ooo receive queue (Yaogong Wang) [Orabug: 28639707] {CVE-2018-5390} - tcp: refine tcp_prune_ofo_queue() to not drop all packets (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390} - tcp: introduce tcp_under_memory_pressure() (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390} - tcp: increment sk_drops for dropped rx packets (Eric Dumazet) [Orabug: 28639707] {CVE-2018-5390} last seen 2020-06-01 modified 2020-06-02 plugin id 117514 published 2018-09-17 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117514 title Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2018-4216) NASL family F5 Networks Local Security Checks NASL id F5_BIGIP_SOL95343321.NASL description Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service. (CVE-2018-5390 also known as SegmentSmack) Impact For products with vulnerable versions, this vulnerability allows a remote attacker to disrupt service. This vulnerability affects only the BIG-IP management port. For products with None in the Versions known to be vulnerable column, there is no impact. last seen 2020-04-03 modified 2018-12-14 plugin id 119669 published 2018-12-14 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/119669 title F5 Networks BIG-IP : Linux kernel vulnerability (K95343321) NASL family SuSE Local Security Checks NASL id OPENSUSE-2018-885.NASL description The openSUSE Leap 42.3 kernel was updated to 4.4.143 to receive various security and bugfixes. The following security bugs were fixed : - CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn last seen 2020-06-05 modified 2018-08-20 plugin id 111997 published 2018-08-20 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111997 title openSUSE Security Update : the Linux Kernel (openSUSE-2018-885) (Foreshadow) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-3265-1.NASL description This update for the Linux Kernel 3.12.61-52_146 fixes several issues. The following security issues were fixed : CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target last seen 2020-06-01 modified 2020-06-02 plugin id 118318 published 2018-10-23 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118318 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3265-1) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2776.NASL description An update for kernel is now available for Red Hat Enterprise Linux 7.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. Bug Fix(es) : * Previously, making the total buffer size bigger than the memory size for early allocation through the trace_buf_size boot option, made the system become unresponsive at the boot stage. This update introduces a change in the early memory allocation. As a result, the system no longer hangs in the above described scenario. (BZ#1588365) * When inserting objects with the same keys, made the rhlist implementation corrupt the chain pointers. As a consequence, elements were missing on removal and traversal. This patch updates the chain pointers correctly. As a result, there are no missing elements on removal and traversal in the above-described scenario. (BZ#1601008) * Previously, the kernel source code was missing support to report the Speculative Store Bypass Disable (SSBD) vulnerability status on IBM Power Systems and the little-endian variants of IBM Power Systems. As a consequence, the /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file incorrectly reported last seen 2020-06-01 modified 2020-06-02 plugin id 117780 published 2018-09-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117780 title RHEL 7 : kernel (RHSA-2018:2776) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2864-1.NASL description This update for the Linux Kernel 4.4.121-92_92 fixes several issues. The following security issues were fixed : CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682). CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191). CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 117802 published 2018-09-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117802 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2864-1) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2390.NASL description An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16th August 2018] The original errata text was missing reference to CVE-2018-5390 fix. We have updated the errata text to correct this issue. No changes have been made to the packages. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 111731 published 2018-08-15 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111731 title RHEL 6 : kernel (RHSA-2018:2390) (Foreshadow) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3742-1.NASL description It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646) It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker could use this to expose sensitive information (memory from the kernel or other processes). (CVE-2018-3620) Andrey Konovalov discovered an out-of-bounds read in the POSIX timers subsystem in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or expose sensitive information. (CVE-2017-18344) Juha-Matti Tilli discovered that the TCP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packets. A remote attacker could use this to cause a denial of service. (CVE-2018-5390) Juha-Matti Tilli discovered that the IP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packet fragments. A remote attacker could use this to cause a denial of service. (CVE-2018-5391). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 111753 published 2018-08-15 reporter Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111753 title Ubuntu 14.04 LTS : linux vulnerabilities (USN-3742-1) (Foreshadow) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2344-1.NASL description The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed : - CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081). - CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343). - CVE-2018-5390 aka last seen 2020-06-01 modified 2020-06-02 plugin id 111815 published 2018-08-17 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111815 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2344-1) (Foreshadow) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-3470-1.NASL description This update for the Linux Kernel 4.4.121-92_95 fixes several issues. The following security issues were fixed : CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack-based buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target last seen 2020-06-01 modified 2020-06-02 plugin id 118460 published 2018-10-26 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118460 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3470-1) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2018-4195.NASL description The remote Oracle Linux host is missing a security update for the Unbreakable Enterprise kernel package(s). last seen 2020-06-01 modified 2020-06-02 plugin id 111725 published 2018-08-15 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111725 title Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2018-4195) (Foreshadow) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2328-1.NASL description The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.143 to receive various security and bugfixes. The following security bugs were fixed : - CVE-2018-5390 aka last seen 2020-06-01 modified 2020-06-02 plugin id 111746 published 2018-08-15 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111746 title SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2018:2328-1) (Foreshadow) NASL family Junos Local Security Checks NASL id JUNIPER_SPACE_JSA10917_184R1.NASL description According to its self-reported version number, the remote Junos Space version is 18.4.x prior to 18.4R1. It is, therefore, affected by multiple vulnerabilities : - An integer overflow issue exists in procps-ng. This is related to CVE-2018-1124. (CVE-2018-1126) - A directory traversal issue exits in reposync, a part of yum-utils.tory configuration files. If an attacker controls a repository, they may be able to copy files outside of the destination directory on the targeted system via path traversal. (CVE-2018-10897) - An integer overflow flaw was found in the Linux kernel last seen 2020-06-01 modified 2020-06-02 plugin id 121068 published 2019-01-10 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/121068 title Juniper Junos Space 18.4.x < 18.4R1 Multiple Vulnerabilities (JSA10917) NASL family Misc. NASL id ARISTA_EOS_VEOS_SA0036.NASL description The version of Arista Networks EOS or vEOS running on the remote device is affected by a denial of servics (DoS) vulnerability. A flaw named SegmentSmack was found in the way the Linux kernel handles specially crafted TCP packets. An unauthenticated, remote attacker can use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. Note that Nessus has not tested for this issue but has instead relied only on the application last seen 2020-03-17 modified 2020-02-17 plugin id 133724 published 2020-02-17 reporter This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/133724 title Arista Networks EOS/vEOS SegmentSmack TCP DoS (SA0036) NASL family OracleVM Local Security Checks NASL id ORACLEVM_OVMSA-2018-0256.NASL description The remote OracleVM system is missing necessary patches to address critical security updates : - tcp: add tcp_ooo_try_coalesce helper (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390) - tcp: call tcp_drop from tcp_data_queue_ofo (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390) - tcp: detect malicious patterns in tcp_collapse_ofo_queue (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390) - tcp: avoid collapses in tcp_prune_queue if possible (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390) - tcp: free batches of packets in tcp_prune_ofo_queue (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390) - tcp: use an RB tree for ooo receive queue (Yaogong Wang) [Orabug: 28639707] (CVE-2018-5390) - tcp: refine tcp_prune_ofo_queue to not drop all packets (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390) - tcp: introduce tcp_under_memory_pressure (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390) - tcp: increment sk_drops for dropped rx packets (Eric Dumazet) [Orabug: 28639707] (CVE-2018-5390) last seen 2020-06-01 modified 2020-06-02 plugin id 117512 published 2018-09-17 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117512 title OracleVM 3.4 : Unbreakable / etc (OVMSA-2018-0256) NASL family Virtuozzo Local Security Checks NASL id VIRTUOZZO_VZA-2018-055.NASL description According to the versions of the cpupools / cpupools-features / etc packages installed, the Virtuozzo installation on the remote host is affected by the following vulnerabilities : - Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. - An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 112018 published 2018-08-20 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/112018 title Virtuozzo 6 : cpupools / cpupools-features / etc (VZA-2018-055) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-3328-1.NASL description This update for the Linux Kernel 3.12.74-60_64_107 fixes several issues. The following security issues were fixed : CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack-based buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target last seen 2020-06-01 modified 2020-06-02 plugin id 118349 published 2018-10-24 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118349 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3328-1) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3741-3.NASL description USN-3741-1 introduced mitigations in the Linux kernel for Ubuntu 14.04 LTS to address L1 Terminal Fault (L1TF) vulnerabilities (CVE-2018-3620, CVE-2018-3646). Unfortunately, the update introduced regressions that caused kernel panics when booting in some environments as well as preventing Java applications from starting. This update fixes the problems. We apologize for the inconvenience. Original advisory details : It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646) It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker could use this to expose sensitive information (memory from the kernel or other processes). (CVE-2018-3620) Juha-Matti Tilli discovered that the TCP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packets. A remote attacker could use this to cause a denial of service. (CVE-2018-5390) Juha-Matti Tilli discovered that the IP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packet fragments. A remote attacker could use this to cause a denial of service. (CVE-2018-5391). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 112017 published 2018-08-20 reporter Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/112017 title Ubuntu 14.04 LTS : linux regressions (USN-3741-3) (Foreshadow) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3741-1.NASL description It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646) It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker could use this to expose sensitive information (memory from the kernel or other processes). (CVE-2018-3620) Juha-Matti Tilli discovered that the TCP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packets. A remote attacker could use this to cause a denial of service. (CVE-2018-5390) Juha-Matti Tilli discovered that the IP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packet fragments. A remote attacker could use this to cause a denial of service. (CVE-2018-5391). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 111751 published 2018-08-15 reporter Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111751 title Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities (USN-3741-1) (Foreshadow) NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2018-2_0-0101.NASL description An update of 'linux-secure', 'linux', 'linux-aws', 'linux-esx' packages of Photon OS has been released. last seen 2019-02-21 modified 2019-02-07 plugin id 119423 published 2018-12-05 reporter Tenable source https://www.tenable.com/plugins/index.php?view=single&id=119423 title Photon OS 2.0: Linux PHSA-2018-2.0-0101 (deprecated) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3732-1.NASL description Juha-Matti Tilli discovered that the TCP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packets. A remote attacker could use this to cause a denial of service. Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 111579 published 2018-08-07 reporter Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111579 title Ubuntu 18.04 LTS : linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, (USN-3732-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-1425-1.NASL description This update for the Linux Kernel 3.12.74-60_64_110- fixes one issue. The following security issue was fixed : CVE-2018-5390: The Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 125762 published 2019-06-07 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/125762 title SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1425-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-3172-1.NASL description This update for the Linux Kernel 3.12.74-60_64_104 fixes several issues. The following security issues were fixed : CVE-2018-17182: The vmacache_flush_all function in mm/vmacache.c mishandled sequence number overflows. An attacker can trigger a use-after-free (and possibly gain privileges) via certain thread creation, map, unmap, invalidation, and dereference operations (bsc#1110233). CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack-based buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target last seen 2020-06-01 modified 2020-06-02 plugin id 118174 published 2018-10-17 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118174 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3172-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2374-1.NASL description The SUSE Linux Enterprise 12 SP3 Azure kernel was updated to 4.4.143 to receive various security and bugfixes. The following security bugs were fixed : - CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081). - CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343). - CVE-2018-5391: A flaw in the IP packet reassembly could be used by remote attackers to consume CPU time (bnc#1103097). - CVE-2018-5390: Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bnc#1102340). - CVE-2018-14734: drivers/infiniband/core/ucma.c allowed ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allowed attackers to cause a denial of service (use-after-free) (bnc#1103119). - CVE-2017-18344: The timer_create syscall implementation in kernel/time/posix-timers.c didn last seen 2020-06-01 modified 2020-06-02 plugin id 111837 published 2018-08-17 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111837 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2374-1) (Foreshadow) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2395.NASL description An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es) : * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 111736 published 2018-08-15 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111736 title RHEL 7 : kernel-rt (RHSA-2018:2395) (Foreshadow) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2924.NASL description An update for kernel is now available for Red Hat Enterprise Linux 6.6 Advanced Update Support and Red Hat Enterprise Linux 6.6 Telco Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) * kernel: Integer overflow in Linux last seen 2020-06-01 modified 2020-06-02 plugin id 118163 published 2018-10-17 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118163 title RHEL 6 : kernel (RHSA-2018:2924) NASL family Amazon Linux Local Security Checks NASL id ALA_ALAS-2018-1049.NASL description Linux kernel versions 4.9+ can be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service. An attacker can induce a denial of service condition by sending specially modified packets within ongoing TCP sessions. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port. Thus, the attacks cannot be performed using spoofed IP addresses. ( https://www.kb.cert.org/vuls/id/962459 ) last seen 2020-06-01 modified 2020-06-02 plugin id 111553 published 2018-08-07 reporter This script is Copyright (C) 2018 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111553 title Amazon Linux AMI : kernel (ALAS-2018-1049) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-3789-1.NASL description This update for the Linux Kernel 4.4.121-92_98 fixes several issues. The following security issues were fixed : CVE-2018-14633: A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target last seen 2020-06-01 modified 2020-06-02 plugin id 119034 published 2018-11-19 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/119034 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:3789-1) NASL family Ubuntu Local Security Checks NASL id UBUNTU_USN-3741-2.NASL description USN-3741-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS). (CVE-2018-3646) It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker could use this to expose sensitive information (memory from the kernel or other processes). (CVE-2018-3620) Juha-Matti Tilli discovered that the TCP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packets. A remote attacker could use this to cause a denial of service. (CVE-2018-5390) Juha-Matti Tilli discovered that the IP implementation in the Linux kernel performed algorithmically expensive operations in some situations when handling incoming packet fragments. A remote attacker could use this to cause a denial of service. (CVE-2018-5391). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 111752 published 2018-08-15 reporter Ubuntu Security Notice (C) 2018-2019 Canonical, Inc. / NASL script (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111752 title Ubuntu 14.04 LTS : linux-lts-xenial, linux-aws vulnerabilities (USN-3741-2) (Foreshadow) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2791.NASL description An update for kernel is now available for Red Hat Enterprise Linux 6.4 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390 and CVE-2018-5391. Bug Fix(es) : * After updating the system to prevent the L1 Terminal Fault (L1TF) vulnerability, only one thread was detected on systems that offer processing of two threads on a single processor core. With this update, the last seen 2020-06-01 modified 2020-06-02 plugin id 117783 published 2018-09-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117783 title RHEL 6 : kernel (RHSA-2018:2791) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2933.NASL description An update for kernel is now available for Red Hat Enterprise Linux 6.5 Advanced Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) * kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) * kernel: Integer overflow in Linux last seen 2020-06-01 modified 2020-06-02 plugin id 118165 published 2018-10-17 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118165 title RHEL 6 : kernel (RHSA-2018:2933) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2402.NASL description An update for rhvm-appliance is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal. Security Fix(es) : * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Intel OSSIRT (Intel.com) for reporting CVE-2018-3620 and CVE-2018-3646 and Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5390. last seen 2020-06-01 modified 2020-06-02 plugin id 112026 published 2018-08-21 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/112026 title RHEL 7 : Virtualization (RHSA-2018:2402) (Foreshadow) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2860-1.NASL description This update for the Linux Kernel 4.4.103-92_56 fixes several issues. The following security issues were fixed : CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682). CVE-2018-1000026: Fixed an insufficient input validation in bnx2x network card driver that can result in DoS via very large, specially crafted packet to the bnx2x card due to a network card firmware assertion that will take the card offline (bsc#1096723). CVE-2018-10938: Fixed an infinite loop in the cipso_v4_optptr() function leading to a denial-of-service via crafted network packets (bsc#1106191). CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 117801 published 2018-09-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117801 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2860-1) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2018-1279.NASL description According to the versions of the kernel packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities : - Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) - A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) - A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system.(CVE-2018-5391) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-05-06 modified 2018-09-04 plugin id 112238 published 2018-09-04 reporter This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/112238 title EulerOS 2.0 SP3 : kernel (EulerOS-SA-2018-1279) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2948.NASL description An update for kernel-alt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel-alt packages provide the Linux kernel version 4.x. Security Fix(es) : * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 118513 published 2018-10-31 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118513 title RHEL 7 : kernel-alt (RHSA-2018:2948) (Spectre) NASL family Debian Local Security Checks NASL id DEBIAN_DSA-4266.NASL description Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation or denial of service. - CVE-2018-5390 Juha-Matti Tilli discovered that a remote attacker can trigger the worst case code paths for TCP stream reassembly with low rates of specially crafted packets leading to remote denial of service. - CVE-2018-13405 Jann Horn discovered that the inode_init_owner function in fs/inode.c in the Linux kernel allows local users to create files with an unintended group ownership allowing attackers to escalate privileges by making a plain file executable and SGID. last seen 2020-06-01 modified 2020-06-02 plugin id 111557 published 2018-08-07 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111557 title Debian DSA-4266-1 : linux - security update NASL family PhotonOS Local Security Checks NASL id PHOTONOS_PHSA-2018-2_0-0101_LINUX.NASL description An update of the linux package has been released. last seen 2020-03-17 modified 2019-02-07 plugin id 121997 published 2019-02-07 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/121997 title Photon OS 2.0: Linux PHSA-2018-2.0-0101 NASL family CentOS Local Security Checks NASL id CENTOS_RHSA-2018-2384.NASL description An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 111703 published 2018-08-15 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111703 title CentOS 7 : kernel (CESA-2018:2384) (Foreshadow) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2790.NASL description An update for kernel is now available for Red Hat Enterprise Linux 7.2 Advanced Update Support, Red Hat Enterprise Linux 7.2 Telco Extended Update Support, and Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. Bug Fix(es) : * Previously, the early microcode updater in the kernel was trying to perform a microcode update on virtualized guests. As a consequence, the virtualized guests sometimes mishandled the request to perform the microcode update and became unresponsive in the early boot stage. This update applies an upstream patch to avoid the early microcode update when running under a hypervisor. As a result, no kernel freezes appear in the described scenario. (BZ#1618386) last seen 2020-06-01 modified 2020-06-02 plugin id 117782 published 2018-09-27 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117782 title RHEL 7 : kernel (RHSA-2018:2790) NASL family Red Hat Local Security Checks NASL id REDHAT-RHSA-2018-2645.NASL description An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) Red Hat would like to thank Juha-Matti Tilli (Aalto University, Department of Communications and Networking and Nokia Bell Labs) for reporting this issue. last seen 2020-06-01 modified 2020-06-02 plugin id 112284 published 2018-09-05 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/112284 title RHEL 6 : kernel (RHSA-2018:2645) NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-2601-1.NASL description This update for the Linux Kernel 4.4.121-92_120 fixes several issues. The following security issues were fixed : CVE-2019-14835: A buffer overflow flaw was found in the way vhost functionality, that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host (bsc#1151021). CVE-2018-5390: Fixed a denial of service ( last seen 2020-06-01 modified 2020-06-02 plugin id 129747 published 2019-10-09 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/129747 title SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2601-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2019-1767-1.NASL description This update for the Linux Kernel 3.12.74-60_64_115 fixes several issues. The following security issues were fixed : CVE-2019-11487: The Linux kernel allowed page->_refcount reference count overflow, with resultant use-after-free issues, if about 140 GiB of RAM exists. This is related to fs/fuse/dev.c, fs/pipe.c, fs/splice.c, include/linux/mm.h, include/linux/pipe_fs_i.h, kernel/trace/trace.c, mm/gup.c, and mm/hugetlb.c. It can occur with FUSE requests (bsc#1133191). CVE-2018-5390: Linux kernel could be forced to make very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming packet which can lead to a denial of service (bsc#1102682). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 126560 published 2019-07-09 reporter This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/126560 title SUSE SLES12 Security Update : kernel (SUSE-SU-2019:1767-1) NASL family NewStart CGSL Local Security Checks NASL id NEWSTART_CGSL_NS-SA-2019-0049_KERNEL-RT.NASL description The remote NewStart CGSL host, running version CORE 5.04 / MAIN 5.04, has kernel-rt packages installed that are affected by multiple vulnerabilities: - A buffer overflow vulnerability due to a lack of input filtering of incoming fragmented datagrams was found in the IP-over-1394 driver [firewire-net] in a fragment handling code in the Linux kernel. The vulnerability exists since firewire supported IPv4, i.e. since version 2.6.31 (year 2009) till version v4.9-rc4. A maliciously formed fragment with a respectively large datagram offset would cause a memcpy() past the datagram buffer, which would cause a system panic or possible arbitrary code execution. The flaw requires [firewire-net] module to be loaded and is remotely exploitable from connected firewire devices, but not over a local network. (CVE-2016-8633) - The Linux Kernel imposes a size restriction on the arguments and environmental strings passed through RLIMIT_STACK/RLIMIT_INFINITY, but does not take the argument and environment pointers into account, which allows attackers to bypass this limitation. (CVE-2017-1000365) - A bug in the 32-bit compatibility layer of the ioctl handling code of the v4l2 video driver in the Linux kernel has been found. A memory protection mechanism ensuring that user-provided buffers always point to a userspace memory were disabled, allowing destination address to be in a kernel space. This flaw could be exploited by an attacker to overwrite a kernel memory from an unprivileged userspace process, leading to privilege escalation. (CVE-2017-13166) - The timer_create syscall implementation in kernel/time/posix-timers.c in the Linux kernel doesn last seen 2020-06-01 modified 2020-06-02 plugin id 127233 published 2019-08-12 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/127233 title NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0049) NASL family Virtuozzo Local Security Checks NASL id VIRTUOZZO_VZA-2018-063.NASL description According to the versions of the OVMF / crit / criu / criu-devel / ksm-vz / etc packages installed, the Virtuozzo installation on the remote host is affected by the following vulnerabilities : - A flaw was found in the Linux kernel last seen 2020-06-01 modified 2020-06-02 plugin id 112206 published 2018-08-31 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/112206 title Virtuozzo 7 : OVMF / crit / criu / criu-devel / ksm-vz / etc (VZA-2018-063) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2018-2384.NASL description From Red Hat Security Advisory 2018:2384 : An update for kernel is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 111723 published 2018-08-15 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111723 title Oracle Linux 7 : kernel (ELSA-2018-2384) (Foreshadow) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2018-1345.NASL description According to the versions of the kernel packages installed, the EulerOS Virtualization installation on the remote host is affected by the following vulnerabilities : - Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3646) - A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses.(CVE-2018-5390) - Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.(CVE-2018-3620) Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 118433 published 2018-10-26 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118433 title EulerOS Virtualization 2.5.0 : kernel (EulerOS-SA-2018-1345) NASL family Oracle Linux Local Security Checks NASL id ORACLELINUX_ELSA-2018-2390.NASL description From Red Hat Security Advisory 2018:2390 : An update for kernel is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 16th August 2018] The original errata text was missing reference to CVE-2018-5390 fix. We have updated the errata text to correct this issue. No changes have been made to the packages. The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix(es) : * Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 111724 published 2018-08-15 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111724 title Oracle Linux 6 : kernel (ELSA-2018-2390) (Foreshadow) NASL family Huawei Local Security Checks NASL id EULEROS_SA-2019-1539.NASL description According to the versions of the kernel packages installed, the EulerOS Virtualization for ARM 64 installation on the remote host is affected by the following vulnerabilities : - An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor last seen 2020-06-01 modified 2020-06-02 plugin id 124992 published 2019-05-14 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/124992 title EulerOS Virtualization for ARM 64 3.0.1.0 : kernel (EulerOS-SA-2019-1539) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2960-1.NASL description This update for the Linux Kernel 3.12.74-60_64_63 fixes several issues. The following security issues were fixed : CVE-2018-5390: Prevent very expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() for every incoming TCP packet which can lead to a denial of service (bsc#1102682). CVE-2018-10902: It was found that the raw midi kernel driver did not protect against concurrent access which lead to a double realloc (double free) in snd_rawmidi_input_params() and snd_rawmidi_output_status(), allowing a malicious local attacker to use this for privilege escalation (bsc#1105323). Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues. last seen 2020-06-01 modified 2020-06-02 plugin id 117866 published 2018-10-02 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/117866 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2960-1) NASL family SuSE Local Security Checks NASL id SUSE_SU-2018-2344-2.NASL description The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated to receive various security and bugfixes. The following security bugs were fixed : CVE-2018-3620: Local attackers on baremetal systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data. (bnc#1087081). CVE-2018-3646: Local attackers in virtualized guest systems could use speculative code patterns on hyperthreaded processors to read data present in the L1 Datacache used by other hyperthreads on the same CPU core, potentially leaking sensitive data, even from other virtual machines or the host system. (bnc#1089343). CVE-2018-5390 aka last seen 2020-06-01 modified 2020-06-02 plugin id 118283 published 2018-10-22 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/118283 title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:2344-2) (Foreshadow) NASL family Debian Local Security Checks NASL id DEBIAN_DLA-1466.NASL description Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation or denial of service. CVE-2018-5390 (SegmentSmack) Juha-Matti Tilli discovered that a remote attacker can trigger the worst case code paths for TCP stream reassembly with low rates of specially crafted packets, leading to remote denial of service. CVE-2018-5391 (FragmentSmack) Juha-Matti Tilli discovered a flaw in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker can take advantage of this flaw to trigger time and calculation expensive fragment reassembly algorithms by sending specially crafted packets, leading to remote denial of service. This is mitigated by reducing the default limits on memory usage for incomplete fragmented packets. The same mitigation can be achieved without the need to reboot, by setting the sysctls : net.ipv4.ipfrag_high_thresh = 262144 net.ipv6.ip6frag_high_thresh = 262144 net.ipv4.ipfrag_low_thresh = 196608 net.ipv6.ip6frag_low_thresh = 196608 The default values may still be increased by local configuration if necessary. CVE-2018-13405 Jann Horn discovered that the inode_init_owner function in fs/inode.c in the Linux kernel allows local users to create files with an unintended group ownership allowing attackers to escalate privileges by making a plain file executable and SGID. For Debian 8 last seen 2020-06-01 modified 2020-06-02 plugin id 111763 published 2018-08-16 reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/111763 title Debian DLA-1466-1 : linux-4.9 security update
Redhat
advisories |
| ||||||||||||||||||||||||||||||||||||||||||||||||||||
rpms |
|
References
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
- http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-004.txt
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20181031-02-linux-en
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- http://www.openwall.com/lists/oss-security/2019/07/06/3
- http://www.openwall.com/lists/oss-security/2019/07/06/3
- http://www.openwall.com/lists/oss-security/2019/07/06/4
- http://www.openwall.com/lists/oss-security/2019/07/06/4
- http://www.securityfocus.com/bid/104976
- http://www.securityfocus.com/bid/104976
- http://www.securitytracker.com/id/1041424
- http://www.securitytracker.com/id/1041424
- http://www.securitytracker.com/id/1041434
- http://www.securitytracker.com/id/1041434
- https://access.redhat.com/errata/RHSA-2018:2384
- https://access.redhat.com/errata/RHSA-2018:2384
- https://access.redhat.com/errata/RHSA-2018:2395
- https://access.redhat.com/errata/RHSA-2018:2395
- https://access.redhat.com/errata/RHSA-2018:2402
- https://access.redhat.com/errata/RHSA-2018:2402
- https://access.redhat.com/errata/RHSA-2018:2403
- https://access.redhat.com/errata/RHSA-2018:2403
- https://access.redhat.com/errata/RHSA-2018:2645
- https://access.redhat.com/errata/RHSA-2018:2645
- https://access.redhat.com/errata/RHSA-2018:2776
- https://access.redhat.com/errata/RHSA-2018:2776
- https://access.redhat.com/errata/RHSA-2018:2785
- https://access.redhat.com/errata/RHSA-2018:2785
- https://access.redhat.com/errata/RHSA-2018:2789
- https://access.redhat.com/errata/RHSA-2018:2789
- https://access.redhat.com/errata/RHSA-2018:2790
- https://access.redhat.com/errata/RHSA-2018:2790
- https://access.redhat.com/errata/RHSA-2018:2791
- https://access.redhat.com/errata/RHSA-2018:2791
- https://access.redhat.com/errata/RHSA-2018:2924
- https://access.redhat.com/errata/RHSA-2018:2924
- https://access.redhat.com/errata/RHSA-2018:2933
- https://access.redhat.com/errata/RHSA-2018:2933
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:2948
- https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-377115.pdf
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=1a4f14bab1868b443f0dd3c55b689a478f82e72e
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
- https://lists.debian.org/debian-lts-announce/2018/08/msg00014.html
- https://security.netapp.com/advisory/ntap-20180815-0003/
- https://security.netapp.com/advisory/ntap-20180815-0003/
- https://support.f5.com/csp/article/K95343321
- https://support.f5.com/csp/article/K95343321
- https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K95343321?utm_source=f5support&%3Butm_medium=RSS
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180824-linux-tcp
- https://usn.ubuntu.com/3732-1/
- https://usn.ubuntu.com/3732-1/
- https://usn.ubuntu.com/3732-2/
- https://usn.ubuntu.com/3732-2/
- https://usn.ubuntu.com/3741-1/
- https://usn.ubuntu.com/3741-1/
- https://usn.ubuntu.com/3741-2/
- https://usn.ubuntu.com/3741-2/
- https://usn.ubuntu.com/3742-1/
- https://usn.ubuntu.com/3742-1/
- https://usn.ubuntu.com/3742-2/
- https://usn.ubuntu.com/3742-2/
- https://usn.ubuntu.com/3763-1/
- https://usn.ubuntu.com/3763-1/
- https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack
- https://www.a10networks.com/support/security-advisories/tcp-ip-cve-2018-5390-segmentsmack
- https://www.debian.org/security/2018/dsa-4266
- https://www.debian.org/security/2018/dsa-4266
- https://www.kb.cert.org/vuls/id/962459
- https://www.kb.cert.org/vuls/id/962459
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.synology.com/support/security/Synology_SA_18_41
- https://www.synology.com/support/security/Synology_SA_18_41