ID CVE-2018-5803
Summary In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
References
Vulnerable Configurations
  • Linux Kernel
    cpe:2.3:o:linux:linux_kernel
  • Linux Kernel 1.2
    cpe:2.3:o:linux:linux_kernel:1.2.0
  • Linux Kernel 1.3
    cpe:2.3:o:linux:linux_kernel:1.3.0
  • Linux Kernel 2.0.0
    cpe:2.3:o:linux:linux_kernel:2.0.0
  • Linux Kernel 2.0.1
    cpe:2.3:o:linux:linux_kernel:2.0.1
  • Linux Kernel 2.0.2
    cpe:2.3:o:linux:linux_kernel:2.0.2
  • Linux Kernel 2.0.3
    cpe:2.3:o:linux:linux_kernel:2.0.3
  • Linux Kernel 2.0.4
    cpe:2.3:o:linux:linux_kernel:2.0.4
  • Linux Kernel 2.0.5
    cpe:2.3:o:linux:linux_kernel:2.0.5
  • Linux Kernel 2.0.6
    cpe:2.3:o:linux:linux_kernel:2.0.6
  • Linux Kernel 2.0.7
    cpe:2.3:o:linux:linux_kernel:2.0.7
  • Linux Kernel 2.0.8
    cpe:2.3:o:linux:linux_kernel:2.0.8
  • Linux Kernel 2.0.9
    cpe:2.3:o:linux:linux_kernel:2.0.9
  • Linux Kernel 2.0.10
    cpe:2.3:o:linux:linux_kernel:2.0.10
  • Linux Kernel 2.0.11
    cpe:2.3:o:linux:linux_kernel:2.0.11
  • Linux Kernel 2.0.12
    cpe:2.3:o:linux:linux_kernel:2.0.12
  • Linux Kernel 2.0.13
    cpe:2.3:o:linux:linux_kernel:2.0.13
  • Linux Kernel 2.0.14
    cpe:2.3:o:linux:linux_kernel:2.0.14
  • Linux Kernel 2.0.15
    cpe:2.3:o:linux:linux_kernel:2.0.15
  • Linux Kernel 2.0.16
    cpe:2.3:o:linux:linux_kernel:2.0.16
  • Linux Kernel 2.0.17
    cpe:2.3:o:linux:linux_kernel:2.0.17
  • Linux Kernel 2.0.18
    cpe:2.3:o:linux:linux_kernel:2.0.18
  • Linux Kernel 2.0.19
    cpe:2.3:o:linux:linux_kernel:2.0.19
  • Linux Kernel 2.0.20
    cpe:2.3:o:linux:linux_kernel:2.0.20
  • Linux Kernel 2.0.21
    cpe:2.3:o:linux:linux_kernel:2.0.21
  • Linux Kernel 2.0.22
    cpe:2.3:o:linux:linux_kernel:2.0.22
  • Linux Kernel 2.0.23
    cpe:2.3:o:linux:linux_kernel:2.0.23
  • Linux Kernel 2.0.24
    cpe:2.3:o:linux:linux_kernel:2.0.24
  • Linux Kernel 2.0.25
    cpe:2.3:o:linux:linux_kernel:2.0.25
  • Linux Kernel 2.0.26
    cpe:2.3:o:linux:linux_kernel:2.0.26
  • Linux Kernel 2.0.27
    cpe:2.3:o:linux:linux_kernel:2.0.27
  • Linux Kernel 2.0.28
    cpe:2.3:o:linux:linux_kernel:2.0.28
  • Linux Kernel 2.0.29
    cpe:2.3:o:linux:linux_kernel:2.0.29
  • Linux Kernel 2.0.30
    cpe:2.3:o:linux:linux_kernel:2.0.30
  • Linux Kernel 2.0.31
    cpe:2.3:o:linux:linux_kernel:2.0.31
  • Linux Kernel 2.0.32
    cpe:2.3:o:linux:linux_kernel:2.0.32
  • Linux Kernel 2.0.33
    cpe:2.3:o:linux:linux_kernel:2.0.33
  • Linux Kernel 2.0.34
    cpe:2.3:o:linux:linux_kernel:2.0.34
  • Linux Kernel 2.0.35
    cpe:2.3:o:linux:linux_kernel:2.0.35
  • Linux Kernel 2.0.36
    cpe:2.3:o:linux:linux_kernel:2.0.36
  • Linux Kernel 2.0.37
    cpe:2.3:o:linux:linux_kernel:2.0.37
  • Linux Kernel 2.0.38
    cpe:2.3:o:linux:linux_kernel:2.0.38
  • Linux Kernel 2.0.39
    cpe:2.3:o:linux:linux_kernel:2.0.39
  • Linux Kernel 2.1.0
    cpe:2.3:o:linux:linux_kernel:2.1.0
  • Linux Kernel 2.1.1
    cpe:2.3:o:linux:linux_kernel:2.1.1
  • Linux Kernel 2.1.2
    cpe:2.3:o:linux:linux_kernel:2.1.2
  • Linux Kernel 2.1.3
    cpe:2.3:o:linux:linux_kernel:2.1.3
  • Linux Kernel 2.1.4
    cpe:2.3:o:linux:linux_kernel:2.1.4
  • Linux Kernel 2.1.5
    cpe:2.3:o:linux:linux_kernel:2.1.5
  • Linux Kernel 2.1.6
    cpe:2.3:o:linux:linux_kernel:2.1.6
  • Linux Kernel 2.1.7
    cpe:2.3:o:linux:linux_kernel:2.1.7
  • Linux Kernel 2.1.8
    cpe:2.3:o:linux:linux_kernel:2.1.8
  • Linux Kernel 2.1.9
    cpe:2.3:o:linux:linux_kernel:2.1.9
  • Linux Kernel 2.1.10
    cpe:2.3:o:linux:linux_kernel:2.1.10
  • Linux Kernel 2.1.11
    cpe:2.3:o:linux:linux_kernel:2.1.11
  • Linux Kernel 2.1.12
    cpe:2.3:o:linux:linux_kernel:2.1.12
  • Linux Kernel 2.1.13
    cpe:2.3:o:linux:linux_kernel:2.1.13
  • Linux Kernel 2.1.14
    cpe:2.3:o:linux:linux_kernel:2.1.14
  • Linux Kernel 2.1.15
    cpe:2.3:o:linux:linux_kernel:2.1.15
  • Linux Kernel 2.1.16
    cpe:2.3:o:linux:linux_kernel:2.1.16
  • Linux Kernel 2.1.17
    cpe:2.3:o:linux:linux_kernel:2.1.17
  • Linux Kernel 2.1.18
    cpe:2.3:o:linux:linux_kernel:2.1.18
  • Linux Kernel 2.1.19
    cpe:2.3:o:linux:linux_kernel:2.1.19
  • Linux Kernel 2.1.20
    cpe:2.3:o:linux:linux_kernel:2.1.20
  • Linux Kernel 2.1.21
    cpe:2.3:o:linux:linux_kernel:2.1.21
  • Linux Kernel 2.1.22
    cpe:2.3:o:linux:linux_kernel:2.1.22
  • Linux Kernel 2.1.23
    cpe:2.3:o:linux:linux_kernel:2.1.23
  • Linux Kernel 2.1.24
    cpe:2.3:o:linux:linux_kernel:2.1.24
  • Linux Kernel 2.1.25
    cpe:2.3:o:linux:linux_kernel:2.1.25
  • Linux Kernel 2.1.26
    cpe:2.3:o:linux:linux_kernel:2.1.26
  • Linux Kernel 2.1.27
    cpe:2.3:o:linux:linux_kernel:2.1.27
  • Linux Kernel 2.1.28
    cpe:2.3:o:linux:linux_kernel:2.1.28
  • Linux Kernel 2.1.29
    cpe:2.3:o:linux:linux_kernel:2.1.29
  • Linux Kernel 2.1.30
    cpe:2.3:o:linux:linux_kernel:2.1.30
  • Linux Kernel 2.1.31
    cpe:2.3:o:linux:linux_kernel:2.1.31
  • Linux Kernel 2.1.32
    cpe:2.3:o:linux:linux_kernel:2.1.32
  • Linux Kernel 2.1.33
    cpe:2.3:o:linux:linux_kernel:2.1.33
  • Linux Kernel 2.1.34
    cpe:2.3:o:linux:linux_kernel:2.1.34
  • Linux Kernel 2.1.35
    cpe:2.3:o:linux:linux_kernel:2.1.35
  • Linux Kernel 2.1.36
    cpe:2.3:o:linux:linux_kernel:2.1.36
  • Linux Kernel 2.1.37
    cpe:2.3:o:linux:linux_kernel:2.1.37
  • Linux Kernel 2.1.38
    cpe:2.3:o:linux:linux_kernel:2.1.38
  • Linux Kernel 2.1.39
    cpe:2.3:o:linux:linux_kernel:2.1.39
  • Linux Kernel 2.1.40
    cpe:2.3:o:linux:linux_kernel:2.1.40
  • Linux Kernel 2.1.41
    cpe:2.3:o:linux:linux_kernel:2.1.41
  • Linux Kernel 2.1.42
    cpe:2.3:o:linux:linux_kernel:2.1.42
  • Linux Kernel 2.1.43
    cpe:2.3:o:linux:linux_kernel:2.1.43
  • Linux Kernel 2.1.44
    cpe:2.3:o:linux:linux_kernel:2.1.44
  • Linux Kernel 2.1.45
    cpe:2.3:o:linux:linux_kernel:2.1.45
  • Linux Kernel 2.1.46
    cpe:2.3:o:linux:linux_kernel:2.1.46
  • Linux Kernel 2.1.47
    cpe:2.3:o:linux:linux_kernel:2.1.47
  • Linux Kernel 2.1.48
    cpe:2.3:o:linux:linux_kernel:2.1.48
  • Linux Kernel 2.1.49
    cpe:2.3:o:linux:linux_kernel:2.1.49
  • Linux Kernel 2.1.50
    cpe:2.3:o:linux:linux_kernel:2.1.50
  • Linux Kernel 2.1.51
    cpe:2.3:o:linux:linux_kernel:2.1.51
  • Linux Kernel 2.1.52
    cpe:2.3:o:linux:linux_kernel:2.1.52
  • Linux Kernel 2.1.53
    cpe:2.3:o:linux:linux_kernel:2.1.53
  • Linux Kernel 2.1.54
    cpe:2.3:o:linux:linux_kernel:2.1.54
  • Linux Kernel 2.1.55
    cpe:2.3:o:linux:linux_kernel:2.1.55
  • Linux Kernel 2.1.56
    cpe:2.3:o:linux:linux_kernel:2.1.56
  • Linux Kernel 2.1.57
    cpe:2.3:o:linux:linux_kernel:2.1.57
  • Linux Kernel 2.1.58
    cpe:2.3:o:linux:linux_kernel:2.1.58
  • Linux Kernel 2.1.59
    cpe:2.3:o:linux:linux_kernel:2.1.59
  • Linux Kernel 2.1.60
    cpe:2.3:o:linux:linux_kernel:2.1.60
  • Linux Kernel 2.1.61
    cpe:2.3:o:linux:linux_kernel:2.1.61
  • Linux Kernel 2.1.62
    cpe:2.3:o:linux:linux_kernel:2.1.62
  • Linux Kernel 2.1.63
    cpe:2.3:o:linux:linux_kernel:2.1.63
  • Linux Kernel 2.1.64
    cpe:2.3:o:linux:linux_kernel:2.1.64
  • Linux Kernel 2.1.65
    cpe:2.3:o:linux:linux_kernel:2.1.65
  • Linux Kernel 2.1.66
    cpe:2.3:o:linux:linux_kernel:2.1.66
  • Linux Kernel 2.1.67
    cpe:2.3:o:linux:linux_kernel:2.1.67
  • Linux Kernel 2.1.68
    cpe:2.3:o:linux:linux_kernel:2.1.68
  • Linux Kernel 2.1.69
    cpe:2.3:o:linux:linux_kernel:2.1.69
  • Linux Kernel 2.1.70
    cpe:2.3:o:linux:linux_kernel:2.1.70
  • Linux Kernel 2.1.71
    cpe:2.3:o:linux:linux_kernel:2.1.71
  • Linux Kernel 2.1.72
    cpe:2.3:o:linux:linux_kernel:2.1.72
  • Linux Kernel 2.1.73
    cpe:2.3:o:linux:linux_kernel:2.1.73
  • Linux Kernel 2.1.74
    cpe:2.3:o:linux:linux_kernel:2.1.74
  • Linux Kernel 2.1.75
    cpe:2.3:o:linux:linux_kernel:2.1.75
  • Linux Kernel 2.1.76
    cpe:2.3:o:linux:linux_kernel:2.1.76
  • Linux Kernel 2.1.77
    cpe:2.3:o:linux:linux_kernel:2.1.77
  • Linux Kernel 2.1.78
    cpe:2.3:o:linux:linux_kernel:2.1.78
  • Linux Kernel 2.1.79
    cpe:2.3:o:linux:linux_kernel:2.1.79
  • Linux Kernel 2.1.80
    cpe:2.3:o:linux:linux_kernel:2.1.80
  • Linux Kernel 2.1.81
    cpe:2.3:o:linux:linux_kernel:2.1.81
  • Linux Kernel 2.1.82
    cpe:2.3:o:linux:linux_kernel:2.1.82
  • Linux Kernel 2.1.83
    cpe:2.3:o:linux:linux_kernel:2.1.83
  • Linux Kernel 2.1.84
    cpe:2.3:o:linux:linux_kernel:2.1.84
  • Linux Kernel 2.1.85
    cpe:2.3:o:linux:linux_kernel:2.1.85
  • Linux Kernel 2.1.86
    cpe:2.3:o:linux:linux_kernel:2.1.86
  • Linux Kernel 2.1.87
    cpe:2.3:o:linux:linux_kernel:2.1.87
  • Linux Kernel 2.1.88
    cpe:2.3:o:linux:linux_kernel:2.1.88
  • Linux Kernel 2.1.89
    cpe:2.3:o:linux:linux_kernel:2.1.89
  • Linux Kernel 2.1.90
    cpe:2.3:o:linux:linux_kernel:2.1.90
  • Linux Kernel 2.1.91
    cpe:2.3:o:linux:linux_kernel:2.1.91
  • Linux Kernel 2.1.92
    cpe:2.3:o:linux:linux_kernel:2.1.92
  • Linux Kernel 2.1.93
    cpe:2.3:o:linux:linux_kernel:2.1.93
  • Linux Kernel 2.1.94
    cpe:2.3:o:linux:linux_kernel:2.1.94
  • Linux Kernel 2.1.95
    cpe:2.3:o:linux:linux_kernel:2.1.95
  • Linux Kernel 2.1.96
    cpe:2.3:o:linux:linux_kernel:2.1.96
  • Linux Kernel 2.1.97
    cpe:2.3:o:linux:linux_kernel:2.1.97
  • Linux Kernel 2.1.98
    cpe:2.3:o:linux:linux_kernel:2.1.98
  • Linux Kernel 2.1.99
    cpe:2.3:o:linux:linux_kernel:2.1.99
  • Linux Kernel 2.1.100
    cpe:2.3:o:linux:linux_kernel:2.1.100
  • Linux Kernel 2.1.101
    cpe:2.3:o:linux:linux_kernel:2.1.101
  • Linux Kernel 2.1.102
    cpe:2.3:o:linux:linux_kernel:2.1.102
  • Linux Kernel 2.1.103
    cpe:2.3:o:linux:linux_kernel:2.1.103
  • Linux Kernel 2.1.104
    cpe:2.3:o:linux:linux_kernel:2.1.104
  • Linux Kernel 2.1.105
    cpe:2.3:o:linux:linux_kernel:2.1.105
  • Linux Kernel 2.1.106
    cpe:2.3:o:linux:linux_kernel:2.1.106
  • Linux Kernel 2.1.107
    cpe:2.3:o:linux:linux_kernel:2.1.107
  • Linux Kernel 2.1.108
    cpe:2.3:o:linux:linux_kernel:2.1.108
  • Linux Kernel 2.1.109
    cpe:2.3:o:linux:linux_kernel:2.1.109
  • Linux Kernel 2.1.110
    cpe:2.3:o:linux:linux_kernel:2.1.110
  • Linux Kernel 2.1.111
    cpe:2.3:o:linux:linux_kernel:2.1.111
  • Linux Kernel 2.1.112
    cpe:2.3:o:linux:linux_kernel:2.1.112
  • Linux Kernel 2.1.113
    cpe:2.3:o:linux:linux_kernel:2.1.113
  • Linux Kernel 2.1.114
    cpe:2.3:o:linux:linux_kernel:2.1.114
  • Linux Kernel 2.1.115
    cpe:2.3:o:linux:linux_kernel:2.1.115
  • Linux Kernel 2.1.116
    cpe:2.3:o:linux:linux_kernel:2.1.116
  • Linux Kernel 2.1.117
    cpe:2.3:o:linux:linux_kernel:2.1.117
  • Linux Kernel 2.1.118
    cpe:2.3:o:linux:linux_kernel:2.1.118
  • Linux Kernel 2.1.119
    cpe:2.3:o:linux:linux_kernel:2.1.119
  • Linux Kernel 2.1.120
    cpe:2.3:o:linux:linux_kernel:2.1.120
  • Linux Kernel 2.1.121
    cpe:2.3:o:linux:linux_kernel:2.1.121
  • Linux Kernel 2.1.122
    cpe:2.3:o:linux:linux_kernel:2.1.122
  • Linux Kernel 2.1.123
    cpe:2.3:o:linux:linux_kernel:2.1.123
  • Linux Kernel 2.1.124
    cpe:2.3:o:linux:linux_kernel:2.1.124
  • Linux Kernel 2.1.125
    cpe:2.3:o:linux:linux_kernel:2.1.125
  • Linux Kernel 2.1.126
    cpe:2.3:o:linux:linux_kernel:2.1.126
  • Linux Kernel 2.1.127
    cpe:2.3:o:linux:linux_kernel:2.1.127
  • Linux Kernel 2.1.128
    cpe:2.3:o:linux:linux_kernel:2.1.128
  • Linux Kernel 2.1.129
    cpe:2.3:o:linux:linux_kernel:2.1.129
  • Linux Kernel 2.1.130
    cpe:2.3:o:linux:linux_kernel:2.1.130
  • Linux Kernel 2.1.131
    cpe:2.3:o:linux:linux_kernel:2.1.131
  • Linux Kernel 2.1.132
    cpe:2.3:o:linux:linux_kernel:2.1.132
  • Linux Kernel 2.2
    cpe:2.3:o:linux:linux_kernel:2.2.0
  • Linux Kernel 2.2.1
    cpe:2.3:o:linux:linux_kernel:2.2.1
  • Linux Kernel 2.2.2
    cpe:2.3:o:linux:linux_kernel:2.2.2
  • Linux Kernel 2.2.3
    cpe:2.3:o:linux:linux_kernel:2.2.3
  • Linux Kernel 2.2.4
    cpe:2.3:o:linux:linux_kernel:2.2.4
  • Linux Kernel 2.2.4 rc1
    cpe:2.3:o:linux:linux_kernel:2.2.4:rc1
  • Linux Kernel 2.2.5
    cpe:2.3:o:linux:linux_kernel:2.2.5
  • Linux Kernel 2.2.6
    cpe:2.3:o:linux:linux_kernel:2.2.6
  • Linux Kernel 2.2.7
    cpe:2.3:o:linux:linux_kernel:2.2.7
  • Linux Kernel 2.2.8
    cpe:2.3:o:linux:linux_kernel:2.2.8
  • Linux Kernel 2.2.9
    cpe:2.3:o:linux:linux_kernel:2.2.9
  • Linux Kernel 2.2.10
    cpe:2.3:o:linux:linux_kernel:2.2.10
  • Linux Kernel 2.2.11
    cpe:2.3:o:linux:linux_kernel:2.2.11
  • Linux Kernel 2.2.12
    cpe:2.3:o:linux:linux_kernel:2.2.12
  • Linux Kernel 2.2.13
    cpe:2.3:o:linux:linux_kernel:2.2.13
  • Linux Kernel 2.2.13 pre15
    cpe:2.3:o:linux:linux_kernel:2.2.13:pre15
  • Linux Kernel 2.2.14
    cpe:2.3:o:linux:linux_kernel:2.2.14
  • Linux Kernel 2.2.15
    cpe:2.3:o:linux:linux_kernel:2.2.15
  • Linux Kernel 2.2.15 pre16
    cpe:2.3:o:linux:linux_kernel:2.2.15:pre16
  • Linux Kernel 2.2.16
    cpe:2.3:o:linux:linux_kernel:2.2.16
  • Linux Kernel 2.2.16 pre5
    cpe:2.3:o:linux:linux_kernel:2.2.16:pre5
  • Linux Kernel 2.2.16 pre6
    cpe:2.3:o:linux:linux_kernel:2.2.16:pre6
  • Linux Kernel 2.2.17
    cpe:2.3:o:linux:linux_kernel:2.2.17
  • Linux Kernel 2.2.17.14
    cpe:2.3:o:linux:linux_kernel:2.2.17:pre14
  • Linux Kernel 2.2.18
    cpe:2.3:o:linux:linux_kernel:2.2.18
  • Linux Kernel 2.2.19
    cpe:2.3:o:linux:linux_kernel:2.2.19
  • Linux Kernel 2.2.20
    cpe:2.3:o:linux:linux_kernel:2.2.20
  • Linux Kernel 2.2.21
    cpe:2.3:o:linux:linux_kernel:2.2.21
  • Linux Kernel 2.2.21 pre1
    cpe:2.3:o:linux:linux_kernel:2.2.21:pre1
  • Linux Kernel 2.2.21 pre2
    cpe:2.3:o:linux:linux_kernel:2.2.21:pre2
  • Linux Kernel 2.2.21 pre3
    cpe:2.3:o:linux:linux_kernel:2.2.21:pre3
  • Linux Kernel 2.2.21 pre4
    cpe:2.3:o:linux:linux_kernel:2.2.21:pre4
  • Linux Kernel 2.2.21 rc1
    cpe:2.3:o:linux:linux_kernel:2.2.21:rc1
  • Linux Kernel 2.2.21 rc2
    cpe:2.3:o:linux:linux_kernel:2.2.21:rc2
  • Linux Kernel 2.2.21 rc3
    cpe:2.3:o:linux:linux_kernel:2.2.21:rc3
  • Linux Kernel 2.2.21 rc4
    cpe:2.3:o:linux:linux_kernel:2.2.21:rc4
  • Linux Kernel 2.2.22
    cpe:2.3:o:linux:linux_kernel:2.2.22
  • Linux Kernel 2.2.22 rc1
    cpe:2.3:o:linux:linux_kernel:2.2.22:rc1
  • Linux Kernel 2.2.22 rc2
    cpe:2.3:o:linux:linux_kernel:2.2.22:rc2
  • Linux Kernel 2.2.22 rc3
    cpe:2.3:o:linux:linux_kernel:2.2.22:rc3
  • Linux Kernel 2.2.23
    cpe:2.3:o:linux:linux_kernel:2.2.23
  • Linux Kernel 2.2.23 rc1
    cpe:2.3:o:linux:linux_kernel:2.2.23:rc1
  • Linux Kernel 2.2.23 rc2
    cpe:2.3:o:linux:linux_kernel:2.2.23:rc2
  • Linux Kernel 2.2.24
    cpe:2.3:o:linux:linux_kernel:2.2.24
  • Linux Kernel 2.2.24 rc2
    cpe:2.3:o:linux:linux_kernel:2.2.24:rc2
  • Linux Kernel 2.2.24 rc3
    cpe:2.3:o:linux:linux_kernel:2.2.24:rc3
  • Linux Kernel 2.2.24 rc4
    cpe:2.3:o:linux:linux_kernel:2.2.24:rc4
  • Linux Kernel 2.2.24 rc5
    cpe:2.3:o:linux:linux_kernel:2.2.24:rc5
  • Linux Kernel 2.2.25
    cpe:2.3:o:linux:linux_kernel:2.2.25
  • Linux Kernel 2.2.26
    cpe:2.3:o:linux:linux_kernel:2.2.26
  • Linux Kernel 2.2.27 pre1
    cpe:2.3:o:linux:linux_kernel:2.2.27:pre1
  • Linux Kernel 2.2.27 pre2
    cpe:2.3:o:linux:linux_kernel:2.2.27:pre2
  • Linux Kernel 2.2.27 rc1
    cpe:2.3:o:linux:linux_kernel:2.2.27:rc1
  • Linux Kernel 2.2.27 rc2
    cpe:2.3:o:linux:linux_kernel:2.2.27:rc2
  • Linux Kernel 2.3
    cpe:2.3:o:linux:linux_kernel:2.3.0
  • Linux Kernel 2.3.1
    cpe:2.3:o:linux:linux_kernel:2.3.1
  • Linux Kernel 2.3.2
    cpe:2.3:o:linux:linux_kernel:2.3.2
  • Linux Kernel 2.3.3
    cpe:2.3:o:linux:linux_kernel:2.3.3
  • Linux Kernel 2.3.4
    cpe:2.3:o:linux:linux_kernel:2.3.4
  • Linux Kernel 2.3.5
    cpe:2.3:o:linux:linux_kernel:2.3.5
  • Linux Kernel 2.3.6
    cpe:2.3:o:linux:linux_kernel:2.3.6
  • Linux Kernel 2.3.7
    cpe:2.3:o:linux:linux_kernel:2.3.7
  • Linux Kernel 2.3.8
    cpe:2.3:o:linux:linux_kernel:2.3.8
  • Linux Kernel 2.3.9
    cpe:2.3:o:linux:linux_kernel:2.3.9
  • Linux Kernel 2.3.10
    cpe:2.3:o:linux:linux_kernel:2.3.10
  • Linux Kernel 2.3.11
    cpe:2.3:o:linux:linux_kernel:2.3.11
  • Linux Kernel 2.3.12
    cpe:2.3:o:linux:linux_kernel:2.3.12
  • Linux Kernel 2.3.13
    cpe:2.3:o:linux:linux_kernel:2.3.13
  • Linux Kernel 2.3.14
    cpe:2.3:o:linux:linux_kernel:2.3.14
  • Linux Kernel 2.3.15
    cpe:2.3:o:linux:linux_kernel:2.3.15
  • Linux Kernel 2.3.16
    cpe:2.3:o:linux:linux_kernel:2.3.16
  • Linux Kernel 2.3.17
    cpe:2.3:o:linux:linux_kernel:2.3.17
  • Linux Kernel 2.3.18
    cpe:2.3:o:linux:linux_kernel:2.3.18
  • Linux Kernel 2.3.19
    cpe:2.3:o:linux:linux_kernel:2.3.19
  • Linux Kernel 2.3.20
    cpe:2.3:o:linux:linux_kernel:2.3.20
  • Linux Kernel 2.3.21
    cpe:2.3:o:linux:linux_kernel:2.3.21
  • Linux Kernel 2.3.22
    cpe:2.3:o:linux:linux_kernel:2.3.22
  • Linux Kernel 2.3.23
    cpe:2.3:o:linux:linux_kernel:2.3.23
  • Linux Kernel 2.3.24
    cpe:2.3:o:linux:linux_kernel:2.3.24
  • Linux Kernel 2.3.25
    cpe:2.3:o:linux:linux_kernel:2.3.25
  • Linux Kernel 2.3.26
    cpe:2.3:o:linux:linux_kernel:2.3.26
  • Linux Kernel 2.3.27
    cpe:2.3:o:linux:linux_kernel:2.3.27
  • Linux Kernel 2.3.28
    cpe:2.3:o:linux:linux_kernel:2.3.28
  • Linux Kernel 2.3.29
    cpe:2.3:o:linux:linux_kernel:2.3.29
  • Linux Kernel 2.3.30
    cpe:2.3:o:linux:linux_kernel:2.3.30
  • Linux Kernel 2.3.31
    cpe:2.3:o:linux:linux_kernel:2.3.31
  • Linux Kernel 2.3.32
    cpe:2.3:o:linux:linux_kernel:2.3.32
  • Linux Kernel 2.3.33
    cpe:2.3:o:linux:linux_kernel:2.3.33
  • Linux Kernel 2.3.34
    cpe:2.3:o:linux:linux_kernel:2.3.34
  • Linux Kernel 2.3.35
    cpe:2.3:o:linux:linux_kernel:2.3.35
  • Linux Kernel 2.3.36
    cpe:2.3:o:linux:linux_kernel:2.3.36
  • Linux Kernel 2.3.37
    cpe:2.3:o:linux:linux_kernel:2.3.37
  • Linux Kernel 2.3.38
    cpe:2.3:o:linux:linux_kernel:2.3.38
  • Linux Kernel 2.3.39
    cpe:2.3:o:linux:linux_kernel:2.3.39
  • Linux Kernel 2.3.40
    cpe:2.3:o:linux:linux_kernel:2.3.40
  • Linux Kernel 2.3.41
    cpe:2.3:o:linux:linux_kernel:2.3.41
  • Linux Kernel 2.3.42
    cpe:2.3:o:linux:linux_kernel:2.3.42
  • Linux Kernel 2.3.43
    cpe:2.3:o:linux:linux_kernel:2.3.43
  • Linux Kernel 2.3.44
    cpe:2.3:o:linux:linux_kernel:2.3.44
  • Linux Kernel 2.3.45
    cpe:2.3:o:linux:linux_kernel:2.3.45
  • Linux Kernel 2.3.46
    cpe:2.3:o:linux:linux_kernel:2.3.46
  • Linux Kernel 2.3.47
    cpe:2.3:o:linux:linux_kernel:2.3.47
  • Linux Kernel 2.3.48
    cpe:2.3:o:linux:linux_kernel:2.3.48
  • Linux Kernel 2.3.49
    cpe:2.3:o:linux:linux_kernel:2.3.49
  • Linux Kernel 2.3.50
    cpe:2.3:o:linux:linux_kernel:2.3.50
  • Linux Kernel 2.3.51
    cpe:2.3:o:linux:linux_kernel:2.3.51
  • Linux Kernel 2.3.99
    cpe:2.3:o:linux:linux_kernel:2.3.99
  • Linux Kernel 2.3.99 pre1
    cpe:2.3:o:linux:linux_kernel:2.3.99:pre1
  • Linux Kernel 2.3.99 pre2
    cpe:2.3:o:linux:linux_kernel:2.3.99:pre2
  • Linux Kernel 2.3.99 pre3
    cpe:2.3:o:linux:linux_kernel:2.3.99:pre3
  • Linux Kernel 2.3.99 pre4
    cpe:2.3:o:linux:linux_kernel:2.3.99:pre4
  • Linux Kernel 2.3.99 pre5
    cpe:2.3:o:linux:linux_kernel:2.3.99:pre5
  • Linux Kernel 2.3.99 pre6
    cpe:2.3:o:linux:linux_kernel:2.3.99:pre6
  • Linux Kernel 2.3.99 pre7
    cpe:2.3:o:linux:linux_kernel:2.3.99:pre7
  • Linux Kernel 2.3.99 pre8
    cpe:2.3:o:linux:linux_kernel:2.3.99:pre8
  • Linux Kernel 2.3.99 pre9
    cpe:2.3:o:linux:linux_kernel:2.3.99:pre9
  • Linux Kernel 2.4.0
    cpe:2.3:o:linux:linux_kernel:2.4.0
  • Linux Kernel 2.4.0 test1
    cpe:2.3:o:linux:linux_kernel:2.4.0:test1
  • Linux Kernel 2.4.0 test10
    cpe:2.3:o:linux:linux_kernel:2.4.0:test10
  • Linux Kernel 2.4.0 test11
    cpe:2.3:o:linux:linux_kernel:2.4.0:test11
  • Linux Kernel 2.4.0 test12
    cpe:2.3:o:linux:linux_kernel:2.4.0:test12
  • Linux Kernel 2.4.0 test2
    cpe:2.3:o:linux:linux_kernel:2.4.0:test2
  • Linux Kernel 2.4.0 test3
    cpe:2.3:o:linux:linux_kernel:2.4.0:test3
  • Linux Kernel 2.4.0 test4
    cpe:2.3:o:linux:linux_kernel:2.4.0:test4
  • Linux Kernel 2.4.0 test5
    cpe:2.3:o:linux:linux_kernel:2.4.0:test5
  • Linux Kernel 2.4.0 test6
    cpe:2.3:o:linux:linux_kernel:2.4.0:test6
  • Linux Kernel 2.4.0 test7
    cpe:2.3:o:linux:linux_kernel:2.4.0:test7
  • Linux Kernel 2.4.0 test8
    cpe:2.3:o:linux:linux_kernel:2.4.0:test8
  • Linux Kernel 2.4.0 test9
    cpe:2.3:o:linux:linux_kernel:2.4.0:test9
  • Linux Kernel 2.4.1
    cpe:2.3:o:linux:linux_kernel:2.4.1
  • Linux Kernel 2.4.2
    cpe:2.3:o:linux:linux_kernel:2.4.2
  • Linux Kernel 2.4.3
    cpe:2.3:o:linux:linux_kernel:2.4.3
  • Linux Kernel 2.4.3 pre3
    cpe:2.3:o:linux:linux_kernel:2.4.3:pre3
  • Linux Kernel 2.4.4
    cpe:2.3:o:linux:linux_kernel:2.4.4
  • Linux Kernel 2.4.5
    cpe:2.3:o:linux:linux_kernel:2.4.5
  • Linux Kernel 2.4.6
    cpe:2.3:o:linux:linux_kernel:2.4.6
  • Linux Kernel 2.4.7
    cpe:2.3:o:linux:linux_kernel:2.4.7
  • Linux Kernel 2.4.8
    cpe:2.3:o:linux:linux_kernel:2.4.8
  • Linux Kernel 2.4.9
    cpe:2.3:o:linux:linux_kernel:2.4.9
  • Linux Kernel 2.4.10
    cpe:2.3:o:linux:linux_kernel:2.4.10
  • Linux Kernel 2.4.11
    cpe:2.3:o:linux:linux_kernel:2.4.11
  • Linux Kernel 2.4.11 pre3
    cpe:2.3:o:linux:linux_kernel:2.4.11:pre3
  • Linux Kernel 2.4.12
    cpe:2.3:o:linux:linux_kernel:2.4.12
  • Linux Kernel 2.4.13
    cpe:2.3:o:linux:linux_kernel:2.4.13
  • Linux Kernel 2.4.14
    cpe:2.3:o:linux:linux_kernel:2.4.14
  • Linux Kernel 2.4.15
    cpe:2.3:o:linux:linux_kernel:2.4.15
  • Linux Kernel 2.4.16
    cpe:2.3:o:linux:linux_kernel:2.4.16
  • Linux Kernel 2.4.17
    cpe:2.3:o:linux:linux_kernel:2.4.17
  • Linux Kernel 2.4.18
    cpe:2.3:o:linux:linux_kernel:2.4.18
  • Linux Kernel 2.4.18 pre1
    cpe:2.3:o:linux:linux_kernel:2.4.18:pre1
  • Linux Kernel 2.4.18 pre2
    cpe:2.3:o:linux:linux_kernel:2.4.18:pre2
  • Linux Kernel 2.4.18 pre3
    cpe:2.3:o:linux:linux_kernel:2.4.18:pre3
  • Linux Kernel 2.4.18 pre4
    cpe:2.3:o:linux:linux_kernel:2.4.18:pre4
  • Linux Kernel 2.4.18 pre5
    cpe:2.3:o:linux:linux_kernel:2.4.18:pre5
  • Linux Kernel 2.4.18 pre6
    cpe:2.3:o:linux:linux_kernel:2.4.18:pre6
  • Linux Kernel 2.4.18 pre7
    cpe:2.3:o:linux:linux_kernel:2.4.18:pre7
  • Linux Kernel 2.4.18 pre8
    cpe:2.3:o:linux:linux_kernel:2.4.18:pre8
  • Linux Kernel 2.4.18 pre9
    cpe:2.3:o:linux:linux_kernel:2.4.18:pre9
  • Linux Kernel 2.4.19
    cpe:2.3:o:linux:linux_kernel:2.4.19
  • Linux Kernel 2.4.19 pre1
    cpe:2.3:o:linux:linux_kernel:2.4.19:pre1
  • Linux Kernel 2.4.19 pre2
    cpe:2.3:o:linux:linux_kernel:2.4.19:pre2
  • Linux Kernel 2.4.19 pre3
    cpe:2.3:o:linux:linux_kernel:2.4.19:pre3
  • Linux Kernel 2.4.19 pre4
    cpe:2.3:o:linux:linux_kernel:2.4.19:pre4
  • Linux Kernel 2.4.19 pre5
    cpe:2.3:o:linux:linux_kernel:2.4.19:pre5
  • Linux Kernel 2.4.19 pre6
    cpe:2.3:o:linux:linux_kernel:2.4.19:pre6
  • Linux Kernel 2.4.20
    cpe:2.3:o:linux:linux_kernel:2.4.20
  • Linux Kernel 2.4.21
    cpe:2.3:o:linux:linux_kernel:2.4.21
  • Linux Kernel 2.4.21 pre1
    cpe:2.3:o:linux:linux_kernel:2.4.21:pre1
  • Linux Kernel 2.4.21 pre4
    cpe:2.3:o:linux:linux_kernel:2.4.21:pre4
  • Linux Kernel 2.4.21 pre7
    cpe:2.3:o:linux:linux_kernel:2.4.21:pre7
  • Linux Kernel 2.4.22
    cpe:2.3:o:linux:linux_kernel:2.4.22
  • Linux Kernel 2.4.22 pre10
    cpe:2.3:o:linux:linux_kernel:2.4.22:pre10
  • Linux Kernel 2.4.23
    cpe:2.3:o:linux:linux_kernel:2.4.23
  • Linux Kernel 2.4.23 pre9
    cpe:2.3:o:linux:linux_kernel:2.4.23:pre9
  • Linux Kernel 2.4.24
    cpe:2.3:o:linux:linux_kernel:2.4.24
  • Linux Kernel 2.4.25
    cpe:2.3:o:linux:linux_kernel:2.4.25
  • Linux Kernel 2.4.26
    cpe:2.3:o:linux:linux_kernel:2.4.26
  • Linux Kernel 2.4.27
    cpe:2.3:o:linux:linux_kernel:2.4.27
  • Linux Kernel 2.4.27 pre1
    cpe:2.3:o:linux:linux_kernel:2.4.27:pre1
  • Linux Kernel 2.4.27 pre2
    cpe:2.3:o:linux:linux_kernel:2.4.27:pre2
  • Linux Kernel 2.4.27 pre3
    cpe:2.3:o:linux:linux_kernel:2.4.27:pre3
  • Linux Kernel 2.4.27 pre4
    cpe:2.3:o:linux:linux_kernel:2.4.27:pre4
  • Linux Kernel 2.4.27 pre5
    cpe:2.3:o:linux:linux_kernel:2.4.27:pre5
  • Linux Kernel 2.4.28
    cpe:2.3:o:linux:linux_kernel:2.4.28
  • Linux Kernel 2.4.29
    cpe:2.3:o:linux:linux_kernel:2.4.29
  • Linux Kernel 2.4.29 rc1
    cpe:2.3:o:linux:linux_kernel:2.4.29:rc1
  • Linux Kernel 2.4.29 rc2
    cpe:2.3:o:linux:linux_kernel:2.4.29:rc2
  • Linux Kernel 2.4.30
    cpe:2.3:o:linux:linux_kernel:2.4.30
  • Linux Kernel 2.4.30 rc2
    cpe:2.3:o:linux:linux_kernel:2.4.30:rc2
  • Linux Kernel 2.4.30 rc3
    cpe:2.3:o:linux:linux_kernel:2.4.30:rc3
  • Linux Kernel 2.4.31
    cpe:2.3:o:linux:linux_kernel:2.4.31
  • Linux Kernel 2.4.31 pre1
    cpe:2.3:o:linux:linux_kernel:2.4.31:pre1
  • Linux Kernel 2.4.32
    cpe:2.3:o:linux:linux_kernel:2.4.32
  • Linux Kernel 2.4.32 pre1
    cpe:2.3:o:linux:linux_kernel:2.4.32:pre1
  • Linux Kernel 2.4.32 pre2
    cpe:2.3:o:linux:linux_kernel:2.4.32:pre2
  • Linux Kernel 2.4.33
    cpe:2.3:o:linux:linux_kernel:2.4.33
  • Linux Kernel 2.4.33 pre1
    cpe:2.3:o:linux:linux_kernel:2.4.33:pre1
  • Linux Kernel 2.4.33.1
    cpe:2.3:o:linux:linux_kernel:2.4.33.1
  • Linux Kernel 2.4.33.2
    cpe:2.3:o:linux:linux_kernel:2.4.33.2
  • Linux Kernel 2.4.33.3
    cpe:2.3:o:linux:linux_kernel:2.4.33.3
  • Linux Kernel 2.4.33.4
    cpe:2.3:o:linux:linux_kernel:2.4.33.4
  • Linux Kernel 2.4.33.5
    cpe:2.3:o:linux:linux_kernel:2.4.33.5
  • Linux Kernel 2.4.34
    cpe:2.3:o:linux:linux_kernel:2.4.34
  • Linux Kernel 2.4.34 rc3
    cpe:2.3:o:linux:linux_kernel:2.4.34:rc3
  • Linux Kernel 2.4.34.1
    cpe:2.3:o:linux:linux_kernel:2.4.34.1
  • Linux Kernel 2.4.34.2
    cpe:2.3:o:linux:linux_kernel:2.4.34.2
  • Linux Kernel 2.4.35
    cpe:2.3:o:linux:linux_kernel:2.4.35
  • Linux Kernel 2.4.35.2
    cpe:2.3:o:linux:linux_kernel:2.4.35.2
  • Linux Kernel 2.5.0
    cpe:2.3:o:linux:linux_kernel:2.5.0
  • Linux Kernel 2.5.1
    cpe:2.3:o:linux:linux_kernel:2.5.1
  • Linux Kernel 2.5.2
    cpe:2.3:o:linux:linux_kernel:2.5.2
  • Linux Kernel 2.5.3
    cpe:2.3:o:linux:linux_kernel:2.5.3
  • Linux Kernel 2.5.4
    cpe:2.3:o:linux:linux_kernel:2.5.4
  • Linux Kernel 2.5.5
    cpe:2.3:o:linux:linux_kernel:2.5.5
  • Linux Kernel 2.5.6
    cpe:2.3:o:linux:linux_kernel:2.5.6
  • Linux Kernel 2.5.7
    cpe:2.3:o:linux:linux_kernel:2.5.7
  • Linux Kernel 2.5.8
    cpe:2.3:o:linux:linux_kernel:2.5.8
  • Linux Kernel 2.5.9
    cpe:2.3:o:linux:linux_kernel:2.5.9
  • Linux Kernel 2.5.10
    cpe:2.3:o:linux:linux_kernel:2.5.10
  • Linux Kernel 2.5.11
    cpe:2.3:o:linux:linux_kernel:2.5.11
  • Linux Kernel 2.5.12
    cpe:2.3:o:linux:linux_kernel:2.5.12
  • Linux Kernel 2.5.13
    cpe:2.3:o:linux:linux_kernel:2.5.13
  • Linux Kernel 2.5.14
    cpe:2.3:o:linux:linux_kernel:2.5.14
  • Linux Kernel 2.5.15
    cpe:2.3:o:linux:linux_kernel:2.5.15
  • Linux Kernel 2.5.16
    cpe:2.3:o:linux:linux_kernel:2.5.16
  • Linux Kernel 2.5.17
    cpe:2.3:o:linux:linux_kernel:2.5.17
  • Linux Kernel 2.5.18
    cpe:2.3:o:linux:linux_kernel:2.5.18
  • Linux Kernel 2.5.19
    cpe:2.3:o:linux:linux_kernel:2.5.19
  • Linux Kernel 2.5.20
    cpe:2.3:o:linux:linux_kernel:2.5.20
  • Linux Kernel 2.5.21
    cpe:2.3:o:linux:linux_kernel:2.5.21
  • Linux Kernel 2.5.22
    cpe:2.3:o:linux:linux_kernel:2.5.22
  • Linux Kernel 2.5.23
    cpe:2.3:o:linux:linux_kernel:2.5.23
  • Linux Kernel 2.5.24
    cpe:2.3:o:linux:linux_kernel:2.5.24
  • Linux Kernel 2.5.25
    cpe:2.3:o:linux:linux_kernel:2.5.25
  • Linux Kernel 2.5.26
    cpe:2.3:o:linux:linux_kernel:2.5.26
  • Linux Kernel 2.5.27
    cpe:2.3:o:linux:linux_kernel:2.5.27
  • Linux Kernel 2.5.28
    cpe:2.3:o:linux:linux_kernel:2.5.28
  • Linux Kernel 2.5.29
    cpe:2.3:o:linux:linux_kernel:2.5.29
  • Linux Kernel 2.5.30
    cpe:2.3:o:linux:linux_kernel:2.5.30
  • Linux Kernel 2.5.31
    cpe:2.3:o:linux:linux_kernel:2.5.31
  • Linux Kernel 2.5.32
    cpe:2.3:o:linux:linux_kernel:2.5.32
  • Linux Kernel 2.5.33
    cpe:2.3:o:linux:linux_kernel:2.5.33
  • Linux Kernel 2.5.34
    cpe:2.3:o:linux:linux_kernel:2.5.34
  • Linux Kernel 2.5.35
    cpe:2.3:o:linux:linux_kernel:2.5.35
  • Linux Kernel 2.5.36
    cpe:2.3:o:linux:linux_kernel:2.5.36
  • Linux Kernel 2.5.37
    cpe:2.3:o:linux:linux_kernel:2.5.37
  • Linux Kernel 2.5.38
    cpe:2.3:o:linux:linux_kernel:2.5.38
  • Linux Kernel 2.5.39
    cpe:2.3:o:linux:linux_kernel:2.5.39
  • Linux Kernel 2.5.40
    cpe:2.3:o:linux:linux_kernel:2.5.40
  • Linux Kernel 2.5.41
    cpe:2.3:o:linux:linux_kernel:2.5.41
  • Linux Kernel 2.5.42
    cpe:2.3:o:linux:linux_kernel:2.5.42
  • Linux Kernel 2.5.43
    cpe:2.3:o:linux:linux_kernel:2.5.43
  • Linux Kernel 2.5.44
    cpe:2.3:o:linux:linux_kernel:2.5.44
  • Linux Kernel 2.5.45
    cpe:2.3:o:linux:linux_kernel:2.5.45
  • Linux Kernel 2.5.46
    cpe:2.3:o:linux:linux_kernel:2.5.46
  • Linux Kernel 2.5.47
    cpe:2.3:o:linux:linux_kernel:2.5.47
  • Linux Kernel 2.5.48
    cpe:2.3:o:linux:linux_kernel:2.5.48
  • Linux Kernel 2.5.49
    cpe:2.3:o:linux:linux_kernel:2.5.49
  • Linux Kernel 2.5.50
    cpe:2.3:o:linux:linux_kernel:2.5.50
  • Linux Kernel 2.5.51
    cpe:2.3:o:linux:linux_kernel:2.5.51
  • Linux Kernel 2.5.52
    cpe:2.3:o:linux:linux_kernel:2.5.52
  • Linux Kernel 2.5.53
    cpe:2.3:o:linux:linux_kernel:2.5.53
  • Linux Kernel 2.5.54
    cpe:2.3:o:linux:linux_kernel:2.5.54
  • Linux Kernel 2.5.55
    cpe:2.3:o:linux:linux_kernel:2.5.55
  • Linux Kernel 2.5.56
    cpe:2.3:o:linux:linux_kernel:2.5.56
  • Linux Kernel 2.5.57
    cpe:2.3:o:linux:linux_kernel:2.5.57
  • Linux Kernel 2.5.58
    cpe:2.3:o:linux:linux_kernel:2.5.58
  • Linux Kernel 2.5.59
    cpe:2.3:o:linux:linux_kernel:2.5.59
  • Linux Kernel 2.5.60
    cpe:2.3:o:linux:linux_kernel:2.5.60
  • Linux Kernel 2.5.61
    cpe:2.3:o:linux:linux_kernel:2.5.61
  • Linux Kernel 2.5.62
    cpe:2.3:o:linux:linux_kernel:2.5.62
  • Linux Kernel 2.5.63
    cpe:2.3:o:linux:linux_kernel:2.5.63
  • Linux Kernel 2.5.64
    cpe:2.3:o:linux:linux_kernel:2.5.64
  • Linux Kernel 2.5.65
    cpe:2.3:o:linux:linux_kernel:2.5.65
  • Linux Kernel 2.5.66
    cpe:2.3:o:linux:linux_kernel:2.5.66
  • Linux Kernel 2.5.67
    cpe:2.3:o:linux:linux_kernel:2.5.67
  • Linux Kernel 2.5.68
    cpe:2.3:o:linux:linux_kernel:2.5.68
  • Linux Kernel 2.5.69
    cpe:2.3:o:linux:linux_kernel:2.5.69
  • Linux Kernel 2.5.75
    cpe:2.3:o:linux:linux_kernel:2.5.75
  • Linux Kernel 2.6.0
    cpe:2.3:o:linux:linux_kernel:2.6.0
  • Linux Kernel 2.6 test1
    cpe:2.3:o:linux:linux_kernel:2.6.0:test1
  • Linux Kernel 2.6 test10
    cpe:2.3:o:linux:linux_kernel:2.6.0:test10
  • Linux Kernel 2.6 test11
    cpe:2.3:o:linux:linux_kernel:2.6.0:test11
  • Linux Kernel 2.6 test2
    cpe:2.3:o:linux:linux_kernel:2.6.0:test2
  • Linux Kernel 2.6 test3
    cpe:2.3:o:linux:linux_kernel:2.6.0:test3
  • Linux Kernel 2.6 test4
    cpe:2.3:o:linux:linux_kernel:2.6.0:test4
  • Linux Kernel 2.6 test5
    cpe:2.3:o:linux:linux_kernel:2.6.0:test5
  • Linux Kernel 2.6 test6
    cpe:2.3:o:linux:linux_kernel:2.6.0:test6
  • Linux Kernel 2.6 test7
    cpe:2.3:o:linux:linux_kernel:2.6.0:test7
  • Linux Kernel 2.6 test8
    cpe:2.3:o:linux:linux_kernel:2.6.0:test8
  • Linux Kernel 2.6 test9
    cpe:2.3:o:linux:linux_kernel:2.6.0:test9
  • Linux Kernel 2.6.1
    cpe:2.3:o:linux:linux_kernel:2.6.1
  • Linux Kernel 2.6.1 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.1:rc1
  • Linux Kernel 2.6.1 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.1:rc2
  • Linux Kernel 2.6.1 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.1:rc3
  • Linux Kernel 2.6.2
    cpe:2.3:o:linux:linux_kernel:2.6.2
  • Linux Kernel 2.6.2 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.2:rc1
  • Linux Kernel 2.6.2 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.2:rc2
  • Linux Kernel 2.6.2 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.2:rc3
  • Linux Kernel 2.6.3
    cpe:2.3:o:linux:linux_kernel:2.6.3
  • Linux Kernel 2.6.3 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.3:rc1
  • Linux Kernel 2.6.3 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.3:rc2
  • Linux Kernel 2.6.3 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.3:rc3
  • Linux Kernel 2.6.3 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.3:rc4
  • Linux Kernel 2.6.4
    cpe:2.3:o:linux:linux_kernel:2.6.4
  • Linux Kernel 2.6.4 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.4:rc1
  • Linux Kernel 2.6.4 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.4:rc2
  • Linux Kernel 2.6.4 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.4:rc3
  • Linux Kernel 2.6.5
    cpe:2.3:o:linux:linux_kernel:2.6.5
  • Linux Kernel 2.6.5 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.5:rc1
  • Linux Kernel 2.6.5 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.5:rc2
  • Linux Kernel 2.6.5 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.5:rc3
  • Linux Kernel 2.6.6
    cpe:2.3:o:linux:linux_kernel:2.6.6
  • Linux Kernel 2.6.6 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.6:rc1
  • Linux Kernel 2.6.6 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.6:rc2
  • Linux Kernel 2.6.6 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.6:rc3
  • Linux Kernel 2.6.7
    cpe:2.3:o:linux:linux_kernel:2.6.7
  • Linux Kernel 2.6.7 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.7:rc1
  • Linux Kernel 2.6.7 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.7:rc2
  • Linux Kernel 2.6.7 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.7:rc3
  • Linux Kernel 2.6.8
    cpe:2.3:o:linux:linux_kernel:2.6.8
  • Linux Kernel 2.6.8 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.8:rc1
  • Linux Kernel 2.6.8 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.8:rc2
  • Linux Kernel 2.6.8 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.8:rc3
  • Linux Kernel 2.6.8 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.8:rc4
  • Linux Kernel 2.6.8.1
    cpe:2.3:o:linux:linux_kernel:2.6.8.1
  • Linux Kernel 2.6.9
    cpe:2.3:o:linux:linux_kernel:2.6.9
  • Linux Kernel 2.6.9
    cpe:2.3:o:linux:linux_kernel:2.6.9:final
  • Linux Kernel 2.6.9 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.9:rc1
  • Linux Kernel 2.6.9 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.9:rc2
  • Linux Kernel 2.6.9 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.9:rc3
  • Linux Kernel 2.6.9 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.9:rc4
  • Linux Kernel 2.6.10
    cpe:2.3:o:linux:linux_kernel:2.6.10
  • Linux Kernel 2.6.10 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.10:rc1
  • Linux Kernel 2.6.10 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.10:rc2
  • Linux Kernel 2.6.10 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.10:rc3
  • Linux Kernel 2.6.11
    cpe:2.3:o:linux:linux_kernel:2.6.11
  • Linux Kernel 2.6.11 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.11:rc1
  • Linux Kernel 2.6.11 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.11:rc2
  • Linux Kernel 2.6.11 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.11:rc3
  • Linux Kernel 2.6.11 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.11:rc4
  • Linux Kernel 2.6.11 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.11:rc5
  • Linux Kernel 2.6.11.1
    cpe:2.3:o:linux:linux_kernel:2.6.11.1
  • Linux Kernel 2.6.11.2
    cpe:2.3:o:linux:linux_kernel:2.6.11.2
  • Linux Kernel 2.6.11.3
    cpe:2.3:o:linux:linux_kernel:2.6.11.3
  • Linux Kernel 2.6.11.4
    cpe:2.3:o:linux:linux_kernel:2.6.11.4
  • Linux Kernel 2.6.11.5
    cpe:2.3:o:linux:linux_kernel:2.6.11.5
  • Linux Kernel 2.6.11.6
    cpe:2.3:o:linux:linux_kernel:2.6.11.6
  • Linux Kernel 2.6.11.7
    cpe:2.3:o:linux:linux_kernel:2.6.11.7
  • Linux Kernel 2.6.11.8
    cpe:2.3:o:linux:linux_kernel:2.6.11.8
  • Linux Kernel 2.6.11.9
    cpe:2.3:o:linux:linux_kernel:2.6.11.9
  • Linux Kernel 2.6.11.10
    cpe:2.3:o:linux:linux_kernel:2.6.11.10
  • Linux Kernel 2.6.11.11
    cpe:2.3:o:linux:linux_kernel:2.6.11.11
  • Linux Kernel 2.6.11.12
    cpe:2.3:o:linux:linux_kernel:2.6.11.12
  • Linux Kernel 2.6.12
    cpe:2.3:o:linux:linux_kernel:2.6.12
  • Linux Kernel 2.6.12 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.12:rc1
  • Linux Kernel 2.6.12 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.12:rc2
  • Linux Kernel 2.6.12 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.12:rc3
  • Linux Kernel 2.6.12 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.12:rc4
  • Linux Kernel 2.6.12 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.12:rc5
  • Linux Kernel 2.6.12 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.12:rc6
  • Linux Kernel 2.6.12.1
    cpe:2.3:o:linux:linux_kernel:2.6.12.1
  • Linux Kernel 2.6.12.2
    cpe:2.3:o:linux:linux_kernel:2.6.12.2
  • Linux Kernel 2.6.12.3
    cpe:2.3:o:linux:linux_kernel:2.6.12.3
  • Linux Kernel 2.6.12.4
    cpe:2.3:o:linux:linux_kernel:2.6.12.4
  • Linux Kernel 2.6.12.5
    cpe:2.3:o:linux:linux_kernel:2.6.12.5
  • Linux Kernel 2.6.12.6
    cpe:2.3:o:linux:linux_kernel:2.6.12.6
  • Linux Kernel 2.6.13
    cpe:2.3:o:linux:linux_kernel:2.6.13
  • Linux Kernel 2.6.13 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.13:rc1
  • Linux Kernel 2.6.13 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.13:rc2
  • Linux Kernel 2.6.13 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.13:rc3
  • Linux Kernel 2.6.13 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.13:rc4
  • Linux Kernel 2.6.13 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.13:rc5
  • Linux Kernel 2.6.13 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.13:rc6
  • Linux Kernel 2.6.13 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.13:rc7
  • Linux Kernel 2.6.13.1
    cpe:2.3:o:linux:linux_kernel:2.6.13.1
  • Linux Kernel 2.6.13.2
    cpe:2.3:o:linux:linux_kernel:2.6.13.2
  • Linux Kernel 2.6.13.3
    cpe:2.3:o:linux:linux_kernel:2.6.13.3
  • Linux Kernel 2.6.13.4
    cpe:2.3:o:linux:linux_kernel:2.6.13.4
  • Linux Kernel 2.6.13.5
    cpe:2.3:o:linux:linux_kernel:2.6.13.5
  • Linux Kernel 2.6.14
    cpe:2.3:o:linux:linux_kernel:2.6.14
  • Linux Kernel 2.6.14 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.14:rc1
  • Linux Kernel 2.6.14 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.14:rc2
  • Linux Kernel 2.6.14 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.14:rc3
  • Linux Kernel 2.6.14 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.14:rc4
  • Linux Kernel 2.6.14 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.14:rc5
  • Linux Kernel 2.6.14.1
    cpe:2.3:o:linux:linux_kernel:2.6.14.1
  • Linux Kernel 2.6.14.2
    cpe:2.3:o:linux:linux_kernel:2.6.14.2
  • Linux Kernel 2.6.14.3
    cpe:2.3:o:linux:linux_kernel:2.6.14.3
  • Linux Kernel 2.6.14.4
    cpe:2.3:o:linux:linux_kernel:2.6.14.4
  • Linux Kernel 2.6.14.5
    cpe:2.3:o:linux:linux_kernel:2.6.14.5
  • Linux Kernel 2.6.14.6
    cpe:2.3:o:linux:linux_kernel:2.6.14.6
  • Linux Kernel 2.6.14.7
    cpe:2.3:o:linux:linux_kernel:2.6.14.7
  • Linux Kernel 2.6.15
    cpe:2.3:o:linux:linux_kernel:2.6.15
  • Linux Kernel 2.6.15 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.15:rc1
  • Linux Kernel 2.6.15 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.15:rc2
  • Linux Kernel 2.6.15 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.15:rc3
  • Linux Kernel 2.6.15 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.15:rc4
  • Linux Kernel 2.6.15 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.15:rc5
  • Linux Kernel 2.6.15 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.15:rc6
  • Linux Kernel 2.6.15 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.15:rc7
  • Linux Kernel 2.6.15.1
    cpe:2.3:o:linux:linux_kernel:2.6.15.1
  • Linux Kernel 2.6.15.2
    cpe:2.3:o:linux:linux_kernel:2.6.15.2
  • Linux Kernel 2.6.15.3
    cpe:2.3:o:linux:linux_kernel:2.6.15.3
  • Linux Kernel 2.6.15.4
    cpe:2.3:o:linux:linux_kernel:2.6.15.4
  • Linux Kernel 2.6.15.5
    cpe:2.3:o:linux:linux_kernel:2.6.15.5
  • Linux Kernel 2.6.15.6
    cpe:2.3:o:linux:linux_kernel:2.6.15.6
  • Linux Kernel 2.6.15.7
    cpe:2.3:o:linux:linux_kernel:2.6.15.7
  • Linux Kernel 2.6.15.8
    cpe:2.3:o:linux:linux_kernel:2.6.15.8
  • Linux Kernel 2.6.15.9
    cpe:2.3:o:linux:linux_kernel:2.6.15.9
  • Linux Kernel 2.6.15.10
    cpe:2.3:o:linux:linux_kernel:2.6.15.10
  • Linux Kernel 2.6.15.11
    cpe:2.3:o:linux:linux_kernel:2.6.15.11
  • Linux Kernel 2.6.16
    cpe:2.3:o:linux:linux_kernel:2.6.16
  • Linux Kernel 2.6.16 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.16:rc1
  • Linux Kernel 2.6.16 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.16:rc2
  • Linux Kernel 2.6.16 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.16:rc3
  • Linux Kernel 2.6.16 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.16:rc4
  • Linux Kernel 2.6.16 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.16:rc5
  • Linux Kernel 2.6.16 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.16:rc6
  • Linux Kernel 2.6.16 release candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.16:rc7
  • Linux Kernel 2.6.16.1
    cpe:2.3:o:linux:linux_kernel:2.6.16.1
  • Linux Kernel 2.6.16.2
    cpe:2.3:o:linux:linux_kernel:2.6.16.2
  • Linux Kernel 2.6.16.3
    cpe:2.3:o:linux:linux_kernel:2.6.16.3
  • Linux Kernel 2.6.16.4
    cpe:2.3:o:linux:linux_kernel:2.6.16.4
  • Linux Kernel 2.6.16.5
    cpe:2.3:o:linux:linux_kernel:2.6.16.5
  • Linux Kernel 2.6.16.6
    cpe:2.3:o:linux:linux_kernel:2.6.16.6
  • Linux Kernel 2.6.16.7
    cpe:2.3:o:linux:linux_kernel:2.6.16.7
  • Linux Kernel 2.6.16.8
    cpe:2.3:o:linux:linux_kernel:2.6.16.8
  • Linux Kernel 2.6.16.9
    cpe:2.3:o:linux:linux_kernel:2.6.16.9
  • Linux Kernel 2.6.16.10
    cpe:2.3:o:linux:linux_kernel:2.6.16.10
  • Linux Kernel 2.6.16.11
    cpe:2.3:o:linux:linux_kernel:2.6.16.11
  • Linux Kernel 2.6.16.12
    cpe:2.3:o:linux:linux_kernel:2.6.16.12
  • Linux Kernel 2.6.16.13
    cpe:2.3:o:linux:linux_kernel:2.6.16.13
  • Linux Kernel 2.6.16.14
    cpe:2.3:o:linux:linux_kernel:2.6.16.14
  • Linux Kernel 2.6.16.15
    cpe:2.3:o:linux:linux_kernel:2.6.16.15
  • Linux Kernel 2.6.16.16
    cpe:2.3:o:linux:linux_kernel:2.6.16.16
  • Linux Kernel 2.6.16.17
    cpe:2.3:o:linux:linux_kernel:2.6.16.17
  • Linux Kernel 2.6.16.18
    cpe:2.3:o:linux:linux_kernel:2.6.16.18
  • Linux Kernel 2.6.16.19
    cpe:2.3:o:linux:linux_kernel:2.6.16.19
  • Linux Kernel 2.6.16.20
    cpe:2.3:o:linux:linux_kernel:2.6.16.20
  • Linux Kernel 2.6.16.21
    cpe:2.3:o:linux:linux_kernel:2.6.16.21
  • Linux Kernel 2.6.16.22
    cpe:2.3:o:linux:linux_kernel:2.6.16.22
  • Linux Kernel 2.6.16.23
    cpe:2.3:o:linux:linux_kernel:2.6.16.23
  • Linux Kernel 2.6.16.24
    cpe:2.3:o:linux:linux_kernel:2.6.16.24
  • Linux Kernel 2.6.16.25
    cpe:2.3:o:linux:linux_kernel:2.6.16.25
  • Linux Kernel 2.6.16.26
    cpe:2.3:o:linux:linux_kernel:2.6.16.26
  • Linux Kernel 2.6.16.27
    cpe:2.3:o:linux:linux_kernel:2.6.16.27
  • Linux Kernel 2.6.16.28
    cpe:2.3:o:linux:linux_kernel:2.6.16.28
  • Linux Kernel 2.6.16.29
    cpe:2.3:o:linux:linux_kernel:2.6.16.29
  • Linux Kernel 2.6.16.30
    cpe:2.3:o:linux:linux_kernel:2.6.16.30
  • Linux Kernel 2.6.16.31
    cpe:2.3:o:linux:linux_kernel:2.6.16.31
  • Linux Kernel 2.6.16.32
    cpe:2.3:o:linux:linux_kernel:2.6.16.32
  • Linux Kernel 2.6.16.33
    cpe:2.3:o:linux:linux_kernel:2.6.16.33
  • Linux Kernel 2.6.16.34
    cpe:2.3:o:linux:linux_kernel:2.6.16.34
  • Linux Kernel 2.6.16.35
    cpe:2.3:o:linux:linux_kernel:2.6.16.35
  • Linux Kernel 2.6.16.36
    cpe:2.3:o:linux:linux_kernel:2.6.16.36
  • Linux Kernel 2.6.16.37
    cpe:2.3:o:linux:linux_kernel:2.6.16.37
  • Linux Kernel 2.6.16.38
    cpe:2.3:o:linux:linux_kernel:2.6.16.38
  • Linux Kernel 2.6.16.39
    cpe:2.3:o:linux:linux_kernel:2.6.16.39
  • Linux Kernel 2.6.16.40
    cpe:2.3:o:linux:linux_kernel:2.6.16.40
  • Linux Kernel 2.6.16.41
    cpe:2.3:o:linux:linux_kernel:2.6.16.41
  • Linux Kernel 2.6.16.42
    cpe:2.3:o:linux:linux_kernel:2.6.16.42
  • Linux Kernel 2.6.16.43
    cpe:2.3:o:linux:linux_kernel:2.6.16.43
  • Linux Kernel 2.6.16.44
    cpe:2.3:o:linux:linux_kernel:2.6.16.44
  • Linux Kernel 2.6.16.45
    cpe:2.3:o:linux:linux_kernel:2.6.16.45
  • Linux Kernel 2.6.16.46
    cpe:2.3:o:linux:linux_kernel:2.6.16.46
  • Linux Kernel 2.6.16.47
    cpe:2.3:o:linux:linux_kernel:2.6.16.47
  • Linux Kernel 2.6.16.48
    cpe:2.3:o:linux:linux_kernel:2.6.16.48
  • Linux Kernel 2.6.16.49
    cpe:2.3:o:linux:linux_kernel:2.6.16.49
  • Linux Kernel 2.6.16.50
    cpe:2.3:o:linux:linux_kernel:2.6.16.50
  • Linux Kernel 2.6.16.51
    cpe:2.3:o:linux:linux_kernel:2.6.16.51
  • Linux Kernel 2.6.16.52
    cpe:2.3:o:linux:linux_kernel:2.6.16.52
  • Linux Kernel 2.6.16.53
    cpe:2.3:o:linux:linux_kernel:2.6.16.53
  • Linux Kernel 2.6.16.54
    cpe:2.3:o:linux:linux_kernel:2.6.16.54
  • Linux Kernel 2.16.55
    cpe:2.3:o:linux:linux_kernel:2.6.16.55
  • Linux Kernel 2.6.16.56
    cpe:2.3:o:linux:linux_kernel:2.6.16.56
  • Linux Kernel 2.6.16.57
    cpe:2.3:o:linux:linux_kernel:2.6.16.57
  • Linux Kernel 2.6.16.58
    cpe:2.3:o:linux:linux_kernel:2.6.16.58
  • Linux Kernel 2.6.16.59
    cpe:2.3:o:linux:linux_kernel:2.6.16.59
  • Linux Kernel 2.6.16.60
    cpe:2.3:o:linux:linux_kernel:2.6.16.60
  • Linux Kernel 2.6.16.61
    cpe:2.3:o:linux:linux_kernel:2.6.16.61
  • Linux Kernel 2.6.16.62
    cpe:2.3:o:linux:linux_kernel:2.6.16.62
  • Linux Kernel 2.6.17
    cpe:2.3:o:linux:linux_kernel:2.6.17
  • Linux Kernel 2.6.17 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.17:rc1
  • Linux Kernel 2.6.17 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.17:rc2
  • Linux Kernel 2.6.17 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.17:rc3
  • Linux Kernel 2.6.17 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.17:rc4
  • Linux Kernel 2.6.17 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.17:rc5
  • Linux Kernel 2.6.17 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.17:rc6
  • Linux Kernel 2.6.17.1
    cpe:2.3:o:linux:linux_kernel:2.6.17.1
  • Linux Kernel 2.6.17.2
    cpe:2.3:o:linux:linux_kernel:2.6.17.2
  • Linux Kernel 2.6.17.3
    cpe:2.3:o:linux:linux_kernel:2.6.17.3
  • Linux Kernel 2.6.17.4
    cpe:2.3:o:linux:linux_kernel:2.6.17.4
  • Linux Kernel 2.6.17.5
    cpe:2.3:o:linux:linux_kernel:2.6.17.5
  • Linux Kernel 2.6.17.6
    cpe:2.3:o:linux:linux_kernel:2.6.17.6
  • Linux Kernel 2.6.17.7
    cpe:2.3:o:linux:linux_kernel:2.6.17.7
  • Linux Kernel 2.6.17.8
    cpe:2.3:o:linux:linux_kernel:2.6.17.8
  • Linux Kernel 2.6.17.9
    cpe:2.3:o:linux:linux_kernel:2.6.17.9
  • Linux Kernel 2.6.17.10
    cpe:2.3:o:linux:linux_kernel:2.6.17.10
  • Linux Kernel 2.6.17.11
    cpe:2.3:o:linux:linux_kernel:2.6.17.11
  • Linux Kernel 2.6.17.12
    cpe:2.3:o:linux:linux_kernel:2.6.17.12
  • Linux Kernel 2.6.17.13
    cpe:2.3:o:linux:linux_kernel:2.6.17.13
  • Linux Kernel 2.6.17.14
    cpe:2.3:o:linux:linux_kernel:2.6.17.14
  • Linux Kernel 2.6.18
    cpe:2.3:o:linux:linux_kernel:2.6.18
  • Linux Kernel 2.6.18 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.18:rc1
  • Linux Kernel 2.6.18 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.18:rc2
  • Linux Kernel 2.6.18 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.18:rc3
  • Linux Kernel 2.6.18 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.18:rc4
  • Linux Kernel 2.6.18 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.18:rc5
  • Linux Kernel 2.6.18 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.18:rc6
  • Linux Kernel 2.6.18 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.18:rc7
  • Linux Kernel 2.6.18.1
    cpe:2.3:o:linux:linux_kernel:2.6.18.1
  • Linux Kernel 2.6.18.2
    cpe:2.3:o:linux:linux_kernel:2.6.18.2
  • Linux Kernel 2.6.18.3
    cpe:2.3:o:linux:linux_kernel:2.6.18.3
  • Linux Kernel 2.6.18.4
    cpe:2.3:o:linux:linux_kernel:2.6.18.4
  • Linux Kernel 2.6.18.5
    cpe:2.3:o:linux:linux_kernel:2.6.18.5
  • Linux Kernel 2.6.18.6
    cpe:2.3:o:linux:linux_kernel:2.6.18.6
  • Linux Kernel 2.6.18.7
    cpe:2.3:o:linux:linux_kernel:2.6.18.7
  • Linux Kernel 2.6.18.8
    cpe:2.3:o:linux:linux_kernel:2.6.18.8
  • Linux Kernel 2.6.19
    cpe:2.3:o:linux:linux_kernel:2.6.19
  • Linux Kernel 2.6.19 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.19:rc1
  • Linux Kernel 2.6.19 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.19:rc2
  • Linux Kernel 2.6.19 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.19:rc3
  • Linux Kernel 2.6.19 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.19:rc4
  • Linux Kernel 2.6.19 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.19:rc5
  • Linux Kernel 2.6.19 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.19:rc6
  • Linux Kernel 2.6.19
    cpe:2.3:o:linux:linux_kernel:2.6.19.0
  • Linux Kernel 2.6.19.1
    cpe:2.3:o:linux:linux_kernel:2.6.19.1
  • Linux Kernel 2.6.19.2
    cpe:2.3:o:linux:linux_kernel:2.6.19.2
  • Linux Kernel 2.6.19.3
    cpe:2.3:o:linux:linux_kernel:2.6.19.3
  • Linux Kernel 2.6.19.4
    cpe:2.3:o:linux:linux_kernel:2.6.19.4
  • Linux Kernel 2.6.19.5
    cpe:2.3:o:linux:linux_kernel:2.6.19.5
  • Linux Kernel 2.6.19.6
    cpe:2.3:o:linux:linux_kernel:2.6.19.6
  • Linux Kernel 2.6.19.7
    cpe:2.3:o:linux:linux_kernel:2.6.19.7
  • Linux Kernel 2.6.20
    cpe:2.3:o:linux:linux_kernel:2.6.20
  • Linux Kernel 2.6.20 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.20:rc1
  • Linux Kernel 2.6.20 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.20:rc2
  • Linux Kernel 2.6.20 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.20:rc3
  • Linux Kernel 2.6.20 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.20:rc4
  • Linux Kernel 2.6.20 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.20:rc5
  • Linux Kernel 2.6.20 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.20:rc6
  • Linux Kernel 2.6.20 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.20:rc7
  • Linux Kernel 2.6.20.1
    cpe:2.3:o:linux:linux_kernel:2.6.20.1
  • Linux Kernel 2.6.20.2
    cpe:2.3:o:linux:linux_kernel:2.6.20.2
  • Linux Kernel 2.6.20.3
    cpe:2.3:o:linux:linux_kernel:2.6.20.3
  • Linux Kernel 2.6.20.4
    cpe:2.3:o:linux:linux_kernel:2.6.20.4
  • Linux Kernel 2.6.20.5
    cpe:2.3:o:linux:linux_kernel:2.6.20.5
  • Linux Kernel 2.6.20.6
    cpe:2.3:o:linux:linux_kernel:2.6.20.6
  • Linux Kernel 2.6.20.7
    cpe:2.3:o:linux:linux_kernel:2.6.20.7
  • Linux Kernel 2.6.20.8
    cpe:2.3:o:linux:linux_kernel:2.6.20.8
  • Linux Kernel 2.6.20.9
    cpe:2.3:o:linux:linux_kernel:2.6.20.9
  • Linux Kernel 2.6.20.10
    cpe:2.3:o:linux:linux_kernel:2.6.20.10
  • Linux Kernel 2.6.20.11
    cpe:2.3:o:linux:linux_kernel:2.6.20.11
  • Linux Kernel 2.6.20.12
    cpe:2.3:o:linux:linux_kernel:2.6.20.12
  • Linux Kernel 2.6.20.13
    cpe:2.3:o:linux:linux_kernel:2.6.20.13
  • Linux Kernel 2.6.20.14
    cpe:2.3:o:linux:linux_kernel:2.6.20.14
  • Linux Kernel 2.6.20.15
    cpe:2.3:o:linux:linux_kernel:2.6.20.15
  • Linux Kernel 2.6.20.16
    cpe:2.3:o:linux:linux_kernel:2.6.20.16
  • Linux Kernel 2.6.20.17
    cpe:2.3:o:linux:linux_kernel:2.6.20.17
  • Linux Kernel 2.6.20.18
    cpe:2.3:o:linux:linux_kernel:2.6.20.18
  • Linux Kernel 2.6.20.19
    cpe:2.3:o:linux:linux_kernel:2.6.20.19
  • Linux Kernel 2.6.20.20
    cpe:2.3:o:linux:linux_kernel:2.6.20.20
  • Linux Kernel 2.6.20.21
    cpe:2.3:o:linux:linux_kernel:2.6.20.21
  • Linux Kernel 2.6.21
    cpe:2.3:o:linux:linux_kernel:2.6.21
  • Linux Kernel 2.6.21 git1
    cpe:2.3:o:linux:linux_kernel:2.6.21:git1
  • Linux Kernel 2.6.21 git2
    cpe:2.3:o:linux:linux_kernel:2.6.21:git2
  • Linux Kernel 2.6.21 git3
    cpe:2.3:o:linux:linux_kernel:2.6.21:git3
  • Linux Kernel 2.6.21 git4
    cpe:2.3:o:linux:linux_kernel:2.6.21:git4
  • Linux Kernel 2.6.21 git5
    cpe:2.3:o:linux:linux_kernel:2.6.21:git5
  • Linux Kernel 2.6.21 git6
    cpe:2.3:o:linux:linux_kernel:2.6.21:git6
  • Linux Kernel 2.6.21 git7
    cpe:2.3:o:linux:linux_kernel:2.6.21:git7
  • Linux Kernel 2.6.21 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.21:rc1
  • Linux Kernel 2.6.21 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.21:rc2
  • Linux Kernel 2.6.21 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.21:rc3
  • Linux Kernel 2.6.21 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.21:rc4
  • Linux Kernel 2.6.21 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.21:rc5
  • Linux Kernel 2.6.21 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.21:rc6
  • Linux Kernel 2.6.21 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.21:rc7
  • Linux Kernel 2.6.21.1
    cpe:2.3:o:linux:linux_kernel:2.6.21.1
  • Linux Kernel 2.6.21.2
    cpe:2.3:o:linux:linux_kernel:2.6.21.2
  • Linux Kernel 2.6.21.3
    cpe:2.3:o:linux:linux_kernel:2.6.21.3
  • Linux Kernel 2.6.21.4
    cpe:2.3:o:linux:linux_kernel:2.6.21.4
  • Linux Kernel 2.6.21.5
    cpe:2.3:o:linux:linux_kernel:2.6.21.5
  • Linux Kernel 2.6.21.6
    cpe:2.3:o:linux:linux_kernel:2.6.21.6
  • Linux Kernel 2.6.21.7
    cpe:2.3:o:linux:linux_kernel:2.6.21.7
  • Linux Kernel 2.6.22
    cpe:2.3:o:linux:linux_kernel:2.6.22
  • Linux Kernel 2.6.22 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.22:rc1
  • Linux Kernel 2.6.22 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.22:rc2
  • Linux Kernel 2.6.22 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.22:rc3
  • Linux Kernel 2.6.22 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.22:rc4
  • Linux Kernel 2.6.22 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.22:rc5
  • Linux Kernel 2.6.22 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.22:rc6
  • Linux Kernel 2.6.22 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.22:rc7
  • Linux Kernel 2.6.22.1
    cpe:2.3:o:linux:linux_kernel:2.6.22.1
  • Linux Kernel 2.6.22.2
    cpe:2.3:o:linux:linux_kernel:2.6.22.2
  • Linux Kernel 2.6.22.3
    cpe:2.3:o:linux:linux_kernel:2.6.22.3
  • Linux Kernel 2.6.22.4
    cpe:2.3:o:linux:linux_kernel:2.6.22.4
  • Linux Kernel 2.6.22.5
    cpe:2.3:o:linux:linux_kernel:2.6.22.5
  • Linux Kernel 2.6.22.6
    cpe:2.3:o:linux:linux_kernel:2.6.22.6
  • Linux Kernel 2.6.22.7
    cpe:2.3:o:linux:linux_kernel:2.6.22.7
  • Linux Kernel 2.6.22.8
    cpe:2.3:o:linux:linux_kernel:2.6.22.8
  • Linux Kernel 2.6.22.9
    cpe:2.3:o:linux:linux_kernel:2.6.22.9
  • Linux Kernel 2.6.22.10
    cpe:2.3:o:linux:linux_kernel:2.6.22.10
  • Linux Kernel 2.6.22.11
    cpe:2.3:o:linux:linux_kernel:2.6.22.11
  • Linux Kernel 2.6.22.12
    cpe:2.3:o:linux:linux_kernel:2.6.22.12
  • Linux Kernel 2.6.22.13
    cpe:2.3:o:linux:linux_kernel:2.6.22.13
  • Linux Kernel 2.6.22.14
    cpe:2.3:o:linux:linux_kernel:2.6.22.14
  • Linux Kernel 2.6.22.15
    cpe:2.3:o:linux:linux_kernel:2.6.22.15
  • Linux Kernel 2.6.22.16
    cpe:2.3:o:linux:linux_kernel:2.6.22.16
  • Linux Kernel 2.6.22.17
    cpe:2.3:o:linux:linux_kernel:2.6.22.17
  • Linux Kernel 2.6.22.18
    cpe:2.3:o:linux:linux_kernel:2.6.22.18
  • Linux Kernel 2.6.22.19
    cpe:2.3:o:linux:linux_kernel:2.6.22.19
  • Linux Kernel 2.6.22.20
    cpe:2.3:o:linux:linux_kernel:2.6.22.20
  • Linux Kernel 2.6.22.21
    cpe:2.3:o:linux:linux_kernel:2.6.22.21
  • Linux Kernel 2.6.22.22
    cpe:2.3:o:linux:linux_kernel:2.6.22.22
  • Linux Kernel 2.6.23
    cpe:2.3:o:linux:linux_kernel:2.6.23
  • Linux Kernel 2.6.23 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.23:rc1
  • Linux Kernel 2.6.23 release candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.23:rc2
  • Linux Kernel 2.6.23 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.23:rc3
  • Linux Kernel 2.6.23 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.23:rc4
  • Linux Kernel 2.6.23 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.23:rc5
  • Linux Kernel 2.6.23 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.23:rc6
  • Linux Kernel 2.6.23 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.23:rc7
  • Linux Kernel 2.6.23 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.23:rc8
  • Linux Kernel 2.6.23 Release Candidate 9
    cpe:2.3:o:linux:linux_kernel:2.6.23:rc9
  • Linux Kernel 2.6.23.1
    cpe:2.3:o:linux:linux_kernel:2.6.23.1
  • Linux Kernel 2.6.23.2
    cpe:2.3:o:linux:linux_kernel:2.6.23.2
  • Linux Kernel 2.6.23.3
    cpe:2.3:o:linux:linux_kernel:2.6.23.3
  • Linux Kernel 2.6.23.4
    cpe:2.3:o:linux:linux_kernel:2.6.23.4
  • Linux Kernel 2.6.23.5
    cpe:2.3:o:linux:linux_kernel:2.6.23.5
  • Linux Kernel 2.6.23.6
    cpe:2.3:o:linux:linux_kernel:2.6.23.6
  • Linux Kernel 2.6.23.7
    cpe:2.3:o:linux:linux_kernel:2.6.23.7
  • Linux Kernel 2.6.23.8
    cpe:2.3:o:linux:linux_kernel:2.6.23.8
  • Linux Kernel 2.6.23.9
    cpe:2.3:o:linux:linux_kernel:2.6.23.9
  • Linux Kernel 2.6.23.10
    cpe:2.3:o:linux:linux_kernel:2.6.23.10
  • Linux Kernel 2.6.23.11
    cpe:2.3:o:linux:linux_kernel:2.6.23.11
  • Linux Kernel 2.6.23.12
    cpe:2.3:o:linux:linux_kernel:2.6.23.12
  • Linux Kernel 2.6.23.13
    cpe:2.3:o:linux:linux_kernel:2.6.23.13
  • Linux Kernel 2.6.23.14
    cpe:2.3:o:linux:linux_kernel:2.6.23.14
  • Linux Kernel 2.6.23.16
    cpe:2.3:o:linux:linux_kernel:2.6.23.15
  • Linux Kernel 2.6.23.16
    cpe:2.3:o:linux:linux_kernel:2.6.23.16
  • Linux Kernel 2.6.23.17
    cpe:2.3:o:linux:linux_kernel:2.6.23.17
  • Linux Kernel 2.6.24
    cpe:2.3:o:linux:linux_kernel:2.6.24
  • Linux Kernel 2.6.24 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.24:rc1
  • Linux Kernel 2.6.24 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.24:rc2
  • Linux Kernel 2.6.24 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.24:rc3
  • Linux Kernel 2.6.24 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.24:rc4
  • Linux Kernel 2.6.24 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.24:rc5
  • Linux Kernel 2.6.24 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.24:rc6
  • Linux Kernel 2.6.24 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.24:rc7
  • Linux Kernel 2.6.24 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.24:rc8
  • Linux Kernel 2.6.24.1
    cpe:2.3:o:linux:linux_kernel:2.6.24.1
  • Linux Kernel 2.6.24.2
    cpe:2.3:o:linux:linux_kernel:2.6.24.2
  • Linux Kernel 2.6.24.3
    cpe:2.3:o:linux:linux_kernel:2.6.24.3
  • Linux Kernel 2.6.24.4
    cpe:2.3:o:linux:linux_kernel:2.6.24.4
  • Linux Kernel 2.6.24.5
    cpe:2.3:o:linux:linux_kernel:2.6.24.5
  • Linux Kernel 2.6.24.6
    cpe:2.3:o:linux:linux_kernel:2.6.24.6
  • Linux Kernel 2.6.24.7
    cpe:2.3:o:linux:linux_kernel:2.6.24.7
  • Linux Kernel 2.6.25
    cpe:2.3:o:linux:linux_kernel:2.6.25
  • Linux Kernel 2.6.25 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.25:rc1
  • Linux Kernel 2.6.25 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.25:rc2
  • Linux Kernel 2.6.25 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.25:rc3
  • Linux Kernel 2.6.25 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.25:rc4
  • Linux Kernel 2.6.25 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.25:rc5
  • Linux Kernel 2.6.25 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.25:rc6
  • Linux Kernel 2.6.25 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.25:rc7
  • Linux Kernel 2.6.25 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.25:rc8
  • Linux Kernel 2.6.25 Release Candidate 9
    cpe:2.3:o:linux:linux_kernel:2.6.25:rc9
  • Linux Kernel 2.6.25.1
    cpe:2.3:o:linux:linux_kernel:2.6.25.1
  • Linux Kernel 2.6.25.2
    cpe:2.3:o:linux:linux_kernel:2.6.25.2
  • Linux Kernel 2.6.25.3
    cpe:2.3:o:linux:linux_kernel:2.6.25.3
  • Linux Kernel 2.6.25.4
    cpe:2.3:o:linux:linux_kernel:2.6.25.4
  • Linux Kernel 2.6.25.5
    cpe:2.3:o:linux:linux_kernel:2.6.25.5
  • Linux Kernel 2.6.25.6
    cpe:2.3:o:linux:linux_kernel:2.6.25.6
  • Linux Kernel 2.6.25.7
    cpe:2.3:o:linux:linux_kernel:2.6.25.7
  • Linux Kernel 2.6.25.8
    cpe:2.3:o:linux:linux_kernel:2.6.25.8
  • Linux Kernel 2.6.25.9
    cpe:2.3:o:linux:linux_kernel:2.6.25.9
  • Linux Kernel 2.6.25.10
    cpe:2.3:o:linux:linux_kernel:2.6.25.10
  • Linux Kernel 2.6.25.11
    cpe:2.3:o:linux:linux_kernel:2.6.25.11
  • Linux Kernel 2.6.25.12
    cpe:2.3:o:linux:linux_kernel:2.6.25.12
  • Linux Kernel 2.6.25.13
    cpe:2.3:o:linux:linux_kernel:2.6.25.13
  • Linux Kernel 2.6.25.14
    cpe:2.3:o:linux:linux_kernel:2.6.25.14
  • Linux Kernel 2.6.25.15
    cpe:2.3:o:linux:linux_kernel:2.6.25.15
  • Linux Kernel 2.6.25.16
    cpe:2.3:o:linux:linux_kernel:2.6.25.16
  • Linux Kernel 2.6.25.17
    cpe:2.3:o:linux:linux_kernel:2.6.25.17
  • Linux Kernel 2.6.25.18
    cpe:2.3:o:linux:linux_kernel:2.6.25.18
  • Linux Kernel 2.6.25.19
    cpe:2.3:o:linux:linux_kernel:2.6.25.19
  • Linux Kernel 2.6.25.20
    cpe:2.3:o:linux:linux_kernel:2.6.25.20
  • Linux Kernel 2.6.26
    cpe:2.3:o:linux:linux_kernel:2.6.26
  • Linux Kernel 2.6.26 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.26:rc1
  • Linux Kernel 2.6.26 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.26:rc2
  • Linux Kernel 2.6.26 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.26:rc3
  • Linux Kernel 2.6.26 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.26:rc4
  • Linux Kernel 2.6.26 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.26:rc5
  • Linux Kernel 2.6.26 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.26:rc6
  • Linux Kernel 2.6.26 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.26:rc7
  • Linux Kernel 2.6.26 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.26:rc8
  • Linux Kernel 2.6.26 Release Candidate 9
    cpe:2.3:o:linux:linux_kernel:2.6.26:rc9
  • Linux Kernel 2.6.26.1
    cpe:2.3:o:linux:linux_kernel:2.6.26.1
  • Linux Kernel 2.6.26.2
    cpe:2.3:o:linux:linux_kernel:2.6.26.2
  • Linux Kernel 2.6.26.3
    cpe:2.3:o:linux:linux_kernel:2.6.26.3
  • Linux Kernel 2.6.26.4
    cpe:2.3:o:linux:linux_kernel:2.6.26.4
  • Linux Kernel 2.6.26.5
    cpe:2.3:o:linux:linux_kernel:2.6.26.5
  • Linux Kernel 2.6.26.6
    cpe:2.3:o:linux:linux_kernel:2.6.26.6
  • Linux Kernel 2.6.26.7
    cpe:2.3:o:linux:linux_kernel:2.6.26.7
  • Linux Kernel 2.6.26.8
    cpe:2.3:o:linux:linux_kernel:2.6.26.8
  • Linux Kernel 2.6.27
    cpe:2.3:o:linux:linux_kernel:2.6.27
  • Linux Kernel 2.6.27 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.27:rc1
  • Linux Kernel 2.6.27 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.27:rc2
  • Linux Kernel 2.6.27 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.27:rc3
  • Linux Kernel 2.6.27 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.27:rc4
  • Linux Kernel 2.6.27 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.27:rc5
  • Linux Kernel 2.6.27 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.27:rc6
  • Linux Kernel 2.6.27 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.27:rc7
  • Linux Kernel 2.6.27 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.27:rc8
  • Linux Kernel 2.6.27 Release Candidate 9
    cpe:2.3:o:linux:linux_kernel:2.6.27:rc9
  • Linux Kernel 2.6.27.1
    cpe:2.3:o:linux:linux_kernel:2.6.27.1
  • Linux Kernel 2.6.27.2
    cpe:2.3:o:linux:linux_kernel:2.6.27.2
  • Linux Kernel 2.6.27.3
    cpe:2.3:o:linux:linux_kernel:2.6.27.3
  • Linux Kernel 2.6.27.4
    cpe:2.3:o:linux:linux_kernel:2.6.27.4
  • Linux Kernel 2.6.27.5
    cpe:2.3:o:linux:linux_kernel:2.6.27.5
  • Linux Kernel 2.6.27.6
    cpe:2.3:o:linux:linux_kernel:2.6.27.6
  • Linux Kernel 2.6.27.7
    cpe:2.3:o:linux:linux_kernel:2.6.27.7
  • Linux Kernel 2.6.27.8
    cpe:2.3:o:linux:linux_kernel:2.6.27.8
  • Linux Kernel 2.6.27.9
    cpe:2.3:o:linux:linux_kernel:2.6.27.9
  • Linux Kernel 2.6.27.10
    cpe:2.3:o:linux:linux_kernel:2.6.27.10
  • Linux Kernel 2.6.27.11
    cpe:2.3:o:linux:linux_kernel:2.6.27.11
  • Linux Kernel 2.6.27.12
    cpe:2.3:o:linux:linux_kernel:2.6.27.12
  • Linux Kernel 2.6.27.13
    cpe:2.3:o:linux:linux_kernel:2.6.27.13
  • Linux Kernel 2.6.27.14
    cpe:2.3:o:linux:linux_kernel:2.6.27.14
  • Linux Kernel 2.6.27.15
    cpe:2.3:o:linux:linux_kernel:2.6.27.15
  • Linux Kernel 2.6.27.16
    cpe:2.3:o:linux:linux_kernel:2.6.27.16
  • Linux Kernel 2.6.27.17
    cpe:2.3:o:linux:linux_kernel:2.6.27.17
  • Linux Kernel 2.6.27.18
    cpe:2.3:o:linux:linux_kernel:2.6.27.18
  • Linux Kernel 2.6.27.19
    cpe:2.3:o:linux:linux_kernel:2.6.27.19
  • Linux Kernel 2.6.27.20
    cpe:2.3:o:linux:linux_kernel:2.6.27.20
  • Linux Kernel 2.6.27.21
    cpe:2.3:o:linux:linux_kernel:2.6.27.21
  • Linux Kernel 2.6.27.22
    cpe:2.3:o:linux:linux_kernel:2.6.27.22
  • Linux Kernel 2.6.27.23
    cpe:2.3:o:linux:linux_kernel:2.6.27.23
  • Linux Kernel 2.6.27.24
    cpe:2.3:o:linux:linux_kernel:2.6.27.24
  • Linux Kernel 2.6.27.25
    cpe:2.3:o:linux:linux_kernel:2.6.27.25
  • Linux Kernel 2.6.27.26
    cpe:2.3:o:linux:linux_kernel:2.6.27.26
  • Linux Kernel 2.6.27.27
    cpe:2.3:o:linux:linux_kernel:2.6.27.27
  • Linux Kernel 2.6.27.28
    cpe:2.3:o:linux:linux_kernel:2.6.27.28
  • Linux Kernel 2.6.27.29
    cpe:2.3:o:linux:linux_kernel:2.6.27.29
  • Linux Kernel 2.6.27.30
    cpe:2.3:o:linux:linux_kernel:2.6.27.30
  • Linux Kernel 2.6.27.31
    cpe:2.3:o:linux:linux_kernel:2.6.27.31
  • Linux Kernel 2.6.27.32
    cpe:2.3:o:linux:linux_kernel:2.6.27.32
  • Linux Kernel 2.6.27.33
    cpe:2.3:o:linux:linux_kernel:2.6.27.33
  • Linux Kernel 2.6.27.34
    cpe:2.3:o:linux:linux_kernel:2.6.27.34
  • Linux Kernel 2.6.27.35
    cpe:2.3:o:linux:linux_kernel:2.6.27.35
  • Linux Kernel 2.6.27.36
    cpe:2.3:o:linux:linux_kernel:2.6.27.36
  • Linux Kernel 2.6.27.37
    cpe:2.3:o:linux:linux_kernel:2.6.27.37
  • Linux Kernel 2.6.27.38
    cpe:2.3:o:linux:linux_kernel:2.6.27.38
  • Linux Kernel 2.6.27.39
    cpe:2.3:o:linux:linux_kernel:2.6.27.39
  • Linux Kernel 2.6.27.40
    cpe:2.3:o:linux:linux_kernel:2.6.27.40
  • Linux Kernel 2.6.27.41
    cpe:2.3:o:linux:linux_kernel:2.6.27.41
  • Linux Kernel 2.6.27.42
    cpe:2.3:o:linux:linux_kernel:2.6.27.42
  • Linux Kernel 2.6.27.43
    cpe:2.3:o:linux:linux_kernel:2.6.27.43
  • Linux Kernel 2.6.27.44
    cpe:2.3:o:linux:linux_kernel:2.6.27.44
  • Linux Kernel 2.6.27.45
    cpe:2.3:o:linux:linux_kernel:2.6.27.45
  • Linux Kernel 2.6.27.46
    cpe:2.3:o:linux:linux_kernel:2.6.27.46
  • Linux Kernel 2.6.27.47
    cpe:2.3:o:linux:linux_kernel:2.6.27.47
  • Linux Kernel 2.6.27.48
    cpe:2.3:o:linux:linux_kernel:2.6.27.48
  • Linux Kernel 2.6.27.49
    cpe:2.3:o:linux:linux_kernel:2.6.27.49
  • Linux Kernel 2.6.27.50
    cpe:2.3:o:linux:linux_kernel:2.6.27.50
  • Linux Kernel 2.6.27.51
    cpe:2.3:o:linux:linux_kernel:2.6.27.51
  • Linux Kernel 2.6.27.52
    cpe:2.3:o:linux:linux_kernel:2.6.27.52
  • Linux Kernel 2.6.27.53
    cpe:2.3:o:linux:linux_kernel:2.6.27.53
  • Linux Kernel 2.6.27.54
    cpe:2.3:o:linux:linux_kernel:2.6.27.54
  • Linux Kernel 2.6.27.55
    cpe:2.3:o:linux:linux_kernel:2.6.27.55
  • Linux Kernel 2.6.27.56
    cpe:2.3:o:linux:linux_kernel:2.6.27.56
  • Linux Kernel 2.6.27.57
    cpe:2.3:o:linux:linux_kernel:2.6.27.57
  • Linux Kernel 2.6.27.58
    cpe:2.3:o:linux:linux_kernel:2.6.27.58
  • Linux Kernel 2.6.27.59
    cpe:2.3:o:linux:linux_kernel:2.6.27.59
  • Linux Kernel 2.6.27.60
    cpe:2.3:o:linux:linux_kernel:2.6.27.60
  • Linux Kernel 2.6.27.61
    cpe:2.3:o:linux:linux_kernel:2.6.27.61
  • Linux Kernel 2.6.27.62
    cpe:2.3:o:linux:linux_kernel:2.6.27.62
  • Linux Kernel 2.6.28
    cpe:2.3:o:linux:linux_kernel:2.6.28
  • Linux Kernel 2.6.28 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.28:rc1
  • Linux Kernel 2.6.28 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.28:rc2
  • Linux Kernel 2.6.28 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.28:rc3
  • Linux Kernel 2.6.28 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.28:rc4
  • Linux Kernel 2.6.28 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.28:rc5
  • Linux Kernel 2.6.28 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.28:rc6
  • Linux Kernel 2.6.28 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.28:rc7
  • Linux Kernel 2.6.28 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.28:rc8
  • Linux Kernel 2.6.28 Release Candidate 9
    cpe:2.3:o:linux:linux_kernel:2.6.28:rc9
  • Linux Kernel 2.6.28.1
    cpe:2.3:o:linux:linux_kernel:2.6.28.1
  • Linux Kernel 2.6.28.2
    cpe:2.3:o:linux:linux_kernel:2.6.28.2
  • Linux Kernel 2.6.28.3
    cpe:2.3:o:linux:linux_kernel:2.6.28.3
  • Linux Kernel 2.6.28.4
    cpe:2.3:o:linux:linux_kernel:2.6.28.4
  • Linux Kernel 2.6.28.5
    cpe:2.3:o:linux:linux_kernel:2.6.28.5
  • Linux Kernel 2.6.28.6
    cpe:2.3:o:linux:linux_kernel:2.6.28.6
  • Linux Kernel 2.6.28.7
    cpe:2.3:o:linux:linux_kernel:2.6.28.7
  • Linux Kernel 2.6.28.8
    cpe:2.3:o:linux:linux_kernel:2.6.28.8
  • Linux Kernel 2.6.28.9
    cpe:2.3:o:linux:linux_kernel:2.6.28.9
  • Linux Kernel 2.6.28.10
    cpe:2.3:o:linux:linux_kernel:2.6.28.10
  • Linux Kernel 2.6.29
    cpe:2.3:o:linux:linux_kernel:2.6.29
  • Linux Kernel 2.6.29 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.29:rc1
  • Linux Kernel 2.6.29 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.29:rc2
  • Linux Kernel 2.6.29 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.29:rc3
  • Linux Kernel 2.6.29 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.29:rc4
  • Linux Kernel 2.6.29 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.29:rc5
  • Linux Kernel 2.6.29 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.29:rc6
  • Linux Kernel 2.6.29 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.29:rc7
  • Linux Kernel 2.6.29 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.29:rc8
  • Linux Kernel 2.6.29.1
    cpe:2.3:o:linux:linux_kernel:2.6.29.1
  • Linux Kernel 2.6.29.2
    cpe:2.3:o:linux:linux_kernel:2.6.29.2
  • Linux Kernel 2.6.29.3
    cpe:2.3:o:linux:linux_kernel:2.6.29.3
  • Linux Kernel 2.6.29.4
    cpe:2.3:o:linux:linux_kernel:2.6.29.4
  • Linux Kernel 2.6.29.5
    cpe:2.3:o:linux:linux_kernel:2.6.29.5
  • Linux Kernel 2.6.29.6
    cpe:2.3:o:linux:linux_kernel:2.6.29.6
  • Linux Kernel 2.6.30
    cpe:2.3:o:linux:linux_kernel:2.6.30
  • Linux Kernel 2.6.30 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.30:rc1
  • Linux Kernel 2.6.30 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.30:rc2
  • Linux Kernel 2.6.30 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.30:rc3
  • Linux Kernel 2.6.30 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.30:rc4
  • Linux Kernel 2.6.30 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.30:rc5
  • Linux Kernel 2.6.30 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.30:rc6
  • Linux Kernel 2.6.30 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.30:rc7
  • Linux Kernel 2.6.30 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.30:rc8
  • Linux Kernel 2.6.30.1
    cpe:2.3:o:linux:linux_kernel:2.6.30.1
  • Linux Kernel 2.6.30.2
    cpe:2.3:o:linux:linux_kernel:2.6.30.2
  • Linux Kernel 2.6.30.3
    cpe:2.3:o:linux:linux_kernel:2.6.30.3
  • Linux Kernel 2.6.30.4
    cpe:2.3:o:linux:linux_kernel:2.6.30.4
  • Linux Kernel 2.6.30.5
    cpe:2.3:o:linux:linux_kernel:2.6.30.5
  • Linux Kernel 2.6.30.6
    cpe:2.3:o:linux:linux_kernel:2.6.30.6
  • Linux Kernel 2.6.30.7
    cpe:2.3:o:linux:linux_kernel:2.6.30.7
  • Linux Kernel 2.6.30.8
    cpe:2.3:o:linux:linux_kernel:2.6.30.8
  • Linux Kernel 2.6.30.9
    cpe:2.3:o:linux:linux_kernel:2.6.30.9
  • Linux Kernel 2.6.30.10
    cpe:2.3:o:linux:linux_kernel:2.6.30.10
  • Linux Kernel 2.6.31
    cpe:2.3:o:linux:linux_kernel:2.6.31
  • Linux Kernel 2.6.31 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.31:rc1
  • Linux Kernel 2.6.31 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.31:rc2
  • Linux Kernel 2.6.31 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.31:rc3
  • Linux Kernel 2.6.31 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.31:rc4
  • Linux Kernel 2.6.31 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.31:rc5
  • Linux Kernel 2.6.31 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.31:rc6
  • linux Kernel 2.6.31 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.31:rc7
  • linux Kernel 2.6.31 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.31:rc8
  • linux Kernel 2.6.31 Release Candidate 9
    cpe:2.3:o:linux:linux_kernel:2.6.31:rc9
  • Linux Kernel 2.6.31.1
    cpe:2.3:o:linux:linux_kernel:2.6.31.1
  • Linux Kernel 2.6.31.2
    cpe:2.3:o:linux:linux_kernel:2.6.31.2
  • Linux Kernel 2.6.31.3
    cpe:2.3:o:linux:linux_kernel:2.6.31.3
  • Linux Kernel 2.6.31.4
    cpe:2.3:o:linux:linux_kernel:2.6.31.4
  • Linux Kernel 2.6.31.5
    cpe:2.3:o:linux:linux_kernel:2.6.31.5
  • Linux Kernel 2.6.31.6
    cpe:2.3:o:linux:linux_kernel:2.6.31.6
  • Linux Kernel 2.6.31.7
    cpe:2.3:o:linux:linux_kernel:2.6.31.7
  • Linux Kernel 2.6.31.8
    cpe:2.3:o:linux:linux_kernel:2.6.31.8
  • Linux Kernel 2.6.31.9
    cpe:2.3:o:linux:linux_kernel:2.6.31.9
  • Linux Kernel 2.6.31.10
    cpe:2.3:o:linux:linux_kernel:2.6.31.10
  • Linux Kernel 2.6.31.11
    cpe:2.3:o:linux:linux_kernel:2.6.31.11
  • Linux Kernel 2.6.31.12
    cpe:2.3:o:linux:linux_kernel:2.6.31.12
  • Linux Kernel 2.6.31.13
    cpe:2.3:o:linux:linux_kernel:2.6.31.13
  • Linux Kernel 2.6.31.14
    cpe:2.3:o:linux:linux_kernel:2.6.31.14
  • Linux Kernel 2.6.32
    cpe:2.3:o:linux:linux_kernel:2.6.32
  • Linux Kernel 2.6.32 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc1
  • Linux Kernel 2.6.32 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc2
  • Linux Kernel 2.6.32 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc3
  • Linux Kernel 2.6.32 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc4
  • Linux Kernel 2.6.32 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc5
  • Linux Kernel 2.6.32 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc6
  • Linux Kernel 2.6.32 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc7
  • Linux Kernel 2.6.32 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.32:rc8
  • Linux Kernel 2.6.32.1
    cpe:2.3:o:linux:linux_kernel:2.6.32.1
  • Linux Kernel 2.6.32.2
    cpe:2.3:o:linux:linux_kernel:2.6.32.2
  • Linux Kernel 2.6.32.3
    cpe:2.3:o:linux:linux_kernel:2.6.32.3
  • Linux Kernel 2.6.32.4
    cpe:2.3:o:linux:linux_kernel:2.6.32.4
  • Linux Kernel 2.6.32.5
    cpe:2.3:o:linux:linux_kernel:2.6.32.5
  • Linux Kernel 2.6.32.6
    cpe:2.3:o:linux:linux_kernel:2.6.32.6
  • Linux Kernel 2.6.32.7
    cpe:2.3:o:linux:linux_kernel:2.6.32.7
  • Linux Kernel 2.6.32.8
    cpe:2.3:o:linux:linux_kernel:2.6.32.8
  • Linux Kernel 2.6.32.9
    cpe:2.3:o:linux:linux_kernel:2.6.32.9
  • Linux Kernel 2.6.32.10
    cpe:2.3:o:linux:linux_kernel:2.6.32.10
  • Linux Kernel 2.6.32.11
    cpe:2.3:o:linux:linux_kernel:2.6.32.11
  • Linux Kernel 2.6.32.12
    cpe:2.3:o:linux:linux_kernel:2.6.32.12
  • Linux Kernel 2.6.32.13
    cpe:2.3:o:linux:linux_kernel:2.6.32.13
  • Linux Kernel 2.6.32.14
    cpe:2.3:o:linux:linux_kernel:2.6.32.14
  • Linux Kernel 2.6.32.15
    cpe:2.3:o:linux:linux_kernel:2.6.32.15
  • Linux Kernel 2.6.32.16
    cpe:2.3:o:linux:linux_kernel:2.6.32.16
  • Linux Kernel 2.6.32.17
    cpe:2.3:o:linux:linux_kernel:2.6.32.17
  • Linux Kernel 2.6.32.18
    cpe:2.3:o:linux:linux_kernel:2.6.32.18
  • Linux Kernel 2.6.32.19
    cpe:2.3:o:linux:linux_kernel:2.6.32.19
  • Linux Kernel 2.6.32.20
    cpe:2.3:o:linux:linux_kernel:2.6.32.20
  • Linux Kernel 2.6.32.21
    cpe:2.3:o:linux:linux_kernel:2.6.32.21
  • Linux Kernel 2.6.32.22
    cpe:2.3:o:linux:linux_kernel:2.6.32.22
  • Linux Kernel 2.6.32.23
    cpe:2.3:o:linux:linux_kernel:2.6.32.23
  • Linux Kernel 2.6.32.24
    cpe:2.3:o:linux:linux_kernel:2.6.32.24
  • Linux Kernel 2.6.32.25
    cpe:2.3:o:linux:linux_kernel:2.6.32.25
  • Linux Kernel 2.6.32.26
    cpe:2.3:o:linux:linux_kernel:2.6.32.26
  • Linux Kernel 2.6.32.27
    cpe:2.3:o:linux:linux_kernel:2.6.32.27
  • Linux Kernel 2.6.32.28
    cpe:2.3:o:linux:linux_kernel:2.6.32.28
  • Linux Kernel 2.6.32.29
    cpe:2.3:o:linux:linux_kernel:2.6.32.29
  • Linux Kernel 2.6.32.30
    cpe:2.3:o:linux:linux_kernel:2.6.32.30
  • Linux Kernel 2.6.32.31
    cpe:2.3:o:linux:linux_kernel:2.6.32.31
  • Linux Kernel 2.6.32.32
    cpe:2.3:o:linux:linux_kernel:2.6.32.32
  • Linux Kernel 2.6.32.33
    cpe:2.3:o:linux:linux_kernel:2.6.32.33
  • Linux Kernel 2.6.32.34
    cpe:2.3:o:linux:linux_kernel:2.6.32.34
  • Linux Kernel 2.6.32.35
    cpe:2.3:o:linux:linux_kernel:2.6.32.35
  • Linux Kernel 2.6.32.36
    cpe:2.3:o:linux:linux_kernel:2.6.32.36
  • Linux Kernel 2.6.32.37
    cpe:2.3:o:linux:linux_kernel:2.6.32.37
  • Linux Kernel 2.6.32.38
    cpe:2.3:o:linux:linux_kernel:2.6.32.38
  • Linux Kernel 2.6.32.39
    cpe:2.3:o:linux:linux_kernel:2.6.32.39
  • Linux Kernel 2.6.32.40
    cpe:2.3:o:linux:linux_kernel:2.6.32.40
  • Linux Kernel 2.6.32.41
    cpe:2.3:o:linux:linux_kernel:2.6.32.41
  • Linux Kernel 2.6.32.42
    cpe:2.3:o:linux:linux_kernel:2.6.32.42
  • Linux Kernel 2.6.32.43
    cpe:2.3:o:linux:linux_kernel:2.6.32.43
  • Linux Kernel 2.6.32.44
    cpe:2.3:o:linux:linux_kernel:2.6.32.44
  • Linux Kernel 2.6.32.45
    cpe:2.3:o:linux:linux_kernel:2.6.32.45
  • Linux Kernel 2.6.32.46
    cpe:2.3:o:linux:linux_kernel:2.6.32.46
  • Linux Kernel 2.6.32.47
    cpe:2.3:o:linux:linux_kernel:2.6.32.47
  • Linux Kernel 2.6.32.48
    cpe:2.3:o:linux:linux_kernel:2.6.32.48
  • Linux Kernel 2.6.32.49
    cpe:2.3:o:linux:linux_kernel:2.6.32.49
  • Linux Kernel 2.6.32.50
    cpe:2.3:o:linux:linux_kernel:2.6.32.50
  • Linux Kernel 2.6.32.51
    cpe:2.3:o:linux:linux_kernel:2.6.32.51
  • Linux Kernel 2.6.32.52
    cpe:2.3:o:linux:linux_kernel:2.6.32.52
  • Linux Kernel 2.6.32.53
    cpe:2.3:o:linux:linux_kernel:2.6.32.53
  • Linux Kernel 2.6.32.54
    cpe:2.3:o:linux:linux_kernel:2.6.32.54
  • Linux Kernel 2.6.32.55
    cpe:2.3:o:linux:linux_kernel:2.6.32.55
  • Linux Kernel 2.6.32.56
    cpe:2.3:o:linux:linux_kernel:2.6.32.56
  • Linux Kernel 2.6.32.57
    cpe:2.3:o:linux:linux_kernel:2.6.32.57
  • Linux Kernel 2.6.32.58
    cpe:2.3:o:linux:linux_kernel:2.6.32.58
  • Linux Kernel 2.6.33
    cpe:2.3:o:linux:linux_kernel:2.6.33
  • Linux Kernel 2.6.33 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc1
  • Linux Kernel 2.6.33 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc2
  • Linux Kernel 2.6.33 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc3
  • Linux Kernel 2.6.33 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc4
  • Linux Kernel 2.6.33 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc5
  • Linux Kernel 2.6.33 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc6
  • Linux Kernel 2.6.33 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc7
  • Linux Kernel 2.6.33 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.33:rc8
  • Linux Kernel 2.6.33.1
    cpe:2.3:o:linux:linux_kernel:2.6.33.1
  • Linux Kernel 2.6.33.2
    cpe:2.3:o:linux:linux_kernel:2.6.33.2
  • Linux Kernel 2.6.33.3
    cpe:2.3:o:linux:linux_kernel:2.6.33.3
  • Linux Kernel 2.6.33.4
    cpe:2.3:o:linux:linux_kernel:2.6.33.4
  • Linux Kernel 2.6.33.5
    cpe:2.3:o:linux:linux_kernel:2.6.33.5
  • Linux Kernel 2.6.33.6
    cpe:2.3:o:linux:linux_kernel:2.6.33.6
  • Linux Kernel 2.6.33.7
    cpe:2.3:o:linux:linux_kernel:2.6.33.7
  • Linux Kernel 2.6.33.8
    cpe:2.3:o:linux:linux_kernel:2.6.33.8
  • Linux Kernel 2.6.33.9
    cpe:2.3:o:linux:linux_kernel:2.6.33.9
  • Linux Kernel 2.6.33.10
    cpe:2.3:o:linux:linux_kernel:2.6.33.10
  • Linux Kernel 2.6.33.11
    cpe:2.3:o:linux:linux_kernel:2.6.33.11
  • Linux Kernel 2.6.33.12
    cpe:2.3:o:linux:linux_kernel:2.6.33.12
  • Linux Kernel 2.6.33.13
    cpe:2.3:o:linux:linux_kernel:2.6.33.13
  • Linux Kernel 2.6.33.14
    cpe:2.3:o:linux:linux_kernel:2.6.33.14
  • Linux Kernel 2.6.33.15
    cpe:2.3:o:linux:linux_kernel:2.6.33.15
  • Linux Kernel 2.6.33.16
    cpe:2.3:o:linux:linux_kernel:2.6.33.16
  • Linux Kernel 2.6.33.17
    cpe:2.3:o:linux:linux_kernel:2.6.33.17
  • Linux Kernel 2.6.33.18
    cpe:2.3:o:linux:linux_kernel:2.6.33.18
  • Linux Kernel 2.6.33.19
    cpe:2.3:o:linux:linux_kernel:2.6.33.19
  • Linux Kernel 2.6.33.20
    cpe:2.3:o:linux:linux_kernel:2.6.33.20
  • Linux Kernel 2.6.34
    cpe:2.3:o:linux:linux_kernel:2.6.34
  • Linux Kernel 2.6.34 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc1
  • Linux Kernel 2.6.34 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc2
  • Linux Kernel 2.6.34 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc3
  • Linux Kernel 2.6.34 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc4
  • Linux Kernel 2.6.34 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc5
  • Linux Kernel 2.6.34 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc6
  • Linux Kernel 2.6.34 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.34:rc7
  • Linux Kernel 2.6.34.1
    cpe:2.3:o:linux:linux_kernel:2.6.34.1
  • Linux Kernel 2.6.34.2
    cpe:2.3:o:linux:linux_kernel:2.6.34.2
  • Linux Kernel 2.6.34.3
    cpe:2.3:o:linux:linux_kernel:2.6.34.3
  • Linux Kernel 2.6.34.4
    cpe:2.3:o:linux:linux_kernel:2.6.34.4
  • Linux Kernel 2.6.34.5
    cpe:2.3:o:linux:linux_kernel:2.6.34.5
  • Linux Kernel 2.6.34.6
    cpe:2.3:o:linux:linux_kernel:2.6.34.6
  • Linux Kernel 2.6.34.7
    cpe:2.3:o:linux:linux_kernel:2.6.34.7
  • Linux Kernel 2.6.34.8
    cpe:2.3:o:linux:linux_kernel:2.6.34.8
  • Linux Kernel 2.6.34.9
    cpe:2.3:o:linux:linux_kernel:2.6.34.9
  • Linux Kernel 2.6.34.10
    cpe:2.3:o:linux:linux_kernel:2.6.34.10
  • Linux Kernel 2.6.35
    cpe:2.3:o:linux:linux_kernel:2.6.35
  • Linux Kernel 2.6.35 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc1
  • Linux Kernel 2.6.35 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc2
  • Linux Kernel 2.6.35 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc3
  • Linux Kernel 2.6.35 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc4
  • Linux Kernel 2.6.35 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc5
  • Linux Kernel 2.6.35 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.35:rc6
  • Linux Kernel 2.6.35.1
    cpe:2.3:o:linux:linux_kernel:2.6.35.1
  • Linux Kernel 2.6.35.2
    cpe:2.3:o:linux:linux_kernel:2.6.35.2
  • Linux Kernel 2.6.35.3
    cpe:2.3:o:linux:linux_kernel:2.6.35.3
  • Linux Kernel 2.6.35.4
    cpe:2.3:o:linux:linux_kernel:2.6.35.4
  • Linux Kernel 2.6.35.5
    cpe:2.3:o:linux:linux_kernel:2.6.35.5
  • Linux Kernel 2.6.35.6
    cpe:2.3:o:linux:linux_kernel:2.6.35.6
  • Linux Kernel 2.6.35.7
    cpe:2.3:o:linux:linux_kernel:2.6.35.7
  • Linux Kernel 2.6.35.8
    cpe:2.3:o:linux:linux_kernel:2.6.35.8
  • Linux Kernel 2.6.35.9
    cpe:2.3:o:linux:linux_kernel:2.6.35.9
  • Linux Kernel 2.6.35.10
    cpe:2.3:o:linux:linux_kernel:2.6.35.10
  • Linux Kernel 2.6.35.11
    cpe:2.3:o:linux:linux_kernel:2.6.35.11
  • Linux Kernel 2.6.35.12
    cpe:2.3:o:linux:linux_kernel:2.6.35.12
  • Linux Kernel 2.6.35.13
    cpe:2.3:o:linux:linux_kernel:2.6.35.13
  • Linux Kernel 2.6.36
    cpe:2.3:o:linux:linux_kernel:2.6.36
  • Linux Kernel 2.6.36 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc1
  • Linux Kernel 2.6.36 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc2
  • Linux Kernel 2.6.36 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc3
  • Linux Kernel 2.6.36 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc4
  • Linux Kernel 2.6.36 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc5
  • Linux Kernel 2.6.36 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc6
  • Linux Kernel 2.6.36 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc7
  • Linux Kernel 2.6.36 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.36:rc8
  • Linux Kernel 2.6.36.1
    cpe:2.3:o:linux:linux_kernel:2.6.36.1
  • Linux Kernel 2.6.36.2
    cpe:2.3:o:linux:linux_kernel:2.6.36.2
  • Linux Kernel 2.6.36.3
    cpe:2.3:o:linux:linux_kernel:2.6.36.3
  • Linux Kernel 2.6.36.4
    cpe:2.3:o:linux:linux_kernel:2.6.36.4
  • Linux Kernel 2.6.37
    cpe:2.3:o:linux:linux_kernel:2.6.37
  • Linux Kernel 2.6.37 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc1
  • Linux Kernel 2.6.37 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc2
  • Linux Kernel 2.6.37 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc3
  • Linux Kernel 2.6.37 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc4
  • Linux Kernel 2.6.37 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc5
  • Linux Kernel 2.6.37 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc6
  • Linux Kernel 2.6.37 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc7
  • Linux Kernel 2.6.37 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.37:rc8
  • Linux Kernel 2.6.37.1
    cpe:2.3:o:linux:linux_kernel:2.6.37.1
  • Linux Kernel 2.6.37.2
    cpe:2.3:o:linux:linux_kernel:2.6.37.2
  • Linux Kernel 2.6.37.3
    cpe:2.3:o:linux:linux_kernel:2.6.37.3
  • Linux Kernel 2.6.37.4
    cpe:2.3:o:linux:linux_kernel:2.6.37.4
  • Linux Kernel 2.6.37.5
    cpe:2.3:o:linux:linux_kernel:2.6.37.5
  • Linux Kernel 2.6.37.6
    cpe:2.3:o:linux:linux_kernel:2.6.37.6
  • Linux Kernel 2.6.38
    cpe:2.3:o:linux:linux_kernel:2.6.38
  • Linux Kernel 2.6.38 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc1
  • Linux Kernel 2.6.38 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc2
  • Linux Kernel 2.6.38 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc3
  • Linux Kernel 2.6.38 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc4
  • Linux Kernel 2.6.38 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc5
  • Linux Kernel 2.6.38 Release Candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc6
  • Linux Kernel 2.6.38 Release Candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc7
  • Linux Kernel 2.6.38 Release Candidate 8
    cpe:2.3:o:linux:linux_kernel:2.6.38:rc8
  • Linux Kernel 2.6.38.1
    cpe:2.3:o:linux:linux_kernel:2.6.38.1
  • Linux Kernel 2.6.38.2
    cpe:2.3:o:linux:linux_kernel:2.6.38.2
  • Linux Kernel 2.6.38.3
    cpe:2.3:o:linux:linux_kernel:2.6.38.3
  • Linux Kernel 2.6.38.4
    cpe:2.3:o:linux:linux_kernel:2.6.38.4
  • Linux Kernel 2.6.38.5
    cpe:2.3:o:linux:linux_kernel:2.6.38.5
  • Linux Kernel 2.6.38.6
    cpe:2.3:o:linux:linux_kernel:2.6.38.6
  • Linux Kernel 2.6.38.7
    cpe:2.3:o:linux:linux_kernel:2.6.38.7
  • Linux Kernel 2.6.38.8
    cpe:2.3:o:linux:linux_kernel:2.6.38.8
  • Linux Kernel 2.6.39
    cpe:2.3:o:linux:linux_kernel:2.6.39
  • Linux Kernel 2.6.39 Release Candidate 1
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc1
  • Linux Kernel 2.6.39 Release Candidate 2
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc2
  • Linux Kernel 2.6.39 Release Candidate 3
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc3
  • Linux Kernel 2.6.39 Release Candidate 4
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc4
  • Linux Kernel 2.6.39 Release Candidate 5
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc5
  • Linux Kernel 2.6.39 release candidate 6
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc6
  • Linux Kernel 2.6.39 release candidate 7
    cpe:2.3:o:linux:linux_kernel:2.6.39:rc7
  • Linux Kernel 2.6.39.1
    cpe:2.3:o:linux:linux_kernel:2.6.39.1
  • Linux Kernel 2.6.39.2
    cpe:2.3:o:linux:linux_kernel:2.6.39.2
  • Linux Kernel 2.6.39.3
    cpe:2.3:o:linux:linux_kernel:2.6.39.3
  • Linux Kernel 2.6.39.4
    cpe:2.3:o:linux:linux_kernel:2.6.39.4
  • Linux Kernel 3.0
    cpe:2.3:o:linux:linux_kernel:3.0
  • Linux Kernel 3.0 release candidate 1
    cpe:2.3:o:linux:linux_kernel:3.0:rc1
  • Linux Kernel 3.0 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.0:rc2
  • Linux Kernel 3.0 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.0:rc3
  • Linux Kernel 3.0 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.0:rc4
  • Linux Kernel 3.0 release candidate 5
    cpe:2.3:o:linux:linux_kernel:3.0:rc5
  • Linux Kernel 3.0 release candidate 6
    cpe:2.3:o:linux:linux_kernel:3.0:rc6
  • Linux Kernel 3.0 release candidate 7
    cpe:2.3:o:linux:linux_kernel:3.0:rc7
  • Linux Kernel 3.0.1
    cpe:2.3:o:linux:linux_kernel:3.0.1
  • Linux Kernel 3.0.2
    cpe:2.3:o:linux:linux_kernel:3.0.2
  • Linux Kernel 3.0.3
    cpe:2.3:o:linux:linux_kernel:3.0.3
  • Linux Kernel 3.0.4
    cpe:2.3:o:linux:linux_kernel:3.0.4
  • Linux Kernel 3.0.5
    cpe:2.3:o:linux:linux_kernel:3.0.5
  • Linux Kernel 3.0.6
    cpe:2.3:o:linux:linux_kernel:3.0.6
  • Linux Kernel 3.0.7
    cpe:2.3:o:linux:linux_kernel:3.0.7
  • Linux Kernel 3.0.8
    cpe:2.3:o:linux:linux_kernel:3.0.8
  • Linux Kernel 3.0.9
    cpe:2.3:o:linux:linux_kernel:3.0.9
  • Linux Kernel 3.0.10
    cpe:2.3:o:linux:linux_kernel:3.0.10
  • Linux Kernel 3.0.11
    cpe:2.3:o:linux:linux_kernel:3.0.11
  • Linux Kernel 3.0.12
    cpe:2.3:o:linux:linux_kernel:3.0.12
  • Linux Kernel 3.0.13
    cpe:2.3:o:linux:linux_kernel:3.0.13
  • Linux Kernel 3.0.14
    cpe:2.3:o:linux:linux_kernel:3.0.14
  • Linux Kernel 3.0.15
    cpe:2.3:o:linux:linux_kernel:3.0.15
  • Linux Kernel 3.0.16
    cpe:2.3:o:linux:linux_kernel:3.0.16
  • Linux Kernel 3.0.17
    cpe:2.3:o:linux:linux_kernel:3.0.17
  • Linux Kernel 3.0.18
    cpe:2.3:o:linux:linux_kernel:3.0.18
  • Linux Kernel 3.0.19
    cpe:2.3:o:linux:linux_kernel:3.0.19
  • Linux Kernel 3.0.20
    cpe:2.3:o:linux:linux_kernel:3.0.20
  • Linux Kernel 3.0.21
    cpe:2.3:o:linux:linux_kernel:3.0.21
  • Linux Kernel 3.0.22
    cpe:2.3:o:linux:linux_kernel:3.0.22
  • Linux Kernel 3.0.23
    cpe:2.3:o:linux:linux_kernel:3.0.23
  • Linux Kernel 3.0.24
    cpe:2.3:o:linux:linux_kernel:3.0.24
  • Linux Kernel 3.0.25
    cpe:2.3:o:linux:linux_kernel:3.0.25
  • Linux Kernel 3.0.26
    cpe:2.3:o:linux:linux_kernel:3.0.26
  • Linux Kernel 3.0.27
    cpe:2.3:o:linux:linux_kernel:3.0.27
  • Linux Kernel 3.0.28
    cpe:2.3:o:linux:linux_kernel:3.0.28
  • Linux Kernel 3.0.29
    cpe:2.3:o:linux:linux_kernel:3.0.29
  • Linux Kernel 3.0.30
    cpe:2.3:o:linux:linux_kernel:3.0.30
  • Linux Kernel 3.0.31
    cpe:2.3:o:linux:linux_kernel:3.0.31
  • Linux Kernel 3.0.32
    cpe:2.3:o:linux:linux_kernel:3.0.32
  • Linux Kernel 3.0.33
    cpe:2.3:o:linux:linux_kernel:3.0.33
  • Linux Kernel 3.0.34
    cpe:2.3:o:linux:linux_kernel:3.0.34
  • Linux Kernel 3.0.35
    cpe:2.3:o:linux:linux_kernel:3.0.35
  • Linux Kernel 3.0.36
    cpe:2.3:o:linux:linux_kernel:3.0.36
  • Linux Kernel 3.0.37
    cpe:2.3:o:linux:linux_kernel:3.0.37
  • Linux Kernel 3.0.38
    cpe:2.3:o:linux:linux_kernel:3.0.38
  • Linux Kernel 3.0.39
    cpe:2.3:o:linux:linux_kernel:3.0.39
  • Linux Kernel 3.0.40
    cpe:2.3:o:linux:linux_kernel:3.0.40
  • Linux Kernel 3.0.41
    cpe:2.3:o:linux:linux_kernel:3.0.41
  • Linux Kernel 3.0.42
    cpe:2.3:o:linux:linux_kernel:3.0.42
  • Linux Kernel 3.0.43
    cpe:2.3:o:linux:linux_kernel:3.0.43
  • Linux Kernel 3.0.44
    cpe:2.3:o:linux:linux_kernel:3.0.44
  • Linux Kernel 3.0.45
    cpe:2.3:o:linux:linux_kernel:3.0.45
  • Linux Kernel 3.0.46
    cpe:2.3:o:linux:linux_kernel:3.0.46
  • Linux Kernel 3.0.47
    cpe:2.3:o:linux:linux_kernel:3.0.47
  • Linux Kernel 3.0.48
    cpe:2.3:o:linux:linux_kernel:3.0.48
  • Linux Kernel 3.0.49
    cpe:2.3:o:linux:linux_kernel:3.0.49
  • Linux Kernel 3.0.50
    cpe:2.3:o:linux:linux_kernel:3.0.50
  • Linux Kernel 3.0.51
    cpe:2.3:o:linux:linux_kernel:3.0.51
  • Linux Kernel 3.0.52
    cpe:2.3:o:linux:linux_kernel:3.0.52
  • Linux Kernel 3.0.53
    cpe:2.3:o:linux:linux_kernel:3.0.53
  • Linux Kernel 3.0.54
    cpe:2.3:o:linux:linux_kernel:3.0.54
  • Linux Kernel 3.0.55
    cpe:2.3:o:linux:linux_kernel:3.0.55
  • Linux Kernel 3.0.56
    cpe:2.3:o:linux:linux_kernel:3.0.56
  • Linux Kernel 3.0.57
    cpe:2.3:o:linux:linux_kernel:3.0.57
  • Linux Kernel 3.0.58
    cpe:2.3:o:linux:linux_kernel:3.0.58
  • Linux Kernel 3.0.59
    cpe:2.3:o:linux:linux_kernel:3.0.59
  • Linux Kernel 3.0.60
    cpe:2.3:o:linux:linux_kernel:3.0.60
  • Linux Kernel 3.0.61
    cpe:2.3:o:linux:linux_kernel:3.0.61
  • Linux Kernel 3.0.62
    cpe:2.3:o:linux:linux_kernel:3.0.62
  • Linux Kernel 3.0.63
    cpe:2.3:o:linux:linux_kernel:3.0.63
  • Linux Kernel 3.0.64
    cpe:2.3:o:linux:linux_kernel:3.0.64
  • Linux Kernel 3.0.65
    cpe:2.3:o:linux:linux_kernel:3.0.65
  • Linux Kernel 3.0.66
    cpe:2.3:o:linux:linux_kernel:3.0.66
  • Linux Kernel 3.0.67
    cpe:2.3:o:linux:linux_kernel:3.0.67
  • Linux Kernel 3.0.68
    cpe:2.3:o:linux:linux_kernel:3.0.68
  • Linux Kernel 3.0.69
    cpe:2.3:o:linux:linux_kernel:3.0.69
  • Linux Kernel 3.0.70
    cpe:2.3:o:linux:linux_kernel:3.0.70
  • Linux Kernel 3.0.71
    cpe:2.3:o:linux:linux_kernel:3.0.71
  • Linux Kernel 3.0.72
    cpe:2.3:o:linux:linux_kernel:3.0.72
  • Linux Kernel 3.0.73
    cpe:2.3:o:linux:linux_kernel:3.0.73
  • Linux Kernel 3.0.74
    cpe:2.3:o:linux:linux_kernel:3.0.74
  • Linux Kernel 3.0.75
    cpe:2.3:o:linux:linux_kernel:3.0.75
  • Linux Kernel 3.0.76
    cpe:2.3:o:linux:linux_kernel:3.0.76
  • Linux Kernel 3.0.77
    cpe:2.3:o:linux:linux_kernel:3.0.77
  • Linux Kernel 3.0.78
    cpe:2.3:o:linux:linux_kernel:3.0.78
  • Linux Kernel 3.0.79
    cpe:2.3:o:linux:linux_kernel:3.0.79
  • Linux Kernel 3.0.80
    cpe:2.3:o:linux:linux_kernel:3.0.80
  • Linux Kernel 3.0.81
    cpe:2.3:o:linux:linux_kernel:3.0.81
  • Linux Kernel 3.0.82
    cpe:2.3:o:linux:linux_kernel:3.0.82
  • Linux Kernel 3.0.83
    cpe:2.3:o:linux:linux_kernel:3.0.83
  • Linux Kernel 3.0.84
    cpe:2.3:o:linux:linux_kernel:3.0.84
  • Linux Kernel 3.0.85
    cpe:2.3:o:linux:linux_kernel:3.0.85
  • Linux Kernel 3.0.86
    cpe:2.3:o:linux:linux_kernel:3.0.86
  • Linux Kernel 3.0.87
    cpe:2.3:o:linux:linux_kernel:3.0.87
  • Linux Kernel 3.0.88
    cpe:2.3:o:linux:linux_kernel:3.0.88
  • Linux Kernel 3.0.89
    cpe:2.3:o:linux:linux_kernel:3.0.89
  • Linux Kernel 3.0.90
    cpe:2.3:o:linux:linux_kernel:3.0.90
  • Linux Kernel 3.0.91
    cpe:2.3:o:linux:linux_kernel:3.0.91
  • Linux Kernel 3.0.92
    cpe:2.3:o:linux:linux_kernel:3.0.92
  • Linux Kernel 3.0.93
    cpe:2.3:o:linux:linux_kernel:3.0.93
  • Linux Kernel 3.0.94
    cpe:2.3:o:linux:linux_kernel:3.0.94
  • Linux Kernel 3.0.95
    cpe:2.3:o:linux:linux_kernel:3.0.95
  • Linux Kernel 3.0.96
    cpe:2.3:o:linux:linux_kernel:3.0.96
  • Linux Kernel 3.0.97
    cpe:2.3:o:linux:linux_kernel:3.0.97
  • Linux Kernel 3.0.98
    cpe:2.3:o:linux:linux_kernel:3.0.98
  • Linux Kernel 3.0.99
    cpe:2.3:o:linux:linux_kernel:3.0.99
  • Linux Kernel 3.0.100
    cpe:2.3:o:linux:linux_kernel:3.0.100
  • Linux Kernel 3.0.101
    cpe:2.3:o:linux:linux_kernel:3.0.101
  • Linux Kernel 3.1
    cpe:2.3:o:linux:linux_kernel:3.1
  • Linux Kernel 3.1 release candidate 1
    cpe:2.3:o:linux:linux_kernel:3.1:rc1
  • Linux Kernel 3.1 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.1:rc2
  • Linux Kernel 3.1 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.1:rc3
  • Linux Kernel 3.1 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.1:rc4
  • Linux Kernel 3.1.1
    cpe:2.3:o:linux:linux_kernel:3.1.1
  • Linux Kernel 3.1.2
    cpe:2.3:o:linux:linux_kernel:3.1.2
  • Linux Kernel 3.1.3
    cpe:2.3:o:linux:linux_kernel:3.1.3
  • Linux Kernel 3.1.4
    cpe:2.3:o:linux:linux_kernel:3.1.4
  • Linux Kernel 3.1.5
    cpe:2.3:o:linux:linux_kernel:3.1.5
  • Linux Kernel 3.1.6
    cpe:2.3:o:linux:linux_kernel:3.1.6
  • Linux Kernel 3.1.7
    cpe:2.3:o:linux:linux_kernel:3.1.7
  • Linux Kernel 3.1.8
    cpe:2.3:o:linux:linux_kernel:3.1.8
  • Linux Kernel 3.1.9
    cpe:2.3:o:linux:linux_kernel:3.1.9
  • Linux Kernel 3.1.10
    cpe:2.3:o:linux:linux_kernel:3.1.10
  • Linux Kernel 3.2
    cpe:2.3:o:linux:linux_kernel:3.2
  • Linux Kernel 3.2 (x86)
    cpe:2.3:o:linux:linux_kernel:3.2:-:-:-:-:-:x86
  • Linux Kernel 3.2 release candidate 2
    cpe:2.3:o:linux:linux_kernel:3.2:rc2
  • Linux Kernel 3.2 release candidate 3
    cpe:2.3:o:linux:linux_kernel:3.2:rc3
  • Linux Kernel 3.2 release candidate 4
    cpe:2.3:o:linux:linux_kernel:3.2:rc4
  • Linux Kernel 3.2 release candidate 5
    cpe:2.3:o:linux:linux_kernel:3.2:rc5
  • Linux Kernel 3.2 release candidate 6
    cpe:2.3:o:linux:linux_kernel:3.2:rc6
  • Linux Kernel 3.2 release candidate 7
    cpe:2.3:o:linux:linux_kernel:3.2:rc7
  • Linux Kernel 3.2.1
    cpe:2.3:o:linux:linux_kernel:3.2.1
  • Linux Kernel 3.2.1 (x86)
    cpe:2.3:o:linux:linux_kernel:3.2.1:-:-:-:-:-:x86
  • Linux Kernel 3.2.2
    cpe:2.3:o:linux:linux_kernel:3.2.2
  • Linux Kernel 3.2.3
    cpe:2.3:o:linux:linux_kernel:3.2.3
  • Linux Kernel 3.2.4
    cpe:2.3:o:linux:linux_kernel:3.2.4
  • Linux Kernel 3.2.5
    cpe:2.3:o:linux:linux_kernel:3.2.5
  • Linux Kernel 3.2.6
    cpe:2.3:o:linux:linux_kernel:3.2.6
  • Linux Kernel 3.2.7
    cpe:2.3:o:linux:linux_kernel:3.2.7
  • Linux Kernel 3.2.8
    cpe:2.3:o:linux:linux_kernel:3.2.8
  • Linux Kernel 3.2.9
    cpe:2.3:o:linux:linux_kernel:3.2.9
  • Linux Kernel 3.2.10
    cpe:2.3:o:linux:linux_kernel:3.2.10
  • Linux Kernel 3.2.11
    cpe:2.3:o:linux:linux_kernel:3.2.11
  • Linux Kernel 3.2.12
    cpe:2.3:o:linux:linux_kernel:3.2.12
  • Linux Kernel 3.2.13
    cpe:2.3:o:linux:linux_kernel:3.2.13
  • Linux Kernel 3.2.14
    cpe:2.3:o:linux:linux_kernel:3.2.14
  • Linux Kernel 3.2.15
    cpe:2.3:o:linux:linux_kernel:3.2.15
  • Linux Kernel 3.2.16
    cpe:2.3:o:linux:linux_kernel:3.2.16
  • Linux Kernel 3.2.17
    cpe:2.3:o:linux:linux_kernel:3.2.17
  • Linux Kernel 3.2.18
    cpe:2.3:o:linux:linux_kernel:3.2.18
  • Linux Kernel 3.2.19
    cpe:2.3:o:linux:linux_kernel:3.2.19
  • Linux Kernel 3.2.20
    cpe:2.3:o:linux:linux_kernel:3.2.20
  • Linux Kernel 3.2.21
    cpe:2.3:o:linux:linux_kernel:3.2.21
  • Linux Kernel 3.2.22
    cpe:2.3:o:linux:linux_kernel:3.2.22
  • Linux Kernel 3.2.23
    cpe:2.3:o:linux:linux_kernel:3.2.23
  • Linux Kernel 3.2.24
    cpe:2.3:o:linux:linux_kernel:3.2.24
  • Linux Kernel 3.2.25
    cpe:2.3:o:linux:linux_kernel:3.2.25
  • Linux Kernel 3.2.26
    cpe:2.3:o:linux:linux_kernel:3.2.26
  • Linux Kernel 3.2.27
    cpe:2.3:o:linux:linux_kernel:3.2.27
  • Linux Kernel 3.2.28
    cpe:2.3:o:linux:linux_kernel:3.2.28
  • Linux Kernel 3.2.29
    cpe:2.3:o:linux:linux_kernel:3.2.29
  • Linux Kernel 3.2.30
    cpe:2.3:o:linux:linux_kernel:3.2.30
  • Linux Kernel 3.2.64
    cpe:2.3:o:linux:linux_kernel:3.2.64
  • Linux Kernel 3.2.65
    cpe:2.3:o:linux:linux_kernel:3.2.65
  • Linux Kernel 3.2.66
    cpe:2.3:o:linux:linux_kernel:3.2.66
  • Linux Kernel 3.2.67
    cpe:2.3:o:linux:linux_kernel:3.2.67
  • Linux Kernel 3.2.68
    cpe:2.3:o:linux:linux_kernel:3.2.68
  • Linux Kernel 3.2.69
    cpe:2.3:o:linux:linux_kernel:3.2.69
  • Linux Kernel 3.2.70
    cpe:2.3:o:linux:linux_kernel:3.2.70
  • Linux Kernel 3.2.71
    cpe:2.3:o:linux:linux_kernel:3.2.71
  • Linux Kernel 3.2.72
    cpe:2.3:o:linux:linux_kernel:3.2.72
  • Linux Kernel 3.2.73
    cpe:2.3:o:linux:linux_kernel:3.2.73
  • Linux Kernel 3.2.74
    cpe:2.3:o:linux:linux_kernel:3.2.74
  • Linux Kernel 3.2.75
    cpe:2.3:o:linux:linux_kernel:3.2.75
  • Linux Kernel 3.2.76
    cpe:2.3:o:linux:linux_kernel:3.2.76
  • Linux Kernel 3.2.77
    cpe:2.3:o:linux:linux_kernel:3.2.77
  • Linux Kernel 3.2.78
    cpe:2.3:o:linux:linux_kernel:3.2.78
  • Linux Kernel 3.2.79
    cpe:2.3:o:linux:linux_kernel:3.2.79
  • Linux Kernel 3.2.80
    cpe:2.3:o:linux:linux_kernel:3.2.80
  • Debian Linux 7.0
    cpe:2.3:o:debian:debian_linux:7.0
  • Debian Linux 8.0 (Jessie)
    cpe:2.3:o:debian:debian_linux:8.0
  • Debian Linux 9.0
    cpe:2.3:o:debian:debian_linux:9.0
  • Red Hat Virtualization Host 4.0
    cpe:2.3:a:redhat:virtualization_host:4.0
  • RedHat Enterprise Linux Desktop 7.0
    cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
  • RedHat Enterprise Linux Server 7.0
    cpe:2.3:o:redhat:enterprise_linux_server:7.0
  • RedHat Enterprise Linux Workstation 7.0
    cpe:2.3:o:redhat:enterprise_linux_workstation:7.0
CVSS
Base: 4.9
Impact:
Exploitability:
CWE CWE-20
CAPEC
  • Buffer Overflow via Environment Variables
    This attack pattern involves causing a buffer overflow through manipulation of environment variables. Once the attacker finds that they can modify an environment variable, they may try to overflow associated buffers. This attack leverages implicit trust often placed in environment variables.
  • Server Side Include (SSI) Injection
    An attacker can use Server Side Include (SSI) Injection to send code to a web application that then gets executed by the web server. Doing so enables the attacker to achieve similar results to Cross Site Scripting, viz., arbitrary code execution and information disclosure, albeit on a more limited scale, since the SSI directives are nowhere near as powerful as a full-fledged scripting language. Nonetheless, the attacker can conveniently gain access to sensitive files, such as password files, and execute shell commands.
  • Cross Zone Scripting
    An attacker is able to cause a victim to load content into their web-browser that bypasses security zone controls and gain access to increased privileges to execute scripting code or other web objects such as unsigned ActiveX controls or applets. This is a privilege elevation attack targeted at zone-based web-browser security. In a zone-based model, pages belong to one of a set of zones corresponding to the level of privilege assigned to that page. Pages in an untrusted zone would have a lesser level of access to the system and/or be restricted in the types of executable content it was allowed to invoke. In a cross-zone scripting attack, a page that should be assigned to a less privileged zone is granted the privileges of a more trusted zone. This can be accomplished by exploiting bugs in the browser, exploiting incorrect configuration in the zone controls, through a cross-site scripting attack that causes the attackers' content to be treated as coming from a more trusted page, or by leveraging some piece of system functionality that is accessible from both the trusted and less trusted zone. This attack differs from "Restful Privilege Escalation" in that the latter correlates to the inadequate securing of RESTful access methods (such as HTTP DELETE) on the server, while cross-zone scripting attacks the concept of security zones as implemented by a browser.
  • Cross Site Scripting through Log Files
    An attacker may leverage a system weakness where logs are susceptible to log injection to insert scripts into the system's logs. If these logs are later viewed by an administrator through a thin administrative interface and the log data is not properly HTML encoded before being written to the page, the attackers' scripts stored in the log will be executed in the administrative interface with potentially serious consequences. This attack pattern is really a combination of two other attack patterns: log injection and stored cross site scripting.
  • Command Line Execution through SQL Injection
    An attacker uses standard SQL injection methods to inject data into the command line for execution. This could be done directly through misuse of directives such as MSSQL_xp_cmdshell or indirectly through injection of data into the database that would be interpreted as shell commands. Sometime later, an unscrupulous backend application (or could be part of the functionality of the same application) fetches the injected data stored in the database and uses this data as command line arguments without performing proper validation. The malicious data escapes that data plane by spawning new commands to be executed on the host.
  • Object Relational Mapping Injection
    An attacker leverages a weakness present in the database access layer code generated with an Object Relational Mapping (ORM) tool or a weakness in the way that a developer used a persistence framework to inject his or her own SQL commands to be executed against the underlying database. The attack here is similar to plain SQL injection, except that the application does not use JDBC to directly talk to the database, but instead it uses a data access layer generated by an ORM tool or framework (e.g. Hibernate). While most of the time code generated by an ORM tool contains safe access methods that are immune to SQL injection, sometimes either due to some weakness in the generated code or due to the fact that the developer failed to use the generated access methods properly, SQL injection is still possible.
  • SQL Injection through SOAP Parameter Tampering
    An attacker modifies the parameters of the SOAP message that is sent from the service consumer to the service provider to initiate a SQL injection attack. On the service provider side, the SOAP message is parsed and parameters are not properly validated before being used to access a database in a way that does not use parameter binding, thus enabling the attacker to control the structure of the executed SQL query. This pattern describes a SQL injection attack with the delivery mechanism being a SOAP message.
  • Subverting Environment Variable Values
    The attacker directly or indirectly modifies environment variables used by or controlling the target software. The attacker's goal is to cause the target software to deviate from its expected operation in a manner that benefits the attacker.
  • Format String Injection
    An attacker includes formatting characters in a string input field on the target application. Most applications assume that users will provide static text and may respond unpredictably to the presence of formatting character. For example, in certain functions of the C programming languages such as printf, the formatting character %s will print the contents of a memory location expecting this location to identify a string and the formatting character %n prints the number of DWORD written in the memory. An attacker can use this to read or write to memory locations or files, or simply to manipulate the value of the resulting text in unexpected ways. Reading or writing memory may result in program crashes and writing memory could result in the execution of arbitrary code if the attacker can write to the program stack.
  • LDAP Injection
    An attacker manipulates or crafts an LDAP query for the purpose of undermining the security of the target. Some applications use user input to create LDAP queries that are processed by an LDAP server. For example, a user might provide their username during authentication and the username might be inserted in an LDAP query during the authentication process. An attacker could use this input to inject additional commands into an LDAP query that could disclose sensitive information. For example, entering a * in the aforementioned query might return information about all users on the system. This attack is very similar to an SQL injection attack in that it manipulates a query to gather additional information or coerce a particular return value.
  • Relative Path Traversal
    An attacker exploits a weakness in input validation on the target by supplying a specially constructed path utilizing dot and slash characters for the purpose of obtaining access to arbitrary files or resources. An attacker modifies a known path on the target in order to reach material that is not available through intended channels. These attacks normally involve adding additional path separators (/ or \) and/or dots (.), or encodings thereof, in various combinations in order to reach parent directories or entirely separate trees of the target's directory structure.
  • Client-side Injection-induced Buffer Overflow
    This type of attack exploits a buffer overflow vulnerability in targeted client software through injection of malicious content from a custom-built hostile service.
  • Variable Manipulation
    An attacker manipulates variables used by an application to perform a variety of possible attacks. This can either be performed through the manipulation of function call parameters or by manipulating external variables, such as environment variables, that are used by an application. Changing variable values is usually undertaken as part of another attack; for example, a path traversal (inserting relative path modifiers) or buffer overflow (enlarging a variable value beyond an application's ability to store it).
  • Embedding Scripts in Non-Script Elements
    This attack is a form of Cross-Site Scripting (XSS) where malicious scripts are embedded in elements that are not expected to host scripts such as image tags (<img>), comments in XML documents (< !-CDATA->), etc. These tags may not be subject to the same input validation, output validation, and other content filtering and checking routines, so this can create an opportunity for an attacker to tunnel through the application's elements and launch a XSS attack through other elements. As with all remote attacks, it is important to differentiate the ability to launch an attack (such as probing an internal network for unpatched servers) and the ability of the remote attacker to collect and interpret the output of said attack.
  • Flash Injection
    An attacker tricks a victim to execute malicious flash content that executes commands or makes flash calls specified by the attacker. One example of this attack is cross-site flashing, an attacker controlled parameter to a reference call loads from content specified by the attacker.
  • Cross-Site Scripting Using Alternate Syntax
    The attacker uses alternate forms of keywords or commands that result in the same action as the primary form but which may not be caught by filters. For example, many keywords are processed in a case insensitive manner. If the site's web filtering algorithm does not convert all tags into a consistent case before the comparison with forbidden keywords it is possible to bypass filters (e.g., incomplete black lists) by using an alternate case structure. For example, the "script" tag using the alternate forms of "Script" or "ScRiPt" may bypass filters where "script" is the only form tested. Other variants using different syntax representations are also possible as well as using pollution meta-characters or entities that are eventually ignored by the rendering engine. The attack can result in the execution of otherwise prohibited functionality.
  • Exploiting Trust in Client (aka Make the Client Invisible)
    An attack of this type exploits a programs' vulnerabilities in client/server communication channel authentication and data integrity. It leverages the implicit trust a server places in the client, or more importantly, that which the server believes is the client. An attacker executes this type of attack by placing themselves in the communication channel between client and server such that communication directly to the server is possible where the server believes it is communicating only with a valid client. There are numerous variations of this type of attack.
  • XML Nested Payloads
    Applications often need to transform data in and out of the XML format by using an XML parser. It may be possible for an attacker to inject data that may have an adverse effect on the XML parser when it is being processed. By nesting XML data and causing this data to be continuously self-referential, an attacker can cause the XML parser to consume more resources while processing, causing excessive memory consumption and CPU utilization. An attacker's goal is to leverage parser failure to his or her advantage. In most cases this type of an attack will result in a denial of service due to an application becoming unstable, freezing, or crash. However it may be possible to cause a crash resulting in arbitrary code execution, leading to a jump from the data plane to the control plane [R.230.1].
  • XML Oversized Payloads
    Applications often need to transform data in and out of the XML format by using an XML parser. It may be possible for an attacker to inject data that may have an adverse effect on the XML parser when it is being processed. By supplying oversized payloads in input vectors that will be processed by the XML parser, an attacker can cause the XML parser to consume more resources while processing, causing excessive memory consumption and CPU utilization, and potentially cause execution of arbitrary code. An attacker's goal is to leverage parser failure to his or her advantage. In many cases this type of an attack will result in a denial of service due to an application becoming unstable, freezing, or crash. However it is possible to cause a crash resulting in arbitrary code execution, leading to a jump from the data plane to the control plane [R.231.1].
  • Filter Failure through Buffer Overflow
    In this attack, the idea is to cause an active filter to fail by causing an oversized transaction. An attacker may try to feed overly long input strings to the program in an attempt to overwhelm the filter (by causing a buffer overflow) and hoping that the filter does not fail securely (i.e. the user input is let into the system unfiltered).
  • Cross-Site Scripting via Encoded URI Schemes
    An attack of this type exploits the ability of most browsers to interpret "data", "javascript" or other URI schemes as client-side executable content placeholders. This attack consists of passing a malicious URI in an anchor tag HREF attribute or any other similar attributes in other HTML tags. Such malicious URI contains, for example, a base64 encoded HTML content with an embedded cross-site scripting payload. The attack is executed when the browser interprets the malicious content i.e., for example, when the victim clicks on the malicious link.
  • XML Injection
    An attacker utilizes crafted XML user-controllable input to probe, attack, and inject data into the XML database, using techniques similar to SQL injection. The user-controllable input can allow for unauthorized viewing of data, bypassing authentication or the front-end application for direct XML database access, and possibly altering database information.
  • Environment Variable Manipulation
    An attacker manipulates environment variables used by an application to perform a variety of possible attacks. Changing variable values is usually undertaken as part of another attack; for example, a path traversal (inserting relative path modifiers) or buffer overflow (enlarging a variable value beyond an application's ability to store it).
  • Global variable manipulation
    An attacker manipulates global variables used by an application to perform a variety of possible attacks. Changing variable values is usually undertaken as part of another attack; for example, a path traversal (inserting relative path modifiers) or buffer overflow (enlarging a variable value beyond an application's ability to store it).
  • Leverage Alternate Encoding
    This attack leverages the possibility to encode potentially harmful input and submit it to applications not expecting or effective at validating this encoding standard making input filtering difficult.
  • Fuzzing
    Fuzzing is a software testing method that feeds randomly constructed input to the system and looks for an indication that a failure in response to that input has occurred. Fuzzing treats the system as a black box and is totally free from any preconceptions or assumptions about the system. An attacker can leverage fuzzing to try to identify weaknesses in the system. For instance fuzzing can help an attacker discover certain assumptions made in the system about user input. Fuzzing gives an attacker a quick way of potentially uncovering some of these assumptions without really knowing anything about the internals of the system. These assumptions can then be turned against the system by specially crafting user input that may allow an attacker to achieve his goals.
  • Using Leading 'Ghost' Character Sequences to Bypass Input Filters
    An attacker intentionally introduces leading characters that enable getting the input past the filters. The API that is being targeted, ignores the leading "ghost" characters, and therefore processes the attackers' input. This occurs when the targeted API will accept input data in several syntactic forms and interpret it in the equivalent semantic way, while the filter does not take into account the full spectrum of the syntactic forms acceptable to the targeted API. Some APIs will strip certain leading characters from a string of parameters. Perhaps these characters are considered redundant, and for this reason they are removed. Another possibility is the parser logic at the beginning of analysis is specialized in some way that causes some characters to be removed. The attacker can specify multiple types of alternative encodings at the beginning of a string as a set of probes. One commonly used possibility involves adding ghost characters--extra characters that don't affect the validity of the request at the API layer. If the attacker has access to the API libraries being targeted, certain attack ideas can be tested directly in advance. Once alternative ghost encodings emerge through testing, the attacker can move from lab-based API testing to testing real-world service implementations.
  • Accessing/Intercepting/Modifying HTTP Cookies
    This attack relies on the use of HTTP Cookies to store credentials, state information and other critical data on client systems. The first form of this attack involves accessing HTTP Cookies to mine for potentially sensitive data contained therein. The second form of this attack involves intercepting this data as it is transmitted from client to server. This intercepted information is then used by the attacker to impersonate the remote user/session. The third form is when the cookie's content is modified by the attacker before it is sent back to the server. Here the attacker seeks to convince the target server to operate on this falsified information.
  • Embedding Scripts in HTTP Query Strings
    A variant of cross-site scripting called "reflected" cross-site scripting, the HTTP Query Strings attack consists of passing a malicious script inside an otherwise valid HTTP request query string. This is of significant concern for sites that rely on dynamic, user-generated content such as bulletin boards, news sites, blogs, and web enabled administration GUIs. The malicious script may steal session data, browse history, probe files, or otherwise execute attacks on the client side. Once the attacker has prepared the malicious HTTP query it is sent to a victim user (perhaps by email, IM, or posted on an online forum), who clicks on a normal looking link that contains a poison query string. This technique can be made more effective through the use of services like http://tinyurl.com/, which makes very small URLs that will redirect to very large, complex ones. The victim will not know what he is really clicking on.
  • MIME Conversion
    An attacker exploits a weakness in the MIME conversion routine to cause a buffer overflow and gain control over the mail server machine. The MIME system is designed to allow various different information formats to be interpreted and sent via e-mail. Attack points exist when data are converted to MIME compatible format and back.
  • Exploiting Multiple Input Interpretation Layers
    An attacker supplies the target software with input data that contains sequences of special characters designed to bypass input validation logic. This exploit relies on the target making multiples passes over the input data and processing a "layer" of special characters with each pass. In this manner, the attacker can disguise input that would otherwise be rejected as invalid by concealing it with layers of special/escape characters that are stripped off by subsequent processing steps. The goal is to first discover cases where the input validation layer executes before one or more parsing layers. That is, user input may go through the following logic in an application: In such cases, the attacker will need to provide input that will pass through the input validator, but after passing through parser2, will be converted into something that the input validator was supposed to stop.
  • Buffer Overflow via Symbolic Links
    This type of attack leverages the use of symbolic links to cause buffer overflows. An attacker can try to create or manipulate a symbolic link file such that its contents result in out of bounds data. When the target software processes the symbolic link file, it could potentially overflow internal buffers with insufficient bounds checking.
  • Overflow Variables and Tags
    This type of attack leverages the use of tags or variables from a formatted configuration data to cause buffer overflow. The attacker crafts a malicious HTML page or configuration file that includes oversized strings, thus causing an overflow.
  • Buffer Overflow via Parameter Expansion
    In this attack, the target software is given input that the attacker knows will be modified and expanded in size during processing. This attack relies on the target software failing to anticipate that the expanded data may exceed some internal limit, thereby creating a buffer overflow.
  • Signature Spoof
    An attacker generates a message or datablock that causes the recipient to believe that the message or datablock was generated and cryptographically signed by an authoritative or reputable source, misleading a victim or victim operating system into performing malicious actions.
  • XML Client-Side Attack
    Client applications such as web browsers that process HTML data often need to transform data in and out of the XML format by using an XML parser. It may be possible for an attacker to inject data that may have an adverse effect on the XML parser when it is being processed. These adverse effects may include the parser crashing, consuming too much of a resource, executing too slowly, executing code supplied by an attacker, allowing usage of unintended system functionality, etc. An attacker's goal is to leverage parser failure to his or her advantage. In some cases it may be possible to jump from the data plane to the control plane via bad data being passed to an XML parser. [R.484.1]
  • Embedding NULL Bytes
    An attacker embeds one or more null bytes in input to the target software. This attack relies on the usage of a null-valued byte as a string terminator in many environments. The goal is for certain components of the target software to stop processing the input when it encounters the null byte(s).
  • Postfix, Null Terminate, and Backslash
    If a string is passed through a filter of some kind, then a terminal NULL may not be valid. Using alternate representation of NULL allows an attacker to embed the NULL mid-string while postfixing the proper data so that the filter is avoided. One example is a filter that looks for a trailing slash character. If a string insertion is possible, but the slash must exist, an alternate encoding of NULL in mid-string may be used.
  • Simple Script Injection
    An attacker embeds malicious scripts in content that will be served to web browsers. The goal of the attack is for the target software, the client-side browser, to execute the script with the users' privilege level. An attack of this type exploits a programs' vulnerabilities that are brought on by allowing remote hosts to execute code and scripts. Web browsers, for example, have some simple security controls in place, but if a remote attacker is allowed to execute scripts (through injecting them in to user-generated content like bulletin boards) then these controls may be bypassed. Further, these attacks are very difficult for an end user to detect.
  • Using Slashes and URL Encoding Combined to Bypass Validation Logic
    This attack targets the encoding of the URL combined with the encoding of the slash characters. An attacker can take advantage of the multiple way of encoding an URL and abuse the interpretation of the URL. An URL may contain special character that need special syntax handling in order to be interpreted. Special characters are represented using a percentage character followed by two digits representing the octet code of the original character (%HEX-CODE). For instance US-ASCII space character would be represented with %20. This is often referred as escaped ending or percent-encoding. Since the server decodes the URL from the requests, it may restrict the access to some URL paths by validating and filtering out the URL requests it received. An attacker will try to craft an URL with a sequence of special characters which once interpreted by the server will be equivalent to a forbidden URL. It can be difficult to protect against this attack since the URL can contain other format of encoding such as UTF-8 encoding, Unicode-encoding, etc.
  • SQL Injection
    This attack exploits target software that constructs SQL statements based on user input. An attacker crafts input strings so that when the target software constructs SQL statements based on the input, the resulting SQL statement performs actions other than those the application intended. SQL Injection results from failure of the application to appropriately validate input. When specially crafted user-controlled input consisting of SQL syntax is used without proper validation as part of SQL queries, it is possible to glean information from the database in ways not envisaged during application design. Depending upon the database and the design of the application, it may also be possible to leverage injection to have the database execute system-related commands of the attackers' choice. SQL Injection enables an attacker to talk directly to the database, thus bypassing the application completely. Successful injection can cause information disclosure as well as ability to add or modify data in the database. In order to successfully inject SQL and retrieve information from a database, an attacker:
  • String Format Overflow in syslog()
    This attack targets the format string vulnerabilities in the syslog() function. An attacker would typically inject malicious input in the format string parameter of the syslog function. This is a common problem, and many public vulnerabilities and associated exploits have been posted.
  • Blind SQL Injection
    Blind SQL Injection results from an insufficient mitigation for SQL Injection. Although suppressing database error messages are considered best practice, the suppression alone is not sufficient to prevent SQL Injection. Blind SQL Injection is a form of SQL Injection that overcomes the lack of error messages. Without the error messages that facilitate SQL Injection, the attacker constructs input strings that probe the target through simple Boolean SQL expressions. The attacker can determine if the syntax and structure of the injection was successful based on whether the query was executed or not. Applied iteratively, the attacker determines how and where the target is vulnerable to SQL Injection. For example, an attacker may try entering something like "username' AND 1=1; --" in an input field. If the result is the same as when the attacker entered "username" in the field, then the attacker knows that the application is vulnerable to SQL Injection. The attacker can then ask yes/no questions from the database server to extract information from it. For example, the attacker can extract table names from a database using the following types of queries: If the above query executes properly, then the attacker knows that the first character in a table name in the database is a letter between m and z. If it doesn't, then the attacker knows that the character must be between a and l (assuming of course that table names only contain alphabetic characters). By performing a binary search on all character positions, the attacker can determine all table names in the database. Subsequently, the attacker may execute an actual attack and send something like:
  • Using Unicode Encoding to Bypass Validation Logic
    An attacker may provide a Unicode string to a system component that is not Unicode aware and use that to circumvent the filter or cause the classifying mechanism to fail to properly understanding the request. That may allow the attacker to slip malicious data past the content filter and/or possibly cause the application to route the request incorrectly.
  • URL Encoding
    This attack targets the encoding of the URL. An attacker can take advantage of the multiple way of encoding an URL and abuse the interpretation of the URL. An URL may contain special character that need special syntax handling in order to be interpreted. Special characters are represented using a percentage character followed by two digits representing the octet code of the original character (%HEX-CODE). For instance US-ASCII space character would be represented with %20. This is often referred as escaped ending or percent-encoding. Since the server decodes the URL from the requests, it may restrict the access to some URL paths by validating and filtering out the URL requests it received. An attacker will try to craft an URL with a sequence of special characters which once interpreted by the server will be equivalent to a forbidden URL. It can be difficult to protect against this attack since the URL can contain other format of encoding such as UTF-8 encoding, Unicode-encoding, etc. The attacker could also subvert the meaning of the URL string request by encoding the data being sent to the server through a GET request. For instance an attacker may subvert the meaning of parameters used in a SQL request and sent through the URL string (See Example section).
  • User-Controlled Filename
    An attack of this type involves an attacker inserting malicious characters (such as a XSS redirection) into a filename, directly or indirectly that is then used by the target software to generate HTML text or other potentially executable content. Many websites rely on user-generated content and dynamically build resources like files, filenames, and URL links directly from user supplied data. In this attack pattern, the attacker uploads code that can execute in the client browser and/or redirect the client browser to a site that the attacker owns. All XSS attack payload variants can be used to pass and exploit these vulnerabilities.
  • Using Escaped Slashes in Alternate Encoding
    This attack targets the use of the backslash in alternate encoding. An attacker can provide a backslash as a leading character and causes a parser to believe that the next character is special. This is called an escape. By using that trick, the attacker tries to exploit alternate ways to encode the same character which leads to filter problems and opens avenues to attack.
  • Using Slashes in Alternate Encoding
    This attack targets the encoding of the Slash characters. An attacker would try to exploit common filtering problems related to the use of the slashes characters to gain access to resources on the target host. Directory-driven systems, such as file systems and databases, typically use the slash character to indicate traversal between directories or other container components. For murky historical reasons, PCs (and, as a result, Microsoft OSs) choose to use a backslash, whereas the UNIX world typically makes use of the forward slash. The schizophrenic result is that many MS-based systems are required to understand both forms of the slash. This gives the attacker many opportunities to discover and abuse a number of common filtering problems. The goal of this pattern is to discover server software that only applies filters to one version, but not the other.
  • Buffer Overflow in an API Call
    This attack targets libraries or shared code modules which are vulnerable to buffer overflow attacks. An attacker who has access to an API may try to embed malicious code in the API function call and exploit a buffer overflow vulnerability in the function's implementation. All clients that make use of the code library thus become vulnerable by association. This has a very broad effect on security across a system, usually affecting more than one software process.
  • Using UTF-8 Encoding to Bypass Validation Logic
    This attack is a specific variation on leveraging alternate encodings to bypass validation logic. This attack leverages the possibility to encode potentially harmful input in UTF-8 and submit it to applications not expecting or effective at validating this encoding standard making input filtering difficult. UTF-8 (8-bit UCS/Unicode Transformation Format) is a variable-length character encoding for Unicode. Legal UTF-8 characters are one to four bytes long. However, early version of the UTF-8 specification got some entries wrong (in some cases it permitted overlong characters). UTF-8 encoders are supposed to use the "shortest possible" encoding, but naive decoders may accept encodings that are longer than necessary. According to the RFC 3629, a particularly subtle form of this attack can be carried out against a parser which performs security-critical validity checks against the UTF-8 encoded form of its input, but interprets certain illegal octet sequences as characters.
  • Web Logs Tampering
    Web Logs Tampering attacks involve an attacker injecting, deleting or otherwise tampering with the contents of web logs typically for the purposes of masking other malicious behavior. Additionally, writing malicious data to log files may target jobs, filters, reports, and other agents that process the logs in an asynchronous attack pattern. This pattern of attack is similar to "Log Injection-Tampering-Forging" except that in this case, the attack is targeting the logs of the web server and not the application.
  • XPath Injection
    An attacker can craft special user-controllable input consisting of XPath expressions to inject the XML database and bypass authentication or glean information that he normally would not be able to. XPath Injection enables an attacker to talk directly to the XML database, thus bypassing the application completely. XPath Injection results from the failure of an application to properly sanitize input used as part of dynamic XPath expressions used to query an XML database. In order to successfully inject XML and retrieve information from a database, an attacker:
  • AJAX Fingerprinting
    This attack utilizes the frequent client-server roundtrips in Ajax conversation to scan a system. While Ajax does not open up new vulnerabilities per se, it does optimize them from an attacker point of view. In many XSS attacks the attacker must get a "hole in one" and successfully exploit the vulnerability on the victim side the first time, once the client is redirected the attacker has many chances to engage in follow on probes, but there is only one first chance. In a widely used web application this is not a major problem because 1 in a 1,000 is good enough in a widely used application. A common first step for an attacker is to footprint the environment to understand what attacks will work. Since footprinting relies on enumeration, the conversational pattern of rapid, multiple requests and responses that are typical in Ajax applications enable an attacker to look for many vulnerabilities, well-known ports, network locations and so on.
  • Embedding Script (XSS) in HTTP Headers
    An attack of this type exploits web applications that generate web content, such as links in a HTML page, based on unvalidated or improperly validated data submitted by other actors. XSS in HTTP Headers attacks target the HTTP headers which are hidden from most users and may not be validated by web applications.
  • OS Command Injection
    In this type of an attack, an adversary injects operating system commands into existing application functions. An application that uses untrusted input to build command strings is vulnerable. An adversary can leverage OS command injection in an application to elevate privileges, execute arbitrary commands and compromise the underlying operating system.
  • Buffer Overflow in Local Command-Line Utilities
    This attack targets command-line utilities available in a number of shells. An attacker can leverage a vulnerability found in a command-line utility to escalate privilege to root.
  • XSS in IMG Tags
    Image tags are an often overlooked, but convenient, means for a Cross Site Scripting attack. The attacker can inject script contents into an image (IMG) tag in order to steal information from a victim's browser and execute malicious scripts.
  • XML Parser Attack
    Applications often need to transform data in and out of the XML format by using an XML parser. It may be possible for an attacker to inject data that may have an adverse effect on the XML parser when it is being processed. These adverse effects may include the parser crashing, consuming too much of a resource, executing too slowly, executing code supplied by an attacker, allowing usage of unintended system functionality, etc. An attacker's goal is to leverage parser failure to his or her advantage. In some cases it may be possible to jump from the data plane to the control plane via bad data being passed to an XML parser. [R.99.1]
nessus via4
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-3654-1.NASL
    description Jann Horn and Ken Johnson discovered that microprocessors utilizing speculative execution of a memory read may allow unauthorized memory reads via a sidechannel attack. This flaw is known as Spectre Variant 4. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2018-3639) Tuba Yavuz discovered that a double-free error existed in the USBTV007 driver of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-17975) It was discovered that a race condition existed in the F2FS implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-18193) It was discovered that a buffer overflow existed in the Hisilicon HNS Ethernet Device driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-18222) It was discovered that the netfilter subsystem in the Linux kernel did not validate that rules containing jumps contained user-defined chains. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-1065) It was discovered that the netfilter subsystem of the Linux kernel did not properly validate ebtables offsets. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-1068) It was discovered that a NULL pointer dereference vulnerability existed in the DCCP protocol implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-1130) It was discovered that the SCTP Protocol implementation in the Linux kernel did not properly validate userspace provided payload lengths in some situations. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-5803) It was discovered that a double free error existed in the block layer subsystem of the Linux kernel when setting up a request queue. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-7480) It was discovered that a memory leak existed in the SAS driver subsystem of the Linux kernel. A local attacker could use this to cause a denial of service (memory exhaustion). (CVE-2018-7757) It was discovered that a race condition existed in the x86 machine check handler in the Linux kernel. A local privileged attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-7995) Eyal Itkin discovered that the USB displaylink video adapter driver in the Linux kernel did not properly validate mmap offsets sent from userspace. A local attacker could use this to expose sensitive information (kernel memory) or possibly execute arbitrary code. (CVE-2018-8781) Silvio Cesare discovered a buffer overwrite existed in the NCPFS implementation in the Linux kernel. A remote attacker controlling a malicious NCPFS server could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2018-8822). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 110048
    published 2018-05-23
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110048
    title Ubuntu 16.04 LTS : linux, linux-aws, linux-kvm, vulnerabilities (USN-3654-1) (Spectre)
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2018-3096.NASL
    description An update for kernel-rt is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix(es) : * A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) * kernel: out-of-bounds access in the show_timer function in kernel/time/ posix-timers.c (CVE-2017-18344) * kernel: Integer overflow in udl_fb_mmap() can allow attackers to execute code in kernel space (CVE-2018-8781) * kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902) * kernel: Missing check in inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405) * kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830) * kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861) * kernel: Handling of might_cancel queueing is not properly pretected against race (CVE-2017-10661) * kernel: Salsa20 encryption algorithm does not correctly handle zero-length inputs allowing local attackers to cause denial of service (CVE-2017-17805) * kernel: Inifinite loop vulnerability in madvise_willneed() function allows local denial of service (CVE-2017-18208) * kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service (CVE-2018-1120) * kernel: a NULL pointer dereference in dccp_write_xmit() leads to a system crash (CVE-2018-1130) * kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial of service (CVE-2018-5344) * kernel: Missing length check of payload in _sctp_make_chunk() function allows denial of service (CVE-2018-5803) * kernel: buffer overflow in drivers/net/wireless/ath/wil6210/ wmi.c:wmi_set_ie() may lead to memory corruption (CVE-2018-5848) * kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image (CVE-2018-10878) * kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet (CVE-2018-1000026) * kernel: Information leak when handling NM entries containing NUL (CVE-2016-4913) * kernel: Mishandling mutex within libsas allowing local Denial of Service (CVE-2017-18232) * kernel: NULL pointer dereference in ext4_process_freed_data() when mounting crafted ext4 image (CVE-2018-1092) * kernel: NULL pointer dereference in ext4_xattr_inode_hash() causes crash with crafted ext4 image (CVE-2018-1094) * kernel: vhost: Information disclosure in vhost.c:vhost_new_msg() (CVE-2018-1118) * kernel: Denial of service in resv_map_release function in mm/hugetlb.c (CVE-2018-7740) * kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/ libsas/sas_expander.c (CVE-2018-7757) * kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service (CVE-2018-10322) * kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file (CVE-2018-10879) * kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image (CVE-2018-10881) * kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function (CVE-2018-10883) * kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c (CVE-2018-10940) Red Hat would like to thank Juha-Matti Tilli (Aalto University - Department of Communications and Networking and Nokia Bell Labs) for reporting CVE-2018-5391; Trend Micro Zero Day Initiative for reporting CVE-2018-10902; Qualys Research Labs for reporting CVE-2018-1120; Evgenii Shatokhin (Virtuozzo Team) for reporting CVE-2018-1130; and Wen Xu for reporting CVE-2018-1092 and CVE-2018-1094.
    last seen 2019-02-21
    modified 2019-02-06
    plugin id 118528
    published 2018-10-31
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118528
    title RHEL 7 : kernel-rt (RHSA-2018:3096)
  • NASL family Scientific Linux Local Security Checks
    NASL id SL_20181030_KERNEL_ON_SL7_X.NASL
    description Security Fix(es) : - A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) - kernel: out-of-bounds access in the show_timer function in kernel/time /posix-timers.c (CVE-2017-18344) - kernel: Integer overflow in udl_fb_mmap() can allow attackers to execute code in kernel space (CVE-2018-8781) - kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902) - kernel: Missing check in inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405) - kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830) - kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861) - kernel: Handling of might_cancel queueing is not properly pretected against race (CVE-2017-10661) - kernel: Salsa20 encryption algorithm does not correctly handle zero- length inputs allowing local attackers to cause denial of service (CVE-2017-17805) - kernel: Inifinite loop vulnerability in madvise_willneed() function allows local denial of service (CVE-2017-18208) - kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service (CVE-2018-1120) - kernel: a NULL pointer dereference in dccp_write_xmit() leads to a system crash (CVE-2018-1130) - kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial of service (CVE-2018-5344) - kernel: Missing length check of payload in _sctp_make_chunk() function allows denial of service (CVE-2018-5803) - kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption (CVE-2018-5848) - kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image (CVE-2018-10878) - kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet (CVE-2018-1000026) - kernel: Information leak when handling NM entries containing NUL (CVE-2016-4913) - kernel: Mishandling mutex within libsas allowing local Denial of Service (CVE-2017-18232) - kernel: NULL pointer dereference in ext4_process_freed_data() when mounting crafted ext4 image (CVE-2018-1092) - kernel: NULL pointer dereference in ext4_xattr_inode_hash() causes crash with crafted ext4 image (CVE-2018-1094) - kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2018-1118) - kernel: Denial of service in resv_map_release function in mm/hugetlb.c (CVE-2018-7740) - kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c (CVE-2018-7757) - kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service (CVE-2018-10322) - kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file (CVE-2018-10879) - kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image (CVE-2018-10881) - kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function (CVE-2018-10883) - kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c (CVE-2018-10940)
    last seen 2019-02-21
    modified 2018-12-27
    plugin id 119187
    published 2018-11-27
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=119187
    title Scientific Linux Security Update : kernel on SL7.x x86_64
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-1855-2.NASL
    description The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes. The following security bugs were fixed : CVE-2018-5848: In the function wmi_set_ie(), the length validation code did not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument could have caused a buffer overflow (bnc#1097356) CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO ioctl (bsc#1096728). CVE-2017-18249: The add_free_nid function did not properly track an allocated nid, which allowed local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads (bnc#1087036) CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX registers) between processes. These registers might contain encryption keys when doing SSE accelerated AES enc/decryption (bsc#1087086) CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure (bnc#1086400) CVE-2017-13305: Prevent information disclosure vulnerability in encrypted-keys (bsc#1094353). CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers (bsc#1087095). CVE-2018-1094: The ext4_fill_super function did not always initialize the crc32c checksum driver, which allowed attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image (bsc#1087007). CVE-2018-1092: The ext4_iget function mishandled the case of a root directory with a zero i_links_count, which allowed attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image (bsc#1087012). CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that allowed a local user to cause a denial of service by a number of certain crafted system calls (bsc#1092904). CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob that contains a jump but lacks a user-defined chain, which allowed local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650). CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when handling SCTP packets length that could have been exploited to cause a kernel crash (bnc#1083900). CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c __rds_rdma_map() function that allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bsc#1082962). CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that could have caused a crash and possibly memory corruption (bsc#1089895). The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 118272
    published 2018-10-22
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=118272
    title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1855-2)
  • NASL family SuSE Local Security Checks
    NASL id SUSE_SU-2018-1855-1.NASL
    description The SUSE Linux Enterprise 12 SP2 LTSS kernel was updated receive various security and bugfixes. The following security bugs were fixed : - CVE-2018-5848: In the function wmi_set_ie(), the length validation code did not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument could have caused a buffer overflow (bnc#1097356) - CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO ioctl (bsc#1096728). - CVE-2017-18249: The add_free_nid function did not properly track an allocated nid, which allowed local users to cause a denial of service (race condition) or possibly have unspecified other impact via concurrent threads (bnc#1087036) - CVE-2018-3665: Prevent disclosure of FPU registers (including XMM and AVX registers) between processes. These registers might contain encryption keys when doing SSE accelerated AES enc/decryption (bsc#1087086) - CVE-2017-18241: Prevent a NULL pointer dereference by using a noflush_merge option that triggers a NULL value for a flush_cmd_control data structure (bnc#1086400) - CVE-2017-13305: Prevent information disclosure vulnerability in encrypted-keys (bsc#1094353). - CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c did not validate bitmap block numbers (bsc#1087095). - CVE-2018-1094: The ext4_fill_super function did not always initialize the crc32c checksum driver, which allowed attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image (bsc#1087007). - CVE-2018-1092: The ext4_iget function mishandled the case of a root directory with a zero i_links_count, which allowed attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image (bsc#1087012). - CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that allowed a local user to cause a denial of service by a number of certain crafted system calls (bsc#1092904). - CVE-2018-1065: The netfilter subsystem mishandled the case of a rule blob that contains a jump but lacks a user-defined chain, which allowed local users to cause a denial of service (NULL pointer dereference) by leveraging the CAP_NET_RAW or CAP_NET_ADMIN capability (bsc#1083650). - CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when handling SCTP packets length that could have been exploited to cause a kernel crash (bnc#1083900). - CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c __rds_rdma_map() function that allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bsc#1082962). - CVE-2018-1000199: Prevent vulnerability in modify_user_hw_breakpoint() that could have caused a crash and possibly memory corruption (bsc#1089895). The update package also includes non-security fixes. See advisory for details. Note that Tenable Network Security has extracted the preceding description block directly from the SUSE security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-02-21
    modified 2018-12-01
    plugin id 110838
    published 2018-07-02
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=110838
    title SUSE SLES12 Security Update : kernel (SUSE-SU-2018:1855-1)
  • NASL family SuSE Local Security Checks
    NASL id OPENSUSE-2018-762.NASL
    description The openSUSE Leap 15 kernel was updated to receive various security and bugfixes. The following security bugs were fixed : - CVE-2018-13406: An integer overflow in the uvesafb_setcmap function could have result in local attackers being able to crash the kernel or potentially elevate privileges because kmalloc_array is not used (bnc#1100418) - CVE-2018-13053: The alarm_timer_nsleep function had an integer overflow via a large relative timeout because ktime_add_safe was not used (bnc#1099924) - CVE-2018-9385: Prevent overread of the 'driver_override' buffer (bsc#1100491) - CVE-2018-13405: The inode_init_owner function allowed local users to create files with an unintended group ownership allowing attackers to escalate privileges by making a plain file executable and SGID (bnc#1100416) - CVE-2017-5753: Systems with microprocessors utilizing speculative execution and branch prediction may have allowed unauthorized disclosure of information to an attacker with local user access via a side-channel analysis (bsc#1068032). - CVE-2018-1118: Linux kernel vhost did not properly initialize memory in messages passed between virtual guests and the host operating system. This could have allowed local privileged users to read some kernel memory contents when reading from the /dev/vhost-net device file (bsc#1092472). - CVE-2018-12233: A memory corruption bug in JFS could have been triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability could be triggered by an unprivileged user with the ability to create files and execute programs (bsc#1097234) - CVE-2018-5848: In the function wmi_set_ie(), the length validation code did not handle unsigned integer overflow properly. As a result, a large value of the 'ie_len' argument could have caused a buffer overflow (bnc#1097356) - CVE-2018-1000204: Prevent infoleak caused by incorrect handling of the SG_IO ioctl (bsc#1096728) - CVE-2018-1120: By mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker could have caused utilities from psutils or procps (such as ps, w) to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks) (bsc#1093158). - CVE-2018-1094: The ext4_fill_super function did not always initialize the crc32c checksum driver, which allowed attackers to cause a denial of service (ext4_xattr_inode_hash NULL pointer dereference and system crash) via a crafted ext4 image (bsc#1087007). - CVE-2018-1092: The ext4_iget function mishandled the case of a root directory with a zero i_links_count, which allowed attackers to cause a denial of service (ext4_process_freed_data NULL pointer dereference and OOPS) via a crafted ext4 image (bsc#1087012). - CVE-2018-1093: The ext4_valid_block_bitmap function allowed attackers to cause a denial of service (out-of-bounds read and system crash) via a crafted ext4 image because balloc.c and ialloc.c do not validate bitmap block numbers (bsc#1087095). - CVE-2018-1000200: Prevent NULL pointer dereference which could have resulted in an out of memory (OOM) killing of large mlocked processes (bsc#1090150). - CVE-2018-1130: NULL pointer dereference in dccp_write_xmit() function that allowed a local user to cause a denial of service by a number of certain crafted system calls (bsc#1092904) - CVE-2018-5803: Prevent error in the '_sctp_make_chunk()' function when handling SCTP packets length that could have been exploited to cause a kernel crash (bnc#1083900) - CVE-2018-7492: Prevent NULL pointer dereference in the net/rds/rdma.c __rds_rdma_map() function that allowed local attackers to cause a system panic and a denial-of-service, related to RDS_GET_MR and RDS_GET_MR_FOR_DEST (bsc#1082962) - CVE-2018-1108: Prevent weakness in the implementation of random seed data. Programs, early in the boot sequence, could have used the data allocated for the seed (bsc#1090818). - CVE-2018-10323: The xfs_bmap_extents_to_btree function allowed local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image (bsc#1090717). - CVE-2018-8781: The udl_fb_mmap function had an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space (bsc#1090643) - CVE-2018-10124: The kill_something_info function in kernel/signal.c might have allowed local users to cause a denial of service via an INT_MIN argument (bnc#1089752) - CVE-2018-10087: The kernel_wait4 function in kernel/exit.c might have allowed local users to cause a denial of service by triggering an attempted use of the -INT_MIN value (bnc#1089608) - CVE-2017-5715: Prevent unauthorized disclosure of information to an attacker with local user access caused by speculative execution and indirect branch prediction (bsc#1068032) The following non-security bugs were fixed : - 1wire: family module autoload fails because of upper/lower case mismatch (bsc#1051510). - 8021q: fix a memory leak for VLAN 0 device (networking-stable-18_01_12). - 8139too: Use disable_irq_nosync() in rtl8139_poll_controller() (networking-stable-18_05_15). - 8139too: revisit napi_complete_done() usage (networking-stable-17_10_09). - 9p/trans_virtio: discard zero-length reply (bsc#1052766). - ACPI / APEI: Replace ioremap_page_range() with fixmap (bsc#1051510). - ACPI / LPSS: Add missing prv_offset setting for byt/cht PWM devices (bsc#1051510). - ACPI / NUMA: ia64: Parse all entries of SRAT memory affinity table (bnc#1088796, ). - ACPI / bus: Do not call _STA on battery devices with unmet dependencies (bsc#1051510). - ACPI / button: make module loadable when booted in non-ACPI mode (bsc#1051510). - ACPI / hotplug / PCI: Check presence of slot itself in get_slot_status() (bsc#1051510). - ACPI / scan: Initialize watchdog before PNP (bsc#1073960). - ACPI / scan: Send change uevent with offine environmental data (bsc#1082485). - ACPI / scan: Use acpi_bus_get_status() to initialize ACPI_TYPE_DEVICE devs (bsc#1051510). - ACPI / video: Add quirk to force acpi-video backlight on Samsung 670Z5E (bsc#1051510). - ACPI / video: Default lcd_only to true on Win8-ready and newer machines (bsc#1051510). - ACPI / video: Only default only_lcd to true on Win8-ready _desktops_ (bsc#1051510). - ACPI / watchdog: Prefer iTCO_wdt on Lenovo Z50-70 (bsc#1051510). - ACPI / watchdog: properly initialize resources (bsc#1051510). - ACPI: EC: Fix debugfs_create_*() usage (bsc#1051510). - ACPI: acpi_pad: Fix memory leak in power saving threads (bsc#1051510). - ACPI: processor_perflib: Do not send _PPC change notification if not ready (bsc#1051510). - ACPI: sysfs: Make ACPI GPE mask kernel parameter cover all GPEs (bsc#1051510). - ACPICA: ACPI 6.0A: Changes to the NFIT ACPI table (bsc#1091424). - ACPICA: Events: add a return on failure from acpi_hw_register_read (bsc#1051510). - ACPICA: Fix memory leak on unusual memory leak (bsc#1051510). - ACPICA: acpi: acpica: fix acpi operand cache leak in nseval.c (bsc#1051510). - ALSA: aloop: Add missing cable lock to ctl API callbacks (bsc#1051510). - ALSA: aloop: Mark paused device as inactive (bsc#1051510). - ALSA: asihpi: Hardening for potential Spectre v1 (bsc#1051510). - ALSA: caiaq: Add yet more sanity checks for invalid EPs (bsc#1051510). - ALSA: control: Hardening for potential Spectre v1 (bsc#1051510). - ALSA: control: fix a redundant-copy issue (bsc#1051510). - ALSA: core: Report audio_tstamp in snd_pcm_sync_ptr (bsc#1051510). - ALSA: dice: fix OUI for TC group (bsc#1051510). - ALSA: dice: fix error path to destroy initialized stream data (bsc#1051510). - ALSA: dice: fix kernel NULL pointer dereference due to invalid calculation for array index (bsc#1051510). - ALSA: emu10k1: Fix kABI breakage (bsc#1093027). - ALSA: emu10k1: add a IOMMU workaround (bsc#1093027). - ALSA: emu10k1: add optional debug printouts with DMA addresses (bsc#1093027). - ALSA: emu10k1: make sure synth DMA pages are allocated with DMA functions (bsc#1093027). - ALSA: emu10k1: remove reserved_page (bsc#1093027). - ALSA: emu10k1: use dma_set_mask_and_coherent() (bsc#1093027). - ALSA: hda - Fix incorrect usage of IS_REACHABLE() (bsc#1051510). - ALSA: hda - Handle kzalloc() failure in snd_hda_attach_pcm_stream() (bsc#1051510). - ALSA: hda - New VIA controller suppor no-snoop path (bsc#1051510). - ALSA: hda - Skip jack and others for non-existing PCM streams (bsc#1051510). - ALSA: hda/ca0132 - use ARRAY_SIZE (bsc#1051510). - ALSA: hda/ca0132: Add DSP Volume set and New mixers for SBZ + R3Di (bsc#1096696). - ALSA: hda/ca0132: Add PCI region2 iomap for SBZ (bsc#1096696). - ALSA: hda/ca0132: Add dsp setup + gpio functions for r3di (bsc#1096696). - ALSA: hda/ca0132: Add extra exit functions for R3Di and SBZ (bsc#1096696). - ALSA: hda/ca0132: Add new control changes for SBZ + R3Di (bsc#1096696). - ALSA: hda/ca0132: Add pincfg for SBZ + R3Di, add fp hp auto-detect (bsc#1096696). - ALSA: hda/ca0132: Delete pointless assignments to struct auto_pin_cfg fields (bsc#1051510). - ALSA: hda/ca0132: Delete redundant UNSOL event requests (bsc#1051510). - ALSA: hda/ca0132: Do not test for QUIRK_NONE (bsc#1051510). - ALSA: hda/ca0132: Fix DMic data rate for Alienware M17x R4 (bsc#1051510). - ALSA: hda/ca0132: R3Di and SBZ quirk entires + alt firmware loading (bsc#1096696). - ALSA: hda/ca0132: Restore PCM Analog Mic-In2 (bsc#1051510). - ALSA: hda/ca0132: Restore behavior of QUIRK_ALIENWARE (bsc#1051510). - ALSA: hda/ca0132: add alt_select_in/out for R3Di + SBZ (bsc#1096696). - ALSA: hda/ca0132: add ca0132_alt_set_vipsource (bsc#1096696). - ALSA: hda/ca0132: add dsp setup related commands for the sbz (bsc#1096696). - ALSA: hda/ca0132: add extra init functions for r3di + sbz (bsc#1096696). - ALSA: hda/ca0132: add the ability to set src_id on scp commands (bsc#1096696). - ALSA: hda/ca0132: constify parameter table for effects (bsc#1096696). - ALSA: hda/ca0132: constify read-only members of string array (bsc#1096696). - ALSA: hda/ca0132: constify templates for control element set (bsc#1096696). - ALSA: hda/ca0132: fix array_size.cocci warnings (bsc#1096696). - ALSA: hda/ca0132: fix build failure when a local macro is defined (bsc#1051510). - ALSA: hda/ca0132: make array ca0132_alt_chmaps static (bsc#1051510). - ALSA: hda/ca0132: merge strings just for printk (bsc#1096696). - ALSA: hda/ca0132: update core functions for sbz + r3di (bsc#1096696). - ALSA: hda/conexant - Add fixup for HP Z2 G4 workstation (bsc#1092975). - ALSA: hda/conexant - Add hp-mic-fix model string (bsc#1092975). - ALSA: hda/realtek - Add a quirk for FSC ESPRIMO U9210 (bsc#1051510). - ALSA: hda/realtek - Add shutup hint (bsc#1051510). - ALSA: hda/realtek - Add some fixes for ALC233 (bsc#1051510). - ALSA: hda/realtek - Clevo P950ER ALC1220 Fixup (bsc#1051510). - ALSA: hda/realtek - Enable mic-mute hotkey for several Lenovo AIOs (bsc#1051510). - ALSA: hda/realtek - Fix pop noise on Lenovo P50 and co (bsc#1051510). - ALSA: hda/realtek - Fix the problem of two front mics on more machines (bsc#1051510). - ALSA: hda/realtek - Fixup for HP x360 laptops with BO speakers (bsc#1096705). - ALSA: hda/realtek - Fixup mute led on HP Spectre x360 (bsc#1096705). - ALSA: hda/realtek - Refactor alc269_fixup_hp_mute_led_mic*() (bsc#1096705). - ALSA: hda/realtek - Update ALC255 depop optimize (bsc#1051510). - ALSA: hda/realtek - adjust the location of one mic (bsc#1051510). - ALSA: hda/realtek - change the location for one of two front mics (bsc#1051510). - ALSA: hda/realtek - set PINCFG_HEADSET_MIC to parse_flags (bsc#1051510). - ALSA: hda: Add ASRock H81M-HDS to the power_save blacklist (bsc#1051510). - ALSA: hda: Add Clevo W35xSS_370SS to the power_save blacklist (bsc#1051510). - ALSA: hda: Add Gigabyte P55A-UD3 and Z87-D3HP to the power_save blacklist (bsc#1051510). - ALSA: hda: Add Icelake PCI ID (bsc#1051510). - ALSA: hda: Add Intel NUC5i7RY to the power_save blacklist (bsc#1051510). - ALSA: hda: Add Intel NUC7i3BNB to the power_save blacklist (bsc#1051510). - ALSA: hda: Add Lenovo C50 All in one to the power_save blacklist (bsc#1051510). - ALSA: hda: Hardening for potential Spectre v1 (bsc#1051510). - ALSA: hda: add dock and led support for HP EliteBook 830 G5 (bsc#1051510). - ALSA: hda: add dock and led support for HP ProBook 640 G4 (bsc#1051510). - ALSA: hdspm: Hardening for potential Spectre v1 (bsc#1051510). - ALSA: hiface: Add sanity checks for invalid EPs (bsc#1051510). - ALSA: line6: Add yet more sanity checks for invalid EPs (bsc#1051510). - ALSA: line6: Use correct endpoint type for midi output (bsc#1051510). - ALSA: line6: add support for POD HD DESKTOP (bsc#1051510). - ALSA: line6: add support for POD HD500X (bsc#1051510). - ALSA: line6: remove unnecessary initialization to PODHD500X (bsc#1051510). - ALSA: opl3: Hardening for potential Spectre v1 (bsc#1051510). - ALSA: pcm: Avoid potential races between OSS ioctls and read/write (bsc#1051510). - ALSA: pcm: Check PCM state at xfern compat ioctl (bsc#1051510). - ALSA: pcm: Fix UAF at PCM release via PCM timer access (bsc#1051510). - ALSA: pcm: Fix endless loop for XRUN recovery in OSS emulation (bsc#1051510). - ALSA: pcm: Fix mutex unbalance in OSS emulation ioctls (bsc#1051510). - ALSA: pcm: Return -EBUSY for OSS ioctls changing busy streams (bsc#1051510). - ALSA: pcm: potential uninitialized return values (bsc#1051510). - ALSA: rawmidi: Fix missing input substream checks in compat ioctls (bsc#1051510). - ALSA: rme9652: Hardening for potential Spectre v1 (bsc#1051510). - ALSA: seq: Fix UBSAN warning at SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT ioctl (bsc#1051510). - ALSA: seq: Fix races at MIDI encoding in snd_virmidi_output_trigger() (bsc#1051510). - ALSA: seq: oss: Fix unbalanced use lock for synth MIDI device (bsc#1051510). - ALSA: seq: oss: Hardening for potential Spectre v1 (bsc#1051510). - ALSA: timer: Fix UBSAN warning at SNDRV_TIMER_IOCTL_NEXT_DEVICE ioctl (bsc#1051510). - ALSA: timer: Fix pause event notification (bsc#1051510). - ALSA: usb-audio: Add 'Keep Interface' control (bsc#1089467). - ALSA: usb-audio: Add a quirk for Nura's first gen headset (bsc#1051510). - ALSA: usb-audio: Add keep_iface flag (bsc#1089467). - ALSA: usb-audio: Add native DSD support for Luxman DA-06 (bsc#1051510). - ALSA: usb-audio: Add native DSD support for Mytek DACs (bsc#1051510). - ALSA: usb-audio: Add native DSD support for TEAC UD-301 (bsc#1051510). - ALSA: usb-audio: Add sample rate quirk for Plantronics C310/C520-M (bsc#1051510). - ALSA: usb-audio: Add sample rate quirk for Plantronics P610 (bsc#1051510). - ALSA: usb-audio: Add sanity checks for invalid EPs (bsc#1051510). - ALSA: usb-audio: Allow to override the longname string (bsc#1091678). - ALSA: usb-audio: Apply vendor ID matching for sample rate quirk (bsc#1051510). - ALSA: usb-audio: Avoid superfluous usb_set_interface() calls (bsc#1089467). - ALSA: usb-audio: Change the semantics of the enable option (bsc#1051510). - ALSA: usb-audio: Disable the quirk for Nura headset (bsc#1051510). - ALSA: usb-audio: FIX native DSD support for TEAC UD-501 DAC (bsc#1051510). - ALSA: usb-audio: Generic DSD detection for XMOS-based implementations (bsc#1051510). - ALSA: usb-audio: Give proper vendor/product name for Dell WD15 Dock (bsc#1091678). - ALSA: usb-audio: Initialize Dell Dock playback volumes (bsc#1089467). - ALSA: usb-audio: Integrate native DSD support for ITF-USB based DACs (bsc#1051510). - ALSA: usb-audio: Remove explicitly listed Mytek devices (bsc#1051510). - ALSA: usb-audio: Skip broken EU on Dell dock USB-audio (bsc#1090658). - ALSA: usb-audio: Support changing input on Sound Blaster E1 (bsc#1051510). - ALSA: usb-audio: add boot quirk for Axe-Fx III (bsc#1051510). - ALSA: usb-audio: add more quirks for DSD interfaces (bsc#1051510). - ALSA: usb-audio: simplify set_sync_ep_implicit_fb_quirk (bsc#1051510). - ALSA: usb: mixer: volume quirk for CM102-A+/102S+ (bsc#1051510). - ALSA: usx2y: Add sanity checks for invalid EPs (bsc#1051510). - ALSA: usx2y: Fix invalid stream URBs (bsc#1051510). - ALSA: vmaster: Propagate slave error (bsc#1051510). - ASoC: Intel: Skylake: Disable clock gating during firmware and library download (bsc#1051510). - ASoC: Intel: cht_bsw_rt5645: Analog Mic support (bsc#1051510). - ASoC: Intel: sst: remove redundant variable dma_dev_name (bsc#1051510). - ASoC: adau17x1: Handling of DSP_RUN register during fw setup (bsc#1051510). - ASoC: cirrus: i2s: Fix LRCLK configuration (bsc#1051510). - ASoC: cirrus: i2s: Fix {TX|RX}LinCtrlData setup (bsc#1051510). - ASoC: cs35l35: Add use_single_rw to regmap config (bsc#1051510). - ASoC: dapm: delete dapm_kcontrol_data paths list before freeing it (bsc#1051510). - ASoC: fsl_esai: Fix divisor calculation failure at lower ratio (bsc#1051510). - ASoC: hdmi-codec: Fix module unloading caused kernel crash (bsc#1051510). - ASoC: hdmi-codec: fix spelling mistake: 'deteced' -> 'detected' (bsc#1051510). - ASoC: hdmi-codec: remove multi detection support (bsc#1051510). - ASoC: omap: Remove OMAP_MUX dependency from Nokia N810 audio support (bsc#1051510). - ASoC: rockchip: Fix dai_name for HDMI codec (bsc#1051510). - ASoC: rockchip: rk3288-hdmi-analog: Select needed codecs (bsc#1051510). - ASoC: rsnd: mark PM functions __maybe_unused (bsc#1051510). - ASoC: rt5514: Add the missing register in the readable table (bsc#1051510). - ASoC: samsung: i2s: Ensure the RCLK rate is properly determined (bsc#1051510). - ASoC: samsung: odroid: Drop requirement of clocks in the sound node (bsc#1051510). - ASoC: samsung: odroid: Fix 32000 sample rate handling (bsc#1051510). - ASoC: samsung: odroid: Fix EPLL frequency values (bsc#1051510). - ASoC: ssm2602: Replace reg_default_raw with reg_default (bsc#1051510). - ASoC: topology: Check widget kcontrols before deref (bsc#1051510). - ASoC: topology: Check widget kcontrols before deref (bsc#1051510). - ASoC: topology: Fix bugs of freeing soc topology (bsc#1051510). - ASoC: topology: Fix kcontrol name string handling (bsc#1051510). - ASoC: topology: create TLV data for dapm widgets (bsc#1051510). - ASoC: topology: fix some tiny memory leaks (bsc#1051510). - Bluetooth: Add a new 04ca:3015 QCA_ROME device (bsc#1051510). - Bluetooth: Apply QCA Rome patches for some ATH3012 models (bsc#1082504). - Bluetooth: Fix missing encryption refresh on Security Request (bsc#1051510). - Bluetooth: Set HCI_QUIRK_SIMULTANEOUS_DISCOVERY for BTUSB_QCA_ROME (bsc#1051510). - Bluetooth: btrtl: Fix a error code in rtl_load_config() (bsc#1051510). - Bluetooth: btusb: Add Dell XPS 13 9360 to btusb_needs_reset_resume_table (bsc#1051510). - Bluetooth: btusb: Add USB ID 7392:a611 for Edimax EW-7611ULB (bsc#1051510). - Bluetooth: btusb: Add device ID for RTL8822BE (bsc#1051510). - Bluetooth: btusb: Only check needs_reset_resume DMI table for QCA rome chipsets (bsc#1051510). - Bluetooth: btusb: add ID for LiteOn 04ca:3016 (bsc#1051510). - Bluetooth: hci_bcm: Add 6 new ACPI HIDs (bsc#1051510). - Bluetooth: hci_bcm: Add active_low irq polarity quirk for Asus T100CHI (bsc#1051510). - Bluetooth: hci_bcm: Add support for BCM2E72 (bsc#1051510). - Bluetooth: hci_bcm: Add support for MINIX Z83-4 based devices (bsc#1051510). - Bluetooth: hci_bcm: Fix setting of irq trigger type (bsc#1051510). - Bluetooth: hci_bcm: Handle empty packet after firmware loading (bsc#1051510). - Bluetooth: hci_bcm: Make bcm_request_irq fail if no IRQ resource (bsc#1051510). - Bluetooth: hci_bcm: Remove DMI quirk for the MINIX Z83-4 (bsc#1051510). - Bluetooth: hci_bcm: Treat Interrupt ACPI resources as always being active-low (bsc#1051510). - Bluetooth: hci_qca: Avoid missing rampatch failure with userspace fw loader (bsc#1051510). - Btrfs: Fix race condition between delayed refs and blockgroup removal (bsc#1086224). - Btrfs: Fix wrong first_key parameter in replace_path (follow up fix for bsc#1084721). - Btrfs: Only check first key for committed tree blocks (bsc#1084721). - Btrfs: Take trans lock before access running trans in check_delayed_ref (bsc#1097105). - Btrfs: Validate child tree block's level and first key (bsc#1084721). - Btrfs: fix copy_items() return value when logging an inode (bsc#1097105). - Btrfs: fix xattr loss after power failure (bsc#1097105). - Btrfs: push relocation recovery into a helper thread (bsc#1086467). - Btrfs: qgroups, fix rescan worker running races (bsc#1091101). - Btrfs: return error value if create_io_em failed in cow_file_range (bsc#1097105). - Btrfs: suspend qgroups during relocation recovery (bsc#1086467). - Btrfs: use btrfs_op instead of bio_op in __btrfs_map_block (bsc#1099918). - Btrfs: use spinlock to protect ->caching_block_groups list (bsc#1083684). - Correct bug reference in the patch (bnc#1095155) - Delete patches.arch/powerpc64-ftrace-Use-the-generic-version-of -ftrace_r.patch (bsc#1088804). - Downgrade printk level for MMC SDHCI host version error (bsc#1097941). - Enable uniput driver (bsc#1092566). - Fix copy_in_user() declaration (bsc#1052766). - Fix kABI breakage due to acpi_ec gpe field change (bsc#1051510). - Fix kABI breakage due to snd_usb_audio_quirk profile_name addition (bsc#1091678). - Fix kABI breakage due to sound/timer.h inclusion (bsc#1051510). - Fix kABI breakage for iwl_fw_runtime_ops change (bsc#1051510). - Fix kABI breakage for iwlwifi (bsc#1051510). - Fix kABI breakage of iio_buffer (bsc#1051510). - Fix kABI breakage with CONFIG_RT_GROUP_SCHED=n (bsc#1100734). - Fix kABI incompatibility by snd_pcm_oss_runtime.rw_ref addition (bsc#1051510). - Fix the build error in adau17x1 soc driver (bsc#1051510) - Fix the build of da9063_wdt module (bsc#1100843) Backport the missing prerequisite commit, move the previous fixes into the sorted section and refresh. - GFS2: Take inode off order_write list when setting jdata flag (bsc#1052766). - HID: add backlight level quirk for Asus ROG laptops (bsc#1101324). - HID: cp2112: fix broken gpio_direction_input callback (bsc#1051510). - HID: debug: check length before copy_to_user() (bsc#1051510). - HID: hiddev: fix potential Spectre v1 (bsc#1051510). - HID: hidraw: Fix crash on HIDIOCGFEATURE with a destroyed device (bsc#1051510). - HID: i2c-hid: Fix 'incomplete report' noise (bsc#1051510). - HID: i2c-hid: fix size check and type usage (bsc#1051510). - HID: intel-ish-hid: Enable Gemini Lake ish driver (bsc#1073765,). - HID: intel-ish-hid: use put_device() instead of kfree() (bsc#1051510). - HID: intel_ish-hid: ipc: register more pm callbacks to support hibernation (bsc#1051510). - HID: lenovo: Add support for IBM/Lenovo Scrollpoint mice (bsc#1051510). - HID: roccat: prevent an out of bounds read in kovaplus_profile_activated() (bsc#1051510). - HID: wacom: Add support for One by Wacom (CTL-472 / CTL-672) (bsc#1100633). - HID: wacom: Correct logical maximum Y for 2nd-gen Intuos Pro large (bsc#1051510). - HID: wacom: Correct touch maximum XY of 2nd-gen Intuos (bsc#1051510). - HID: wacom: EKR: ensure devres groups at higher indexes are released (bsc#1051510). - HID: wacom: Fix reporting of touch toggle (WACOM_HID_WD_MUTE_DEVICE) events (bsc#1051510). - HID: wacom: Release device resource data obtained by devres_alloc() (bsc#1051510). - HID: wacom: bluetooth: send exit report for recent Bluetooth devices (bsc#1051510). - IB/Hfi1: Read CCE Revision register to verify the device is responsive (bsc#1096793 ). - IB/core: Generate GID change event regardless of RoCE GID table property (bsc#1046306 ). - IB/core: Refer to RoCE port property instead of GID table property (bsc#1046306 ). - IB/cq: Do not force IB_POLL_DIRECT poll context for ib_process_cq_direct (bsc#1046306 ). - IB/hfi1 Use correct type for num_user_context (bsc#1096793 ). - IB/hfi1: Add a safe wrapper for _rcd_get_by_index (bsc#1096793 ). - IB/hfi1: Add tx_opcode_stats like the opcode_stats (bsc#1096793 ). - IB/hfi1: Complete check for locally terminated smp (bsc#1096793 ). - IB/hfi1: Compute BTH only for RDMA_WRITE_LAST/SEND_LAST packet (bsc#1096793 ). - IB/hfi1: Convert PortXmitWait/PortVLXmitWait counters to flit times (bsc#1096793 ). - IB/hfi1: Create common functions for affinity CPU mask operations (bsc#1096793 ). - IB/hfi1: Do not allocate PIO send contexts for VNIC (bsc#1096793 ). - IB/hfi1: Do not modify num_user_contexts module parameter (bsc#1096793 ). - IB/hfi1: Do not override given pcie_pset value (bsc#1096793 ). - IB/hfi1: Ensure VL index is within bounds (bsc#1096793 ). - IB/hfi1: Fix NULL pointer dereference when invalid num_vls is used (bsc#1060463 ). - IB/hfi1: Fix a wrapping test to insure the correct timeout (bsc#1096793 ). - IB/hfi1: Fix for early release of sdma context (bsc#1096793 ). - IB/hfi1: Fix handling of FECN marked multicast packet (bsc#1060463 ). - IB/hfi1: Fix loss of BECN with AHG (bsc#1096793 ). - IB/hfi1: Fix memory leak in exception path in get_irq_affinity() (bsc#1096793 ). - IB/hfi1: Fix serdes loopback set-up (bsc#1096793 ). - IB/hfi1: Handle initial value of 0 for CCTI setting (bsc#1096793 ). - IB/hfi1: Inline common calculation (bsc#1096793 ). - IB/hfi1: Insure int mask for in-kernel receive contexts is clear (bsc#1096793 ). - IB/hfi1: Look up ibport using a pointer in receive path (bsc#1096793 ). - IB/hfi1: Optimize kthread pointer locking when queuing CQ entries (bsc#1096793 ). - IB/hfi1: Optimize packet type comparison using 9B and bypass code paths (bsc#1096793 ). - IB/hfi1: Prevent LNI hang when LCB can't obtain lanes (bsc#1096793 ). - IB/hfi1: Prohibit invalid Init to Armed state transition (bsc#1096793 ). - IB/hfi1: Race condition between user notification and driver state (bsc#1096793 ). - IB/hfi1: Re-order IRQ cleanup to address driver cleanup race (bsc#1060463 ). - IB/hfi1: Refactor assign_ctxt() IOCTL (bsc#1096793 ). - IB/hfi1: Refactor get_base_info (bsc#1096793 ). - IB/hfi1: Refactor get_ctxt_info (bsc#1096793 ). - IB/hfi1: Refactor get_user() IOCTLs (bsc#1096793 ). - IB/hfi1: Refactor hfi_user_exp_rcv_clear() IOCTLs (bsc#1096793 ). - IB/hfi1: Refactor hfi_user_exp_rcv_invalid() IOCTLs (bsc#1096793 ). - IB/hfi1: Refactor hfi_user_exp_rcv_setup() IOCTL (bsc#1096793 ). - IB/hfi1: Remove unused hfi1_cpulist variables (bsc#1096793 ). - IB/hfi1: Reorder incorrect send context disable (bsc#1096793 ). - IB/hfi1: Return correct value for device state (bsc#1096793 ). - IB/hfi1: Send 'reboot' as planned down remote reason (bsc#1096793 ). - IB/hfi1: Set port number for errorinfo MAD response (bsc#1096793 ). - IB/hfi1: Show fault stats in both TX and RX directions (bsc#1096793 ). - IB/hfi1: Update HFI to use the latest PCI API (bsc#1096793 ). - IB/hfi1: Use after free race condition in send context error path (bsc#1096793 ). - IB/hfi1: Validate PKEY for incoming GSI MAD packets (bsc#1096793 ). - IB/ipoib: Avoid memory leak if the SA returns a different DGID (bsc#1046307 ). - IB/ipoib: Change number of TX wqe to 64 (bsc#1096793 ). - IB/ipoib: Fix for notify send CQ failure messages (bsc#1096793 ). - IB/ipoib: Fix for potential no-carrier state (bsc#1046307 ). - IB/ipoib: Get rid of the tx_outstanding variable in all modes (bsc#1096793 ). - IB/ipoib: Use NAPI in UD/TX flows (bsc#1096793 ). - IB/mlx4: Fix integer overflow when calculating optimal MTT size (bsc#1071218). - IB/mlx4: Move mlx4_uverbs_ex_query_device_resp to include/uapi/ (bsc#1071218). - IB/mlx5: Enable ECN capable bits for UD RoCE v2 QPs (bsc#1046305 ). - IB/mlx5: Respect new UMR capabilities (bsc#1093205). - IB/mlx5: Set the default active rate and width to QDR and 4X (bsc#1046305 ). - IB/mlx5: Use unlimited rate when static rate is not supported (bsc#1046305 ). - IB/mlx5:: pr_err() and mlx5_ib_dbg() strings should end with newlines (bsc#1093205). - IB/rdmavt: Add trace for RNRNAK timer (bsc#1096793 ). - IB/rdmavt: Allocate CQ memory on the correct node (bsc#1058717 ). - IB/rdmavt: No need to cancel RNRNAK retry timer when it is running (bsc#1096793 ). - IB/rdmavt: Use correct numa node for SRQ allocation (bsc#1096793 ). - IB/srp: Fix completion vector assignment algorithm (bsc#1046306 ). - IB/srp: Fix srp_abort() (bsc#1046306 ). - IB/srpt: Fix an out-of-bounds stack access in srpt_zerolength_write() (bsc#1046306 ). - IB/uverbs: Fix validating mandatory attributes (bsc#1046306 ). - IB/{hfi1, qib}: Add handling of kernel restart (bsc#1096793 ). - IB/{hfi1, rdmavt}: Fix memory leak in hfi1_alloc_devdata() upon failure (bsc#1096793 ). - IB/{rdmavt,hfi1}: Change hrtimer add to use pinned version (bsc#1096793 ). - Input: ALPS - fix TrackStick detection on Thinkpad L570 and Latitude 7370 (bsc#1051510). - Input: atmel_mxt_ts - add touchpad button mapping for Samsung Chromebook Pro (bsc#1051510). - Input: atmel_mxt_ts - fix the firmware update (bsc#1051510). - Input: elan_i2c - add ELAN0612 (Lenovo v330 14IKB) ACPI ID (bsc#1051510). - Input: elan_i2c - add ELAN0618 (Lenovo v330 15IKB) ACPI ID (bsc#1051510). - Input: elan_i2c_smbus - fix corrupted stack (bsc#1051510). - Input: elan_i2c_smbus - fix more potential stack-based buffer overflows (bsc#1051510). - Input: elantech - enable middle button of touchpads on ThinkPad P52 (bsc#1051510). - Input: elantech - fix V4 report decoding for module with middle key (bsc#1051510). - Input: goodix - add new ACPI id for GPD Win 2 touch screen (bsc#1051510). - Input: goodix - disable IRQs while suspended (bsc#1051510). - Input: i8042 - add Lenovo ThinkPad L460 to i8042 reset list (bsc#1051510). - Input: i8042 - enable MUX on Sony VAIO VGN-CS series to fix touchpad (bsc#1051510). - Input: leds - fix out of bound access (bsc#1051510). - Input: synaptics - Lenovo Carbon X1 Gen5 (2017) devices should use RMI (bsc#1051510). - Input: synaptics - Lenovo Thinkpad X1 Carbon G5 (2017) with Elantech trackpoints should use RMI (bsc#1051510). - Input: synaptics - add Intertouch support on X1 Carbon 6th and X280 (bsc#1051510). - Input: synaptics - add Lenovo 80 series ids to SMBus (bsc#1051510). - Input: synaptics - reset the ABS_X/Y fuzz after initializing MT axes (bsc#1051510). - Input: synaptics-rmi4 - fix an unchecked out of memory error path (bsc#1051510). - Input: synaptics: Add intertouch blacklist for Thinkpad Helix (bsc#1090457). - Input: xpad - add GPD Win 2 Controller USB IDs (bsc#1051510). - Input: xpad - fix GPD Win 2 controller name (bsc#1051510). - Input: xpad - sync supported devices with 360Controller (bsc#1051510). - Input: xpad - sync supported devices with XBCD (bsc#1051510). - KABI: hide ftrace_enabled in paca (bsc#1088804). - KEYS: DNS: limit the length of option strings (networking-stable-18_04_26). - KEYS: Use individual pages in big_key for crypto buffers (bsc#1051510). - KVM: MMU: consider host cache mode in MMIO page check (bsc#1087213). - KVM: PPC: Book3S HV: Fix ppc_breakpoint_available compile error (bsc#1061840). - KVM: PPC: Book3S HV: Handle migration with POWER9 disabled DAWR (bsc#1061840). - KVM: PPC: Book3S HV: Return error from h_set_dabr() on POWER9 (bsc#1061840). - KVM: PPC: Book3S HV: Return error from h_set_mode(SET_DAWR) on POWER9 (bsc#1061840). - KVM: PPC: Book3S HV: trace_tlbie must not be called in realmode (bsc#1061840). - KVM: arm64: Fix HYP idmap unmap when using 52bit PA (bsc#1089074). - MD: Free bioset when md_run fails (bsc#1093023). - Move upstreamed ideapad-laptop patch to sorted section (bsc#1093035) - NET: usb: qmi_wwan: add support for ublox R410M PID 0x90b2 (bsc#1090888). - NFC: fix device-allocation error return (bsc#1051510). - NFC: llcp: Limit size of SDP URI (bsc#1051510). - NFC: pn533: do not send USB data off of the stack (bsc#1051510). - NFS: Revert 'NFS: Move the flock open mode check into nfs_flock()' (bsc#1098983). - NFSv4: Revert commit 5f83d86cf531d ('NFSv4.x: Fix wraparound issues..') (git-fixes). - PCI/ASPM: Add L1 Substates definitions (bsc#1051510). - PCI/ASPM: Calculate LTR_L1.2_THRESHOLD from device characteristics (bsc#1051510). - PCI/DPC: Do not enable DPC if AER control is not allowed by the BIOS (bsc#1093184). - PCI/PME: Handle invalid data when reading Root Status (bsc#1051510). - PCI: Add ACS quirk for Intel 300 series (bsc#1051510). - PCI: Add ACS quirk for Intel 7th and 8th Gen mobile (bsc#1051510). - PCI: Add function 1 DMA alias quirk for Highpoint RocketRAID 644L (bsc#1051510). - PCI: Add function 1 DMA alias quirk for Marvell 88SE9220 (bsc#1051510). - PCI: Add function 1 DMA alias quirk for Marvell 9128 (bsc#1051510). - PCI: Create SR-IOV virtfn/physfn links before attaching driver (bsc#1051510). - PCI: Detach driver before procfs and sysfs teardown on device remove (bsc#1051510). - PCI: Mark Broadcom HT1100 and HT2000 Root Port Extended Tags as broken (bsc#1051510). - PCI: Remove messages about reassigning resources (bsc#1051510). - PCI: Restore config space on runtime resume despite being unbound (bsc#1051510). - PCI: aardvark: Fix PCIe Max Read Request Size setting (bsc#1051510). - PCI: aardvark: Fix logic in advk_pcie_{rd,wr}_conf() (bsc#1051510). - PCI: aardvark: Set PIO_ADDR_LS correctly in advk_pcie_rd_conf() (bsc#1051510). - PCI: aardvark: Use ISR1 instead of ISR0 interrupt in legacy irq mode (bsc#1051510). - PCI: designware-ep: Fix find_first_zero_bit() usage (bsc#1051510). - PCI: hv: Fix a __local_bh_enable_ip warning in hv_compose_msi_msg() (bnc#1094541). - PCI: pciehp: Clear Presence Detect and Data Link Layer Status Changed on resume (bsc#1051510). - PCI: shpchp: Enable bridge bus mastering if MSI is enabled (bsc#1051510). - PM / OPP: Add missing of_node_put(np) (bsc#1051510). - PM / OPP: Call notifier without holding opp_table->lock (bsc#1051510). - PM / OPP: Move error message to debug level (bsc#1051510). - PM / devfreq: Fix potential NULL pointer dereference in governor_store (bsc#1051510). - PM / s2idle: Clear the events_check_enabled flag (bsc#1051510). - PM / wakeirq: Fix unbalanced IRQ enable for wakeirq (bsc#1051510). - PM: docs: Drop an excess character from devices.rst (bsc#1051510). - Pass x86 as architecture on x86_64 and i386 (bsc#1093118). - RDMA/bnxt_re: Fix broken RoCE driver due to recent L2 driver changes (bsc#1086283 ). - RDMA/bnxt_re: Remove redundant bnxt_qplib_disable_nq() call (bsc#1086283 ). - RDMA/core: Avoid that ib_drain_qp() triggers an out-of-bounds stack access (bsc#1046306 ). - RDMA/core: Reduce poll batch for direct cq polling (bsc#1046306 ). - RDMA/i40iw: Avoid panic when reading back the IRQ affinity hint (bsc#1084001). - RDMA/mlx4: Fix uABI structure layouts for 32/64 compat (bsc#1071218). - RDMA/mlx5: Fix crash while accessing garbage pointer and freed memory (bsc#1046305 ). - RDMA/mlx5: Protect from NULL pointer derefence (bsc#1046305 ). - RDMA/ocrdma: Fix permissions for OCRDMA_RESET_STATS (bsc#1058513 ). - RDMA/rxe: Fix an out-of-bounds read (bsc#1050662 ). - RDMA/ucma: Allow resolving address w/o specifying source address (bsc#1046306 ). - RDMA/ucma: Introduce safer rdma_addr_size() variants (bsc#1046306 ). - RDMAVT: Fix synchronization around percpu_ref (bsc#1058717 ). - RDS: Check cmsg_len before dereferencing CMSG_DATA (networking-stable-17_12_31). - Refresh patches.suse/btrfs-use-kvzalloc-to-allocate-btrfs_fs_inf o.patch - Fixed References (bsc#1062897). - Remove the old fallback for iTCO/WDAT conflict (bsc#1073960) Now the upstream fix is included, so let's rip off the old trickery. - Revert 'Bluetooth: btusb: Fix quirk for Atheros 1525/QCA6174' (bsc#1051510). - Revert 'Remove patces for bug 1087405 due to regression' This reverts commit f91a2ea5192d9e933c41600da5d1543155df381c. - Revert 'ath10k: send (re)assoc peer command when NSS changed' (bsc#1051510). - Revert 'drm/i915/edp: Allow alternate fixed mode for eDP if available.' (bsc#1093604). - Revert 'kernel-binary: do not package extract-cert when not signing modules' This reverts commit 10a8bc496a553b8069d490a8ae7508bdb19f58d9. - Revert 'rt2800: use TXOP_BACKOFF for probe frames' (bsc#1051510). - Revert 'scsi: core: return BLK_STS_OK for DID_OK in __scsi_error_from_host_byte()' (bsc#1099918). - Revert 'scsi: make 'state' device attribute pollable' (bsc#1085341). - USB: Accept bulk endpoints with 1024-byte maxpacket (bsc#1092888). - USB: serial: pl2303: new device id for Chilitag (bsc#1087092). - USB: serial: simple: add Motorola Tetra driver (bsc#1087092). - USB:fix USB3 devices behind USB3 hubs not resuming at hibernate thaw (bsc#1090888). - Update config files, add CONFIG_EXPOLINE_AUTO=y for s390x (bsc#1090098). - Update config files: disable CONFIG_RT_GROUP_SCHED again (bsc#1100734) - Update config files: fix for Cherrytrail devices (bsc#1068546) - Update for above change patches.drivers/0003-md-cluster-Suspend-writes-in-RAID10 -if-within-range.patch (bsc#1093023). - Update patches.fixes/vti-fix-use-after-free-in-vti_tunnel_xmit- vti6_tnl_x.patch (bsc#1076830 networking-stable-17_10_09). - Update patches.suse/ceph-don-t-check-quota-for-snap-inode.patch (bsc#1089115). - Update patches.suse/ceph-fix-root-quota-realm-check.patch (bsc#1089115). - Update patches.suse/ceph-quota-add-counter-for-snaprealms-with- quota.patch (bsc#1089115). - Update patches.suse/ceph-quota-add-initial-infrastructure-to-su pport-cephfs-quotas.patch (bsc#1089115). - Update patches.suse/ceph-quota-cache-inode-pointer-in-ceph_snap _realm.patch (bsc#1089115). - Update patches.suse/ceph-quota-don-t-allow-cross-quota-renames. patch (bsc#1089115). - Update patches.suse/ceph-quota-support-for-ceph-quota-max_bytes .patch (bsc#1089115). - Update patches.suse/ceph-quota-support-for-ceph-quota-max_files .patch (bsc#1089115). - Update patches.suse/ceph-quota-update-mds-when-max_bytes-is-app roaching.patch (bsc#1089115). - X.509: fix BUG_ON() when hash algorithm is unsupported (bsc#1051510). - X.509: fix NULL dereference when restricting key with unsupported_sig (bsc#1051510). - X.509: fix comparisons of ->pkey_algo (bsc#1051510). - X.509: reject invalid BIT STRING for subjectPublicKey (bsc#1051510). - acpi, nfit: quiet invalid block-aperture-region warnings (bsc#1091781). - acpi, nfit: rework NVDIMM leaf method detection (bsc#1091782). - acpi: Add helper for deactivating memory region (bsc#1100132). - acpi: nfit: Add support for detect platform CPU cache flush on power loss (bsc#1091424). - acpi: nfit: add persistent memory control flag for nd_region (bsc#1091424). - adding missing rcu_read_unlock in ipxip6_rcv (networking-stable-17_12_31). - af_netlink: ensure that NLMSG_DONE never fails in dumps (networking-stable-17_11_20). - afs: Connect up the CB.ProbeUuid (bsc#1052766). - afs: Fix missing error handling in afs_write_end() (bsc#1052766). - allow_unsupported: add module tainting on feature use (). - amd-xgbe: Add pre/post auto-negotiation phy hooks (networking-stable-18_04_26). - amd-xgbe: Improve KR auto-negotiation and training (networking-stable-18_04_26). - amd-xgbe: Only use the SFP supported transceiver signals (networking-stable-18_04_26). - amd-xgbe: Restore PCI interrupt enablement setting on resume (networking-stable-18_03_07). - apparmor: fix dangling symlinks to policy rawdata after replacement (bsc#1095893). - apparmor: fix display of .ns_name for containers (bsc#1095893). - apparmor: fix logging of the existence test for signals (bsc#1095893). - apparmor: fix memory leak on buffer on error exit path (bsc#1095893). - arch/*: Kconfig: fix documentation for NMI watchdog (bsc#1099918). - arm/arm64: smccc: Add SMCCC-specific return codes (bsc#1085308). - arm64: Add 'ssbd' command-line option (bsc#1085308). - arm64: Add ARCH_WORKAROUND_2 probing (bsc#1085308). - arm64: Add per-cpu infrastructure to call ARCH_WORKAROUND_2 (bsc#1085308). - arm64: Call ARCH_WORKAROUND_2 on transitions between EL0 and EL1 (bsc#1085308). - arm64: Update config files. (bsc#1089762) Set NR_CPUS to 256. - arm64: alternatives: Add dynamic patching feature (bsc#1085308). - arm64: fix endianness annotation for __apply_alternatives()/get_alt_insn() (bsc#1085308). - arm64: ssbd: Add global mitigation state accessor (bsc#1085308). - arm64: ssbd: Add prctl interface for per-thread mitigation (bsc#1085308). - arm64: ssbd: Introduce thread flag to control userspace mitigation (bsc#1085308). - arm64: ssbd: Restore mitigation status on CPU resume (bsc#1085308). - arm64: ssbd: Skip apply_ssbd if not using dynamic mitigation (bsc#1085308). - arp: fix arp_filter on l3slave devices (networking-stable-18_04_10). - ath10k: Fix kernel panic while using worker (ath10k_sta_rc_update_wk) (bsc#1051510). - ath10k: correct target assert problem due to CE5 stuck (bsc#1051510). - ath10k: search all IEs for variant before falling back (bsc#1051510). - ath9k: fix crash in spectral scan (bsc#1051510). - auxdisplay: fix broken menu (bsc#1051510). - auxdisplay: img-ascii-lcd: Only build on archs that have IOMEM (bsc#1051510). - auxdisplay: img-ascii-lcd: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510). - backlight: as3711_bl: Fix Device Tree node lookup (bsc#1051510). - backlight: max8925_bl: Fix Device Tree node lookup (bsc#1051510). - backlight: tdo24m: Fix the SPI CS between transfers (bsc#1051510). - backlight: tps65217_bl: Fix Device Tree node lookup (bsc#1051510). - bcache: Add __printf annotation to __bch_check_keys() (bsc#1093023). - bcache: Annotate switch fall-through (bsc#1093023). - bcache: Fix a compiler warning in bcache_device_init() (bsc#1093023). - bcache: Fix indentation (bsc#1093023). - bcache: Fix kernel-doc warnings (bsc#1093023). - bcache: Fix, improve efficiency of closure_sync() (bsc#1093023). - bcache: Reduce the number of sparse complaints about lock imbalances (bsc#1093023). - bcache: Remove an unused variable (bsc#1093023). - bcache: Suppress more warnings about set-but-not-used variables (bsc#1093023). - bcache: Use PTR_ERR_OR_ZERO() (bsc#1093023). - bcache: add CACHE_SET_IO_DISABLE to struct cache_set flags (bsc#1093023). - bcache: add backing_request_endio() for bi_end_io (bsc#1093023). - bcache: add io_disable to struct cached_dev (bsc#1093023). - bcache: add journal statistic (bsc#1093023). - bcache: add stop_when_cache_set_failed option to backing device (bsc#1093023). - bcache: add wait_for_kthread_stop() in bch_allocator_thread() (bsc#1093023). - bcache: allow quick writeback when backing idle (bsc#1093023). - bcache: closures: move control bits one bit right (bsc#1093023). - bcache: comment on direct access to bvec table (bsc#1093023). - bcache: correct flash only vols (check all uuids) (bsc#1093023). - bcache: count backing device I/O error for writeback I/O (bsc#1093023). - bcache: fix cached_dev->count usage for bch_cache_set_error() (bsc#1093023). - bcache: fix error return value in memory shrink (bsc#1093023). - bcache: fix for allocator and register thread race (bsc#1093023). - bcache: fix for data collapse after re-attaching an attached device (bsc#1093023). - bcache: fix high CPU occupancy during journal (bsc#1093023). - bcache: fix inaccurate io state for detached bcache devices (bsc#1093023). - bcache: fix incorrect sysfs output value of strip size (bsc#1093023). - bcache: fix kcrashes with fio in RAID5 backend dev (bsc#1093023). - bcache: fix misleading error message in bch_count_io_errors() (bsc#1093023). - bcache: fix unmatched generic_end_io_acct() and generic_start_io_acct() (bsc#1093023). - bcache: fix using of loop variable in memory shrink (bsc#1093023). - bcache: fix writeback target calc on large devices (bsc#1093023). - bcache: fix wrong return value in bch_debug_init() (bsc#1093023). - bcache: mark closure_sync() __sched (bsc#1093023). - bcache: move closure debug file into debug directory (bsc#1093023). - bcache: properly set task state in bch_writeback_thread() (bsc#1093023). - bcache: quit dc->writeback_thread when BCACHE_DEV_DETACHING is set (bsc#1093023). - bcache: reduce cache_set devices iteration by devices_max_used (bsc#1093023). - bcache: ret IOERR when read meets metadata error (bsc#1093023). - bcache: return 0 from bch_debug_init() if CONFIG_DEBUG_FS=n (bsc#1093023). - bcache: return attach error when no cache set exist (bsc#1093023). - bcache: segregate flash only volume write streams (bsc#1093023). - bcache: set CACHE_SET_IO_DISABLE in bch_cached_dev_error() (bsc#1093023). - bcache: set dc->io_disable to true in conditional_stop_bcache_device() (bsc#1093023). - bcache: set error_limit correctly (bsc#1093023). - bcache: set writeback_rate_update_seconds in range [1, 60] seconds (bsc#1093023). - bcache: stop dc->writeback_rate_update properly (bsc#1093023). - bcache: stop writeback thread after detaching (bsc#1093023). - bcache: store disk name in struct cache and struct cached_dev (bsc#1093023). - bcache: use pr_info() to inform duplicated CACHE_SET_IO_DISABLE set (bsc#1093023). - bcache: writeback: properly order backing device IO (bsc#1093023). - bdi: Fix oops in wb_workfn() (bsc#1052766). - bdi: wake up concurrent wb_shutdown() callers (bsc#1052766). - be2net: Fix HW stall issue in Lancer (bsc#1086288 ). - be2net: Fix error detection logic for BE3 (bsc#1050252 ). - be2net: Handle transmit completion errors in Lancer (bsc#1086288 ). - bfq-iosched: ensure to clear bic/bfqq pointers when preparing request (bsc#1052766). - bfq: Re-enable auto-loading when built as a module (bsc#1099918). - bio-integrity: move the bio integrity profile check earlier in bio_integrity_prep (bsc#1093023). - bitmap: fix memset optimization on big-endian systems (bsc#1051510). - bitops: Introduce assign_bit() (bsc#1093023). - blacklist.conf: blacklist further commits not needed (bsc#1085933, bsc#1085938, bsc#1085939) - blacklist.conf: blacklist stable fix 880cd276dff1 ('mm, slab: memcg_link the SLAB's kmem_cache'), bsc#1097471 - blacklist.conf: blacklist tools specific change bsc#1085941 - blk-mq-debugfs: fix device sched directory for default scheduler (bsc#1099918). - blk-mq: do not keep offline CPUs mapped to hctx 0 (bsc#1099918). - blk-mq: make sure hctx->next_cpu is set correctly (bsc#1099918). - blk-mq: make sure that correct hctx->next_cpu is set (bsc#1099918). - blk-mq: reinit q->tag_set_list entry only after grace period (bsc#1099918). - blk-mq: simplify queue mapping and schedule with each possisble CPU (bsc#1099918). - block, bfq: add missing invocations of bfqg_stats_update_io_add/remove (bsc#1099918). - block, bfq: fix occurrences of request finish method's old name (bsc#1099918). - block, bfq: put async queues for root bfq groups too (bsc#1052766). - block/loop: fix deadlock after loop_set_status (bsc#1052766). - block/swim: Remove extra put_disk() call from error path (bsc#1099918). - block: Add comment to submit_bio_wait() (bsc#1093023). - block: Fix __bio_integrity_endio() documentation (bsc#1099918). - block: Fix cloning of requests with a special payload (bsc#1099918). - block: Set BIO_TRACE_COMPLETION on new bio during split (bsc#1052766). - block: cope with WRITE ZEROES failing in blkdev_issue_zeroout() (bsc#1099918). - block: factor out __blkdev_issue_zero_pages() (bsc#1099918). - block: sed-opal: Fix a couple off by one bugs (bsc#1099918). - bnx2x: Collect the device debug information during Tx timeout (bsc#1086323 ). - bnx2x: Deprecate pci_get_bus_and_slot() (bsc#1086323 ). - bnx2x: Replace doorbell barrier() with wmb() (bsc#1086323 ). - bnx2x: Use NETIF_F_GRO_HW (bsc#1086323 ). - bnx2x: Use pci_ari_enabled() instead of local copy (bsc#1086323 ). - bnx2x: fix slowpath null crash (bsc#1086323 ). - bnx2x: fix spelling mistake: 'registeration' -> 'registration' (bsc#1086323 ). - bnx2x: use the right constant (bsc#1086323 ). - bnxt_en: Add BCM5745X NPAR device IDs (bsc#1086282 ). - bnxt_en: Add IRQ remapping logic (bsc#1086282 ). - bnxt_en: Add TC to hardware QoS queue mapping logic (bsc#1086282 ). - bnxt_en: Add ULP calls to stop and restart IRQs (bsc#1086282 ). - bnxt_en: Add cache line size setting to optimize performance (bsc#1086282 ). - bnxt_en: Add extended port statistics support (bsc#1086282 ). - bnxt_en: Add support for ndo_set_vf_trust (bsc#1086282 ). - bnxt_en: Add the new firmware API to query hardware resources (bsc#1086282 ). - bnxt_en: Adjust default rings for multi-port NICs (bsc#1086282 ). - bnxt_en: Always forward VF MAC address to the PF (bsc#1086282 ). - bnxt_en: Change IRQ assignment for RDMA driver (bsc#1086282 ). - bnxt_en: Check max_tx_scheduler_inputs value from firmware (bsc#1086282 ). - bnxt_en: Check the lengths of encapsulated firmware responses (bsc#1086282 ). - bnxt_en: Check unsupported speeds in bnxt_update_link() on PF only (bsc#1086282 ). - bnxt_en: Display function level rx/tx_discard_pkts via ethtool (bsc#1086282 ). - bnxt_en: Do not allow VF to read EEPROM (bsc#1086282 ). - bnxt_en: Do not reserve rings on VF when min rings were not provisioned by PF (bsc#1086282 ). - bnxt_en: Do not set firmware time from VF driver on older firmware (bsc#1086282 ). - bnxt_en: Eliminate duplicate barriers on weakly-ordered archs (bsc#1086282 ). - bnxt_en: Expand bnxt_check_rings() to check all resources (bsc#1086282 ). - bnxt_en: Fix NULL pointer dereference at bnxt_free_irq() (bsc#1086282 ). - bnxt_en: Fix ethtool -x crash when device is down (bsc#1086282 ). - bnxt_en: Fix firmware message delay loop regression (bsc#1086282 ). - bnxt_en: Fix memory fault in bnxt_ethtool_init() (bsc#1050242 ). - bnxt_en: Fix regressions when setting up MQPRIO TX rings (bsc#1086282 ). - bnxt_en: Fix vnic accounting in the bnxt_check_rings() path (bsc#1086282 ). - bnxt_en: Forward VF MAC address to the PF (bsc#1086282 ). - bnxt_en: Ignore src port field in decap filter nodes (bsc#1050242 ). - bnxt_en: Implement new method for the PF to assign SRIOV resources (bsc#1086282 ). - bnxt_en: Implement new method to reserve rings (bsc#1086282 ). - bnxt_en: Improve resource accounting for SRIOV (bsc#1086282 ). - bnxt_en: Improve ring allocation logic (bsc#1086282 ). - bnxt_en: Improve valid bit checking in firmware response message (bsc#1086282 ). - bnxt_en: Include additional hardware port statistics in ethtool -S (bsc#1086282 ). - bnxt_en: Increase RING_IDLE minimum threshold to 50 (bsc#1086282 ). - bnxt_en: Need to include RDMA rings in bnxt_check_rings() (bsc#1086282 ). - bnxt_en: Pass complete VLAN TCI to the stack (bsc#1086282 ). - bnxt_en: Read phy eeprom A2h address only when optical diagnostics is supported (bsc#1086282 ). - bnxt_en: Refactor bnxt_close_nic() (bsc#1086282 ). - bnxt_en: Refactor bnxt_need_reserve_rings() (bsc#1086282 ). - bnxt_en: Refactor hardware resource data structures (bsc#1086282 ). - bnxt_en: Refactor the functions to reserve hardware rings (bsc#1086282 ). - bnxt_en: Remap TC to hardware queues when configuring PFC (bsc#1086282 ). - bnxt_en: Reserve RSS and L2 contexts for VF (bsc#1086282 ). - bnxt_en: Reserve completion rings and MSIX for bnxt_re RDMA driver (bsc#1086282 ). - bnxt_en: Reserve resources for RFS (bsc#1086282 ). - bnxt_en: Reserve rings at driver open if none was reserved at probe time (bsc#1086282 ). - bnxt_en: Reserve rings in bnxt_set_channels() if device is down (bsc#1086282 ). - bnxt_en: Restore MSIX after disabling SRIOV (bsc#1086282 ). - bnxt_en: Set initial default RX and TX ring numbers the same in combined mode (bsc#1086282 ). - bnxt_en: Simplify ring alloc/free error messages (bsc#1086282 ). - bnxt_en: Support max-mtu with VF-reps (bsc#1086282 ). - bnxt_en: Update firmware interface to 1.9.0 (bsc#1086282 ). - bnxt_en: Update firmware interface to 1.9.1.15 (bsc#1086282 ). - bnxt_en: Use a dedicated VNIC mode for RDMA (bsc#1086282 ). - bnxt_en: close and open NIC, only when the interface is in running state (bsc#1086282 ). - bnxt_en: do not allow wildcard matches for L2 flows (bsc#1050242 ). - bnxt_en: export a common switchdev PARENT_ID for all reps of an adapter (bsc#1086282 ). - bnxt_en: fix clear flags in ethtool reset handling (bsc#1050242 ). - bnxt_en: reduce timeout on initial HWRM calls (bsc#1086282 ). - bonding: discard lowest hash bit for 802.3ad layer3+4 (networking-stable-17_11_20). - bonding: do not set slave_dev npinfo before slave_enable_netpoll in bond_enslave (networking-stable-18_04_26). - bonding: fix the err path for dev hwaddr sync in bond_enslave (networking-stable-18_04_10). - bonding: move dev_mc_sync after master_upper_dev_link in bond_enslave (networking-stable-18_04_10). - bonding: process the err returned by dev_set_allmulti properly in bond_enslave (networking-stable-18_04_10). - bonding: send learning packets for vlans on slave (networking-stable-18_05_15). - bpf, ppc64: fix out of bounds access in tail call (bsc#1083647). - bpf, x64: fix memleak when not converging after image (bsc#1083647). - bpf: add schedule points in percpu arrays management (bsc#1083647). - bpf: fix bpf_skb_adjust_net/bpf_skb_proto_xlat to deal with gso sctp skbs (bsc#1076830). - bpf: fix mlock precharge on arraymaps (bsc#1083647). - bpf: make bnxt compatible w/ bpf_xdp_adjust_tail (bsc#1086282 ). - bpf: properly enforce index mask to prevent out-of-bounds speculation (bsc#1098425). - brcmfmac: Fix check for ISO3166 code (bsc#1051510). - brd: fix overflow in __brd_direct_access (bsc#1052766). - bridge: check iface upper dev when setting master via ioctl (networking-stable-18_05_15). - can: af_can: can_pernet_init(): add missing error handling for kzalloc returning NULL (bsc#1051510). - can: af_can: can_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510). - can: af_can: canfd_rcv(): replace WARN_ONCE by pr_warn_once (bsc#1051510). - can: c_can: do not indicate triple sampling support for D_CAN (bsc#1051510). - can: cc770: Fix queue stall and dropped RTR reply (bsc#1051510). - can: cc770: Fix stalls on rt-linux, remove redundant IRQ ack (bsc#1051510). - can: cc770: Fix use after free in cc770_tx_interrupt() (bsc#1051510). - can: ems_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510). - can: esd_usb2: Fix can_dlc value for received RTR, frames (bsc#1051510). - can: esd_usb2: cancel urb on -EPIPE and -EPROTO (bsc#1051510). - can: flex_can: Correct the checking for frame length in flexcan_start_xmit() (bsc#1051510). - can: flexcan: fix VF610 state transition issue (bsc#1051510). - can: flexcan: fix i.MX28 state transition issue (bsc#1051510). - can: flexcan: fix i.MX6 state transition issue (bsc#1051510). - can: flexcan: fix p1010 state transition issue (bsc#1051510). - can: flexcan: fix state transition regression (bsc#1051510). - can: flexcan: implement error passive state quirk (bsc#1051510). - can: flexcan: rename legacy error state quirk (bsc#1051510). - can: gs_usb: fix busy loop if no more TX context is available (bsc#1051510). - can: gs_usb: fix return value of the 'set_bittiming' callback (bsc#1051510). - can: hi311x: Acquire SPI lock on ->do_get_berr_counter (bsc#1051510). - can: hi311x: Work around TX complete interrupt erratum (bsc#1051510). - can: ifi: Check core revision upon probe (bsc#1051510). - can: ifi: Fix transmitter delay calculation (bsc#1051510). - can: ifi: Repair the error handling (bsc#1051510). - can: kvaser_usb: Correct return value in printout (bsc#1051510). - can: kvaser_usb: Fix comparison bug in kvaser_usb_read_bulk_callback() (bsc#1051510). - can: kvaser_usb: Ignore CMD_FLUSH_QUEUE_REPLY messages (bsc#1051510). - can: kvaser_usb: Increase correct stats counter in kvaser_usb_rx_can_msg() (bsc#1051510). - can: kvaser_usb: cancel urb on -EPIPE and -EPROTO (bsc#1051510). - can: kvaser_usb: free buf in error paths (bsc#1051510). - can: kvaser_usb: ratelimit errors if incomplete messages are received (bsc#1051510). - can: mcba_usb: cancel urb on -EPROTO (bsc#1051510). - can: mcba_usb: fix device disconnect bug (bsc#1051510). - can: peak/pci: fix potential bug when probe() fails (bsc#1051510). - can: peak/pcie_fd: fix echo_skb is occupied! bug (bsc#1051510). - can: peak/pcie_fd: fix potential bug in restarting tx queue (bsc#1051510). - can: peak/pcie_fd: remove useless code when interface starts (bsc#1051510). - can: peak: Add support for new PCIe/M2 CAN FD interfaces (bsc#1051510). - can: peak: fix potential bug in packet fragmentation (bsc#1051510). - can: sun4i: fix loopback mode (bsc#1051510). - can: sun4i: handle overrun in RX FIFO (bsc#1051510). - can: ti_hecc: Fix napi poll return value for repoll (bsc#1051510). - can: usb_8dev: cancel urb on -EPIPE and -EPROTO (bsc#1051510). - can: vxcan: improve handling of missing peer name attribute (bsc#1051510). - cdc_ether: flag the Cinterion AHS8 modem by gemalto as WWAN (networking-stable-18_04_13). - cdrom: information leak in cdrom_ioctl_media_changed() (bsc#1051510). - ceph: adding protection for showing cap reservation info (bsc#1089115). - ceph: always update atime/mtime/ctime for new inode (bsc#1089115). - ceph: change variable name to follow common rule (bsc#1089115). - ceph: check if mds create snaprealm when setting quota (bsc#1089115). - ceph: do not wait on writeback when there is no more dirty pages (bsc#1089115). - ceph: filter out used flags when printing unused open flags (bsc#1089115). - ceph: fix alignment of rasize (bsc#1098236). - ceph: fix dentry leak in splice_dentry() (bsc#1098236). - ceph: fix invalid point dereference for error case in mdsc destroy (bsc#1089115). - ceph: fix rsize/wsize capping in ceph_direct_read_write() (bsc#1089115). - ceph: fix st_nlink stat for directories (bsc#1093904). - ceph: fix use-after-free in ceph_statfs() (bsc#1098236). - ceph: fix wrong check for the case of updating link count (bsc#1098236). - ceph: keep consistent semantic in fscache related option combination (bsc#1089115). - ceph: mark the cap cache as unreclaimable (bsc#1089115). - ceph: optimize mds session register (bsc#1089115). - ceph: optimize memory usage (bsc#1089115). - ceph: optimizing cap allocation (bsc#1089115). - ceph: optimizing cap reservation (bsc#1089115). - ceph: prevent i_version from going back (bsc#1098236). - ceph: quota: report root dir quota usage in statfs (bsc#1089115). - ceph: release unreserved caps if having enough available caps (bsc#1089115). - ceph: return proper bool type to caller instead of pointer (bsc#1089115). - ceph: support file lock on directory (bsc#1098236). - ceph: use seq_show_option for string type options (bsc#1089115). - cfg80211: clear wep keys after disconnection (bsc#1051510). - cfg80211: further limit wiphy names to 64 bytes (bsc#1051510). - cfg80211: limit wiphy names to 128 bytes (bsc#1051510). - cgroup: Fix deadlock in cpu hotplug path (Git-fixes). - cgroup: Reinit cgroup_taskset structure before cgroup_migrate_execute() returns (Git-fixes). - cifs: Check for timeout on Negotiate stage (bsc#1091171). - cifs: silence compiler warnings showing up with gcc-8.0.0 (bsc#1090734). - config: arm64: enable Spectre-v4 per-thread mitigation - coresight: Fix disabling of CoreSight TPIU (bsc#1051510). - cpufreq: intel_pstate: Add HWP boost utility and sched util hooks (bsc#1066110). - cpufreq: intel_pstate: Fix scaling max/min limits with Turbo 3.0 (bsc#1051510). - cpufreq: intel_pstate: HWP boost performance on IO wakeup (bsc#1066110). - cpufreq: intel_pstate: New sysfs entry to control HWP boost (bsc#1066110). - cpufreq: intel_pstate: enable boost for Skylake Xeon (bsc#1066110). - cpufreq: schedutil: Avoid using invalid next_freq (git-fixes). - cpuidle: fix broadcast control when broadcast can not be entered (Git-fixes). - cros_ec: fix nul-termination for firmware build info (bsc#1051510). - crypto: AF_ALG - remove SGL terminator indicator when chaining (bsc#1051510). - crypto: aes-generic - build with -Os on gcc-7+ (bsc#1051510). - crypto: aes-generic - fix aes-generic regression on powerpc (bsc#1051510). - crypto: af_alg - fix possible uninit-value in alg_bind() (bsc#1051510). - crypto: ahash - Fix early termination in hash walk (bsc#1051510). - crypto: arm,arm64 - Fix random regeneration of S_shipped (bsc#1051510). - crypto: atmel-aes - fix the keys zeroing on errors (bsc#1051510). - crypto: caam - Fix null dereference at error path (bsc#1051510). - crypto: caam - fix DMA mapping dir for generated IV (bsc#1051510). - crypto: caam - fix IV DMA mapping and updating (bsc#1051510). - crypto: caam - fix incorrect define (bsc#1051510). - crypto: caam - strip input zeros from RSA input buffer (bsc#1051510). - crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510). - crypto: caam/qi - fix IV DMA mapping and updating (bsc#1051510). - crypto: cavium - Fix fallout from CONFIG_VMAP_STACK (bsc#1089141). - crypto: cavium - Fix smp_processor_id() warnings (bsc#1089141). - crypto: cavium - Fix statistics pending request value (bsc#1089141). - crypto: cavium - Limit result reading attempts (bsc#1089141). - crypto: cavium - Prevent division by zero (bsc#1089141). - crypto: ccp - Fix sparse, use plain integer as NULL pointer (git-fixes 200664d5237f). - crypto: drbg - set freed buffers to NULL (bsc#1051510). - crypto: lrw - Free rctx->ext with kzfree (bsc#1051510). - crypto: omap-sham - fix memleak (bsc#1051510). - crypto: qat - remove unused and redundant pointer vf_info (bsc#1051510). - crypto: sunxi-ss - Add MODULE_ALIAS to sun4i-ss (bsc#1051510). - crypto: vmx - Remove overly verbose printk from AES XTS init (bsc#1051510). - crypto: vmx - Remove overly verbose printk from AES init routines (bsc#1051510). - crypto: x86/cast5-avx - fix ECB encryption when long sg follows short one (bsc#1051510). - cxgb4: Correct ntuple mask validation for hash filters (bsc#1064802 bsc#1066129). - cxgb4: fix error return code in adap_init0() (bsc#1064802 bsc#1066129). - cxgb4: fix offset in collecting TX rate limit info (bsc#1073513). - cxgb4vf: Fix SGE FL buffer initialization logic for 64K pages (bsc#1046542 ). - dax, dm: allow device-mapper to operate without dax support (bsc#1093023). - dax: check for QUEUE_FLAG_DAX in bdev_dax_supported() (bsc#1101315). - dccp: do not restart ccid2_hc_tx_rto_expire() if sk in closed state (networking-stable-18_01_28). - dccp: fix tasklet usage (networking-stable-18_05_15). - delayacct: Account blkio completion on the correct task (bsc#1052766). - dell_rbu: make firmware payload memory uncachable (bsc#1087978). - device-dax: allow MAP_SYNC to succeed (bsc#1052766). - devlink: Remove redundant free on error path (networking-stable-18_03_28). - direct-io: Prevent NULL pointer access in submit_page_section (bsc#1052766). - disable patches.drivers/s390-qeth-use-Read-device-to-query-hyper visor-for-MA.patch Backport of mainline commit b7493e91c11a ('s390/qeth: use Read device to query hypervisor for MAC') changes assigned MAC address (and breaks networking) on one of our machines and it's not clear which address is actually correct (bsc#1094575). Disable the patch for now with a marker so that we prevent releasing a maintenance update incompatible with GM. Once the bug is resolved, we will either reenable the patch or drop it. - dlm: fix a clerical error when set SCTP_NODELAY (bsc#1091594). - dlm: make sctp_connect_to_sock() return in specified time (bsc#1080542). - dlm: remove O_NONBLOCK flag in sctp_connect_to_sock (bsc#1080542). - dm btree: fix serious bug in btree_split_beneath() (bsc#1093023). - dm bufio: add missed destroys of client mutex (bsc#1093023). - dm bufio: check result of register_shrinker() (bsc#1093023). - dm bufio: delete outdated comment (bsc#1093023). - dm bufio: do not embed a bio in the dm_buffer structure (bsc#1093023). - dm bufio: eliminate unnecessary labels in dm_bufio_client_create() (bsc#1093023). - dm bufio: fix buffer alignment (bsc#1093023). - dm bufio: fix integer overflow when limiting maximum cache size (bsc#1093023). - dm bufio: fix shrinker scans when (nr_to_scan lower than retain_target) (bsc#1093023). - dm bufio: get rid of slab cache name allocations (bsc#1093023). - dm bufio: move dm-bufio.h to include/linux/ (bsc#1093023). - dm bufio: relax alignment constraint on slab cache (bsc#1093023). - dm bufio: remove code that merges slab caches (bsc#1093023). - dm bufio: reorder fields in dm_buffer structure (bsc#1093023). - dm bufio: support non-power-of-two block sizes (bsc#1093023). - dm bufio: use REQ_OP_READ and REQ_OP_WRITE (bsc#1093023). - dm bufio: use slab cache for dm_buffer structure allocations (bsc#1093023). - dm cache background tracker: limit amount of background work that may be issued at once (bsc#1093023). - dm cache policy smq: allocate cache blocks in order (bsc#1093023). - dm cache policy smq: change max background work from 10240 to 4096 blocks (bsc#1093023). - dm cache policy smq: handle races with queuing background_work (bsc#1093023). - dm cache policy smq: take origin idle status into account when queuing writebacks (bsc#1093023). - dm cache: convert dm_cache_metadata.ref_count from atomic_t to refcount_t (bsc#1093023). - dm cache: fix race condition in the writeback mode overwrite_bio optimisation (bsc#1093023). - dm cache: lift common migration preparation code to alloc_migration() (bsc#1093023). - dm cache: pass cache structure to mode functions (bsc#1093023). - dm cache: remove all obsolete writethrough-specific code (bsc#1093023). - dm cache: remove usused deferred_cells member from struct cache (bsc#1093023). - dm cache: simplify get_per_bio_data() by removing data_size argument (bsc#1093023). - dm cache: submit writethrough writes in parallel to origin and cache (bsc#1093023). - dm crypt: allow unaligned bv_offset (bsc#1093023). - dm crypt: fix crash by adding missing check for auth key size (bsc#1093023). - dm crypt: fix error return code in crypt_ctr() (bsc#1093023). - dm crypt: fix memory leak in crypt_ctr_cipher_old() (bsc#1093023). - dm crypt: limit the number of allocated pages (bsc#1093023). - dm crypt: reject sector_size feature if device length is not aligned to it (bsc#1093023). - dm crypt: remove BIOSET_NEED_RESCUER flag (bsc#1093023). - dm crypt: wipe kernel key copy after IV initialization (bsc#1093023). - dm flakey: check for null arg_name in parse_features() (bsc#1093023). - dm integrity: allow unaligned bv_offset (bsc#1093023). - dm integrity: count and display checksum failures (bsc#1093023). - dm integrity: do not check integrity for failed read operations (bsc#1093023). - dm integrity: do not store cipher request on the stack (bsc#1093023). - dm integrity: fail early if required HMAC key is not available (bsc#1093023). - dm integrity: make blk_integrity_profile structure const (bsc#1093023). - dm integrity: optimize writing dm-bufio buffers that are partially changed (bsc#1093023). - dm integrity: use init_completion instead of COMPLETION_INITIALIZER_ONSTACK (bsc#1093023). - dm integrity: use kvfree for kvmalloc'd memory (bsc#1099918). - dm io: remove BIOSET_NEED_RESCUER flag from bios bioset (bsc#1093023). - dm ioctl: constify ioctl lookup table (bsc#1093023). - dm log writes: add support for DAX (bsc#1093023). - dm log writes: add support for inline data buffers (bsc#1093023). - dm log writes: do not use all the cpu while waiting to log blocks (bsc#1093023). - dm log writes: fix >512b sectorsize support (bsc#1093023). - dm log writes: fix max length used for kstrndup (bsc#1093023). - dm log writes: record metadata flag for better flags record (bsc#1093023). - dm mpath: fix bio-based multipath queue_if_no_path handling (bsc#1099918). - dm raid: add component device size checks to avoid runtime failure (bsc#1093023). - dm raid: avoid passing array_in_sync variable to raid_status() callees (bsc#1093023). - dm raid: bump target version to reflect numerous fixes (bsc#1093023). - dm raid: consume sizes after md_finish_reshape() completes changing them (bsc#1093023). - dm raid: correct resizing state relative to reshape space in ctr (bsc#1093023). - dm raid: display a consistent copy of the MD status via raid_status() (bsc#1093023). - dm raid: do not use 'const' in function return (bsc#1099918). - dm raid: ensure 'a' chars during reshape (bsc#1093023). - dm raid: fix deadlock caused by premature md_stop_writes() (bsc#1093023). - dm raid: fix incorrect status output at the end of a 'recover' process (bsc#1093023). - dm raid: fix incorrect sync_ratio when degraded (bsc#1093023). - dm raid: fix nosync status (bsc#1093023). - dm raid: fix panic when attempting to force a raid to sync (bsc#1093023). - dm raid: fix parse_raid_params() variable range issue (bsc#1093023). - dm raid: fix raid set size revalidation (bsc#1093023). - dm raid: fix raid_resume() to keep raid set frozen as needed (bsc#1093023). - dm raid: fix rs_get_progress() synchronization state/ratio (bsc#1093023). - dm raid: make raid_sets symbol static (bsc#1093023). - dm raid: simplify rs_get_progress() (bsc#1093023). - dm raid: small cleanup and remove unsed 'struct raid_set' member (bsc#1093023). - dm raid: stop keeping raid set frozen altogether (bsc#1093023). - dm raid: use rs_is_raid*() (bsc#1093023). - dm raid: validate current raid sets redundancy (bsc#1093023). - dm rq: do not update rq partially in each ending bio (bsc#1093023). - dm rq: make dm-sq requeuing behavior consistent with dm-mq behavior (bsc#1093023). - dm space map metadata: use ARRAY_SIZE (bsc#1093023). - dm stripe: get rid of a Variable Length Array (VLA) (bsc#1093023). - dm table: fix regression from improper dm_dev_internal.count refcount_t conversion (bsc#1093023). - dm thin metadata: THIN_MAX_CONCURRENT_LOCKS should be 6 (bsc#1093023). - dm thin: fix trailing semicolon in __remap_and_issue_shared_cell (bsc#1093023). - dm zoned: avoid triggering reclaim from inside dmz_map() (bsc#1099918). - dm zoned: ignore last smaller runt zone (bsc#1093023). - dm-crypt: do not clear bvec->bv_page in crypt_free_buffer_pages() (bsc#1093023). - dm-crypt: do not mess with BIP_BLOCK_INTEGRITY (bsc#1093023). - dm-raid: fix a race condition in request handling (bsc#1093023). - dm: backfill missing calls to mutex_destroy() (bsc#1093023). - dm: clear all discard attributes in queue_limits when discards are disabled (bsc#1093023). - dm: convert DM printk macros to pr_ level macros (bsc#1099918). - dm: convert dm_dev_internal.count from atomic_t to refcount_t (bsc#1093023). - dm: convert table_device.count from atomic_t to refcount_t (bsc#1093023). - dm: correctly handle chained bios in dec_pending() (bsc#1093023). - dm: discard support requires all targets in a table support discards (bsc#1093023). - dm: do not set 'discards_supported' in targets that do not need it (bsc#1093023). - dm: ensure bio submission follows a depth-first tree walk (bsc#1093023). - dm: ensure bio-based DM's bioset and io_pool support targets' maximum IOs (bsc#1093023). - dm: fix __send_changing_extent_only() to send first bio and chain remainder (bsc#1093023). - dm: fix comment above dm_accept_partial_bio (bsc#1093023). - dm: fix printk() rate limiting code (bsc#1099918). - dm: fix various targets to dm_register_target after module __init resources created (bsc#1093023). - dm: limit the max bio size as BIO_MAX_PAGES * PAGE_SIZE (bsc#1093023). - dm: move dm_table_destroy() to same header as dm_table_create() (bsc#1093023). - dm: remove BIOSET_NEED_RESCUER based dm_offload infrastructure (bsc#1093023). - dm: remove stale comment blocks (bsc#1093023). - dm: remove unused 'num_write_bios' target interface (bsc#1093023). - dm: remove unused macro DM_MOD_NAME_SIZE (bsc#1093023). - dm: rename 'bio' member of dm_io structure to 'orig_bio' (bsc#1093023). - dm: safely allocate multiple bioset bios (bsc#1093023). - dm: set QUEUE_FLAG_DAX accordingly in dm_table_set_restrictions() (bsc#1093023). - dm: simplify start of block stats accounting for bio-based (bsc#1093023). - dm: small cleanup in dm_get_md() (bsc#1093023). - dm: use bio_split() when splitting out the already processed bio (bsc#1099918). - dmaengine: at_hdmac: fix potential NULL pointer dereference in atc_prep_dma_interleaved (bsc#1051510). - dmaengine: at_xdmac: fix rare residue corruption (bsc#1051510). - dmaengine: dmatest: fix container_of member in dmatest_callback (bsc#1051510). - dmaengine: dmatest: move callback wait queue to thread context (bsc#1051510). - dmaengine: dmatest: warn user when dma test times out (bsc#1051510). - dmaengine: edma: Align the memcpy acnt array size with the transfer (bsc#1051510). - dmaengine: ioat: Fix error handling path (bsc#1051510). - dmaengine: jz4740: disable/unprepare clk if probe fails (bsc#1051510). - dmaengine: ti-dma-crossbar: Correct am335x/am43xx mux value type (bsc#1051510). - dmaengine: ti-dma-crossbar: Fix event mapping for TPCC_EVT_MUX_60_63 (bsc#1051510). - dmaengine: ti-dma-crossbar: Fix possible race condition with dma_inuse (bsc#1051510). - docs: disable KASLR when debugging kernel (bsc#1051510). - dpaa_eth: increment the RX dropped counter when needed (networking-stable-18_03_28). - dpaa_eth: remove duplicate increment of the tx_errors counter (networking-stable-18_03_28). - dpaa_eth: remove duplicate initialization (networking-stable-18_03_28). - drbd: Fix drbd_request_prepare() discard handling (bsc#1099918). - driver core: Do not ignore class_dir_create_and_add() failure (bsc#1051510). - driver core: Move device_links_purge() after bus_remove_device() (bsc#1099918). - drivers/infiniband/core/verbs.c: fix build with gcc-4.4.4 (bsc#1046306 ). - drivers/infiniband/ulp/srpt/ib_srpt.c: fix build with gcc-4.4.4 (bsc#1046306 ). - drivers: net: bnx2x: use setup_timer() helper (bsc#1086323 ). - drm/amd/powerplay: Fix enum mismatch (bsc#1051510). - drm/amdgpu/sdma: fix mask in emit_pipeline_sync (bsc#1051510). - drm/amdgpu/si: implement get/set pcie_lanes asic callback (bsc#1051510). - drm/amdgpu: Add APU support in vi_set_uvd_clocks (bsc#1051510). - drm/amdgpu: Add APU support in vi_set_vce_clocks (bsc#1051510). - drm/amdgpu: Add an ATPX quirk for hybrid laptop (bsc#1051510). - drm/amdgpu: Fix PCIe lane width calculation (bsc#1051510). - drm/amdgpu: Fix always_valid bos multiple LRU insertions (bsc#1051510). - drm/amdgpu: Fix deadlock on runtime suspend (bsc#1051510). - drm/amdgpu: Use kvmalloc_array for allocating VRAM manager nodes array (bsc#1051510). - drm/amdgpu: adjust timeout for ib_ring_tests(v2) (bsc#1051510). - drm/amdgpu: disable GFX ring and disable PQ wptr in hw_fini (bsc#1051510). - drm/amdgpu: set COMPUTE_PGM_RSRC1 for SGPR/VGPR clearing shaders (bsc#1051510). - drm/amdkfd: fix clock counter retrieval for node without GPU (bsc#1051510). - drm/armada: fix leak of crtc structure (bsc#1051510). - drm/ast: Fixed 1280x800 Display Issue (bsc#1051510). - drm/atmel-hlcdc: check stride values in the first plane (bsc#1051510). - drm/atomic: Clean old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510). - drm/atomic: Clean private obj old_state/new_state in drm_atomic_state_default_clear() (bsc#1051510). - drm/bridge: analogix dp: Fix runtime PM state in get_modes() callback (bsc#1051510). - drm/bridge: tc358767: do no fail on hi-res displays (bsc#1051510). - drm/bridge: tc358767: filter out too high modes (bsc#1051510). - drm/bridge: tc358767: fix 1-lane behavior (bsc#1051510). - drm/bridge: tc358767: fix AUXDATAn registers access (bsc#1051510). - drm/bridge: tc358767: fix DP0_MISC register set (bsc#1051510). - drm/bridge: tc358767: fix timing calculations (bsc#1051510). - drm/bridge: vga-dac: Fix edid memory leak (bsc#1051510). - drm/dumb-buffers: Integer overflow in drm_mode_create_ioctl() (bsc#1051510). - drm/exynos/dsi: mask frame-done interrupt (bsc#1051510). - drm/exynos: Allow DRM_EXYNOS on s5pv210 (bsc#1051510). - drm/exynos: Fix default value for zpos plane property (bsc#1051510). - drm/exynos: fix comparison to bitshift when dealing with a mask (bsc#1051510). - drm/exynos: g2d: use monotonic timestamps (bsc#1051510). - drm/fsl-dcu: enable IRQ before drm_atomic_helper_resume() (bsc#1051510). - drm/hisilicon: Ensure LDI regs are properly configured (bsc#1051510). - drm/i915/audio: Fix audio detection issue on GLK (bsc#1051510). - drm/i915/audio: set minimum CD clock to twice the BCLK (bsc#1095265). - drm/i915/bios: filter out invalid DDC pins from VBT child devices (bsc#1051510). - drm/i915/execlists: Use rmb() to order CSB reads (bsc#1051510). - drm/i915/gen9: Add WaClearHIZ_WM_CHICKEN3 for bxt and glk (bsc#1051510). - drm/i915/glk: Add MODULE_FIRMWARE for Geminilake (bsc#1095265). - drm/i915/gvt: fix memory leak of a cmd_entry struct on error exit path (bsc#1051510). - drm/i915/gvt: throw error on unhandled vfio ioctls (bsc#1051510). - drm/i915/lvds: Move acpi lid notification registration to registration phase (bsc#1051510). - drm/i915/psr: Chase psr.enabled only under the psr.lock (bsc#1051510). - drm/i915/userptr: reject zero user_size (bsc#1051510). - drm/i915: Adjust eDP's logical vco in a reliable place (bsc#1095265). - drm/i915: Apply batch location restrictions before pinning (bsc#1051510). - drm/i915: Call i915_perf_fini() on init_hw error unwind (bsc#1051510). - drm/i915: Disable LVDS on Radiant P845 (bsc#1051510). - drm/i915: Do no use kfree() to free a kmem_cache_alloc() return value (bsc#1051510). - drm/i915: Do not request a bug report for unsafe module parameters (bsc#1051510). - drm/i915: Enable display WA#1183 from its correct spot (bsc#1051510). - drm/i915: Enable provoking vertex fix on Gen9 systems (bsc#1051510). - drm/i915: Fix LSPCON TMDS output buffer enabling from low-power state (bsc#1051510). - drm/i915: Fix context ban and hang accounting for client (bsc#1051510). - drm/i915: Fix drm:intel_enable_lvds ERROR message in kernel log (bsc#1051510). - drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510). - drm/i915: Remove stale asserts from i915_gem_find_active_request() (bsc#1051510). - drm/i915: Remove unbannable context spam from reset (bsc#1051510). - drm/i915: Restore planes after load detection (bsc#1051510). - drm/i915: Restore planes after load detection (bsc#1051510). - drm/i915: Try GGTT mmapping whole object as partial (bsc#1051510). - drm/imx: move arming of the vblank event to atomic_flush (bsc#1051510). - drm/meson: Fix an un-handled error path in 'meson_drv_bind_master()' (bsc#1051510). - drm/meson: Fix some error handling paths in 'meson_drv_bind_master()' (bsc#1051510). - drm/meson: fix vsync buffer update (bsc#1051510). - drm/msm/dsi: use correct enum in dsi_get_cmd_fmt (bsc#1051510). - drm/msm: Fix possible null dereference on failure of get_pages() (bsc#1051510). - drm/msm: do not deref error pointer in the msm_fbdev_create error path (bsc#1100209). - drm/msm: fix leak in failed get_pages (bsc#1051510). - drm/nouveau/bar/gf100: add config option to limit BAR2 to 16MiB (bsc#1095094). - drm/nouveau/bios/iccsense: rails for power sensors have a mask of 0xf8 for version 0x10 (bsc#1095094). - drm/nouveau/bios/init: add a new devinit script interpreter entry-point (bsc#1095094). - drm/nouveau/bios/init: add or/link args separate from output path (bsc#1095094). - drm/nouveau/bios/init: bump script offset to 32-bits (bsc#1095094). - drm/nouveau/bios/init: remove internal use of nvbios_init.bios (bsc#1095094). - drm/nouveau/bios/init: rename 'crtc' to 'head' (bsc#1095094). - drm/nouveau/bios/init: rename nvbios_init() to nvbios_devinit() (bsc#1095094). - drm/nouveau/bios/volt: Parse min and max for Version 0x40 (bsc#1095094). - drm/nouveau/bios: Demote missing fp table message to NV_DEBUG (bsc#1095094). - drm/nouveau/bl: fix backlight regression (bsc#1095094). - drm/nouveau/devinit: use new devinit script interpreter entry-point (bsc#1095094). - drm/nouveau/disp/dp: determine a failsafe link training rate (bsc#1095094). - drm/nouveau/disp/dp: determine link bandwidth requirements from head state (bsc#1095094). - drm/nouveau/disp/dp: no need for lt_state except during manual link training (bsc#1095094). - drm/nouveau/disp/dp: only check for re-train when the link is active (bsc#1095094). - drm/nouveau/disp/dp: remove DP_PWR method (bsc#1095094). - drm/nouveau/disp/dp: store current link configuration in nvkm_ior (bsc#1095094). - drm/nouveau/disp/dp: train link only when actively displaying an image (bsc#1095094). - drm/nouveau/disp/dp: use cached link configuration when checking link status (bsc#1095094). - drm/nouveau/disp/dp: use new devinit script interpreter entry-point (bsc#1095094). - drm/nouveau/disp/g84-: Extend NVKM HDMI power control method to set InfoFrames (bsc#1095094). - drm/nouveau/disp/g84-: port OR HDMI control to nvkm_ior (bsc#1095094). - drm/nouveau/disp/g84-gt200: Use supplied HDMI InfoFrames (bsc#1095094). - drm/nouveau/disp/g94-: port OR DP drive setting control to nvkm_ior (bsc#1095094). - drm/nouveau/disp/g94-: port OR DP lane mapping to nvkm_ior (bsc#1095094). - drm/nouveau/disp/g94-: port OR DP link power control to nvkm_ior (bsc#1095094). - drm/nouveau/disp/g94-: port OR DP link setup to nvkm_ior (bsc#1095094). - drm/nouveau/disp/g94-: port OR DP training pattern control to nvkm_ior (bsc#1095094). - drm/nouveau/disp/gf119-: avoid creating non-existent heads (bsc#1095094). - drm/nouveau/disp/gf119-: port OR DP VCPI control to nvkm_ior (bsc#1095094). - drm/nouveau/disp/gf119: Use supplied HDMI InfoFrames (bsc#1095094). - drm/nouveau/disp/gf119: add missing drive vfunc ptr (bsc#1095094). - drm/nouveau/disp/gk104-: Use supplied HDMI InfoFrames (bsc#1095094). - drm/nouveau/disp/gm200-: allow non-identity mapping of SOR != macro links (bsc#1095094). - drm/nouveau/disp/gt215-: port HDA ELD controls to nvkm_ior (bsc#1095094). - drm/nouveau/disp/gt215: Use supplied HDMI InfoFrames (bsc#1095094). - drm/nouveau/disp/nv04: avoid creation of output paths (bsc#1095094). - drm/nouveau/disp/nv50-: avoid creating ORs that are not present on HW (bsc#1095094). - drm/nouveau/disp/nv50-: execute supervisor on its own workqueue (bsc#1095094). - drm/nouveau/disp/nv50-: fetch head/OR state at beginning of supervisor (bsc#1095094). - drm/nouveau/disp/nv50-: implement a common supervisor 1.0 (bsc#1095094). - drm/nouveau/disp/nv50-: implement a common supervisor 2.0 (bsc#1095094). - drm/nouveau/disp/nv50-: implement a common supervisor 2.1 (bsc#1095094). - drm/nouveau/disp/nv50-: implement a common supervisor 2.2 (bsc#1095094). - drm/nouveau/disp/nv50-: implement a common supervisor 3.0 (bsc#1095094). - drm/nouveau/disp/nv50-: port OR manual sink detection to nvkm_ior (bsc#1095094). - drm/nouveau/disp/nv50-: port OR power state control to nvkm_ior (bsc#1095094). - drm/nouveau/disp/nv50-gt21x: remove workaround for dp->tmds hotplug issues (bsc#1095094). - drm/nouveau/disp: Add mechanism to convert HDMI InfoFrames to hardware format (bsc#1095094). - drm/nouveau/disp: Silence DCB warnings (bsc#1095094). - drm/nouveau/disp: add tv encoders to output resource mapping (bsc#1095094). - drm/nouveau/disp: common implementation of scanoutpos method in nvkm_head (bsc#1095094). - drm/nouveau/disp: delay output path / connector construction until oneinit() (bsc#1095094). - drm/nouveau/disp: fork off some new hw-specific implementations (bsc#1095094). - drm/nouveau/disp: identity-map display paths to output resources (bsc#1095094). - drm/nouveau/disp: introduce acquire/release display path methods (bsc#1095094). - drm/nouveau/disp: introduce input/output resource abstraction (bsc#1095094). - drm/nouveau/disp: introduce object to track per-head functions/state (bsc#1095094). - drm/nouveau/disp: move vblank_{get,put} methods into nvkm_head (bsc#1095094). - drm/nouveau/disp: remove hw-specific customisation of output paths (bsc#1095094). - drm/nouveau/disp: rename nvkm_output to nvkm_outp (bsc#1095094). - drm/nouveau/disp: rename nvkm_output_dp to nvkm_dp (bsc#1095094). - drm/nouveau/disp: s/nvkm_connector/nvkm_conn/ (bsc#1095094). - drm/nouveau/disp: shuffle functions around (bsc#1095094). - drm/nouveau/falcon: use a more reasonable msgqueue timeout value (bsc#1095094). - drm/nouveau/fb/gf100-: zero mmu debug buffers (bsc#1095094). - drm/nouveau/fb/ram/nv40-: use new devinit script interpreter entry-point (bsc#1095094). - drm/nouveau/fbcon: fix oops without fbdev emulation (bsc#1094751). - drm/nouveau/hwmon: Add config for all sensors and their settings (bsc#1095094). - drm/nouveau/hwmon: Add nouveau_hwmon_ops structure with .is_visible/.read_string (bsc#1095094). - drm/nouveau/hwmon: Change permissions to numeric (bsc#1095094). - drm/nouveau/hwmon: Remove old code, add .write/.read operations (bsc#1095094). - drm/nouveau/hwmon: expose the auto_point and pwm_min/max attrs (bsc#1095094). - drm/nouveau/kms/nv04-nv40: improve overlay error detection, fix pitch setting (bsc#1095094). - drm/nouveau/kms/nv04-nv40: prevent undisplayable framebuffers from creation (bsc#1095094). - drm/nouveau/kms/nv04-nv4x: fix exposed format list (bsc#1095094). - drm/nouveau/kms/nv04: use new devinit script interpreter entry-point (bsc#1095094). - drm/nouveau/kms/nv10-nv40: add NV21 support to overlay (bsc#1095094). - drm/nouveau/mc/gf100: add pmu to reset mask (bsc#1095094). - drm/nouveau/mpeg: print more debug info when rejecting dma objects (bsc#1095094). - drm/nouveau/pmu/fuc: do not use movw directly anymore (bsc#1051510). - drm/nouveau/pmu/gt215-: abstract detection of whether reset is needed (bsc#1095094). - drm/nouveau/pmu/gt215: fix reset (bsc#1095094). - drm/nouveau/tegra: Do not leave GPU in reset (bsc#1095094). - drm/nouveau/tegra: Skip manual unpowergating when not necessary (bsc#1095094). - drm/nouveau/therm/gm200: Added (bsc#1095094). - drm/nouveau/therm: fix spelling mistake on array thresolds (bsc#1095094). - drm/nouveau/tmr: remove nvkm_timer_alarm_cancel() (bsc#1095094). - drm/nouveau: Clean up nv50_head_atomic_check_mode() and fix blankus calculation (bsc#1095094). - drm/nouveau: Convert nouveau to use new iterator macros, v2 (bsc#1095094). - drm/nouveau: Drop drm_vblank_cleanup (bsc#1095094). - drm/nouveau: Enable stereoscopic 3D output over HDMI (bsc#1095094). - drm/nouveau: Fix deadlock in nv50_mstm_register_connector() (bsc#1051510). - drm/nouveau: Fix deadlock on runtime suspend (bsc#1051510). - drm/nouveau: Fix merge commit (bsc#1095094). - drm/nouveau: Handle drm_atomic_helper_swap_state failure (bsc#1095094). - drm/nouveau: Handle frame-packing mode geometry and timing effects (bsc#1095094). - drm/nouveau: Pass mode-dependent AVI and Vendor HDMI InfoFrames to NVKM (bsc#1095094). - drm/nouveau: Skip vga_fini on non-PCI device (bsc#1095094). - drm/nouveau: Use the drm_driver.dumb_destroy default (bsc#1095094). - drm/nouveau: silence suspend/resume debugging messages (bsc#1095094). - drm/nouveau: use drm_for_each_connector_iter() (bsc#1095094). - drm/omap: DMM: Check for DMM readiness after successful transaction commit (bsc#1051510). - drm/omap: fix possible NULL ref issue in tiler_reserve_2d (bsc#1051510). - drm/omap: fix uninitialized ret variable (bsc#1051510). - drm/omap: handle alloc failures in omap_connector (bsc#1051510). - drm/omap: silence unititialized variable warning (bsc#1051510). - drm/panel: simple: Fix the bus format for the Ontat panel (bsc#1051510). - drm/psr: Fix missed entry in PSR setup time table (bsc#1051510). - drm/qxl: Call qxl_bo_unref outside atomic context (bsc#1051510). - drm/radeon: Fix PCIe lane width calculation (bsc#1051510). - drm/radeon: Fix deadlock on runtime suspend (bsc#1051510). - drm/radeon: add PX quirk for Asus K73TK (bsc#1051510). - drm/radeon: make MacBook Pro d3_delay quirk more generic (bsc#1051510). - drm/rockchip: Clear all interrupts before requesting the IRQ (bsc#1051510). - drm/rockchip: Respect page offset for PRIME mmap calls (bsc#1051510). - drm/rockchip: dw-mipi-dsi: fix possible un-balanced runtime PM enable (bsc#1051510). - drm/sun4i: Fix dclk_set_phase (bsc#1051510). - drm/sun4i: Fix error path handling (bsc#1051510). - drm/tegra: Shutdown on driver unbind (bsc#1051510). - drm/tilcdc: ensure nonatomic iowrite64 is not used (bsc#1051510). - drm/vc4: Fix memory leak during BO teardown (bsc#1051510). - drm/vc4: Fix scaling of uni-planar formats (bsc#1051510). - drm/virtio: fix vq wait_event condition (bsc#1051510). - drm/vmwgfx: Fix 32-bit VMW_PORT_HB_[IN|OUT] macros (bsc#1051510). - drm/vmwgfx: Fix a buffer object leak (bsc#1051510). - drm/vmwgfx: Set dmabuf_size when vmw_dmabuf_init is successful (bsc#1051510). - drm/vmwgfx: Unpin the screen object backup buffer when not used (bsc#1051510). - drm: Allow determining if current task is output poll worker (bsc#1051510). - drm: Match sysfs name in link removal to link creation (bsc#1051510). - drm: bridge: dw-hdmi: Fix overflow workaround for Amlogic Meson GX SoCs (bsc#1051510). - drm: nouveau: remove dead code and pointless local lut storage (bsc#1095094). - drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen2 (bsc#1051510). - drm: rcar-du: lvds: Fix LVDS startup on R-Car Gen3 (bsc#1051510). - drm: set FMODE_UNSIGNED_OFFSET for drm files (bsc#1051510). - e1000e: Ignore TSYNCRXCTL when getting I219 clock attributes (bsc#1075876). - eCryptfs: do not pass up plaintext names when using filename encryption (bsc#1052766). - earlycon: Use a pointer table to fix __earlycon_table stride (bsc#1099918). - efi/esrt: Use memunmap() instead of kfree() to free the remapping (bsc#1051510). - emulex/benet: Constify *be_misconfig_evt_port_state (bsc#1086288 ). - ethernet/broadcom: Use zeroing memory allocator than allocator/memset (bsc#1086282 ). - ethernet: Use octal not symbolic permissions (bsc#1086288 ). - ethtool: do not print warning for applications using legacy API (networking-stable-18_01_12). - etnaviv: fix gem object list corruption (bsc#1051510). - etnaviv: fix submit error path (bsc#1051510). - ext4: Fix hole length detection in ext4_ind_map_blocks() (bsc#1090953). - ext4: add bounds checking to ext4_xattr_find_entry() (bsc#1052766). - ext4: do not update checksum of new initialized bitmaps (bsc#1052766). - ext4: eliminate sleep from shutdown ioctl (bsc#1052766). - ext4: fix hole length detection in ext4_ind_map_blocks() (bsc#1090953). - ext4: fix offset overflow on 32-bit archs in ext4_iomap_begin() (bsc#1079747). - ext4: fix unsupported feature message formatting (bsc#1098435). - ext4: move call to ext4_error() into ext4_xattr_check_block() (bsc#1052766). - ext4: pass -ESHUTDOWN code to jbd2 layer (bsc#1052766). - ext4: prevent right-shifting extents beyond EXT_MAX_BLOCKS (bsc#1052766). - ext4: protect i_disksize update by i_data_sem in direct write path (bsc#1052766). - ext4: set h_journal if there is a failure starting a reserved handle (bsc#1052766). - ext4: shutdown should not prevent get_write_access (bsc#1052766). - extcon: intel-cht-wc: Set direction and drv flags for V5 boost GPIO (bsc#1051510). - f2fs: avoid hungtask when GC encrypted block if io_bits is set (bsc#1052766). - f2fs: expose some sectors to user in inline data or dentry case (bsc#1052766). - f2fs: fix a panic caused by NULL flush_cmd_control (bsc#1086400). - f2fs: fix heap mode to reset it back (bsc#1052766). - f2fs: fix to clear CP_TRIMMED_FLAG (bsc#1052766). - f2fs: fix to wake up all sleeping flusher (bsc#1099918). - fanotify: fix logic of events on child (bsc#1052766). - fbdev: controlfb: Add missing modes to fix out of bounds access (bsc#1051510). - fealnx: Fix building error on MIPS (networking-stable-17_11_20). - fib_semantics: Do not match route with mismatching tclassid (networking-stable-18_03_07). - firewire-ohci: work around oversized DMA reads on JMicron controllers (bsc#1051510). - firmware: add helper to unregister pm ops (bsc#1085937). - firmware: always enable the reboot notifier (bsc#1085937). - firmware: dmi_scan: Fix UUID length safety check (bsc#1051510). - firmware: dmi_scan: Fix handling of empty DMI strings (bsc#1051510). - firmware: fix capturing errors on fw_cache_init() on early init (bsc#1085937). - firmware: fix checking for return values for fw_add_devm_name() (bsc#1051510). - firmware: fix detecting error on register_reboot_notifier() (bsc#1085936). - firmware: move kill_requests_without_uevent() up above (bsc#1085937). - firmware: provide helpers for registering the syfs loader (bsc#1085937). - firmware: share fw fallback killing on reboot/suspend (bsc#1085937). - fix kabi breaker in md.h (git-fixes). - flow_dissector: properly cap thoff field (networking-stable-18_01_28). - fs/aio: Add explicit RCU grace period when freeing kioctx (bsc#1088722). - fs/aio: Use RCU accessors for kioctx_table->table[] (bsc#1088722). - fs/binfmt_misc.c: do not allow offset overflow (bsc#1099142). - fs/fat/inode.c: fix sb_rdonly() change (bsc#1052766). - fs/reiserfs/journal.c: add missing resierfs_warning() arg (bsc#1052766). - fs: Teach path_connected to handle nfs filesystems with multiple roots (git-fixes). - fsnotify: Fix fsnotify_mark_connector race (bsc#1052766). - fsnotify: Hide kABI changes in fsnotify_mark_connector (bsc#1052766). - ftrace: Fix selftest goto location on error (bsc#1099918). - fuse: fix READDIRPLUS skipping an entry (bsc#1088690). - geneve: Fix function matching VNI and tunnel ID on big-endian (bsc#1051510). - geneve: fix fill_info when link down (bsc#1051510). - gfs2: Fix debugfs glocks dump (bsc#1052766). - gpio: No NULL owner (bsc#1051510). - gpio: ath79: add missing MODULE_DESCRIPTION/LICENSE (bsc#1051510). - gpio: davinci: Assign first bank regs for unbanked case (bsc#1051510). - gpio: fix 'gpio-line-names' property retrieval (bsc#1051510). - gpio: fix aspeed_gpio unmask irq (bsc#1051510). - gpio: fix error path in lineevent_create (bsc#1051510). - gpio: iop: add missing MODULE_DESCRIPTION/AUTHOR/LICENSE (bsc#1051510). - gpio: label descriptors using the device name (bsc#1051510). - gpio: stmpe: i2c transfer are forbiden in atomic context (bsc#1051510). - gpioib: do not free unrequested descriptors (bsc#1051510). - gpu: ipu-v3: pre: fix device node leak in ipu_pre_lookup_by_phandle (bsc#1051510). - gpu: ipu-v3: prg: avoid possible array underflow (bsc#1051510). - gpu: ipu-v3: prg: fix device node leak in ipu_prg_lookup_by_phandle (bsc#1051510). - hdlc_ppp: carrier detect ok, do not turn off negotiation (networking-stable-18_03_07). - hv_netvsc: Fix a network regression after ifdown/ifup (bsc#1094420). - hwmon: (ina2xx) Fix access to uninitialized mutex (bsc#1051510). - hwmon: (ina2xx) Make calibration register value fixed (bsc#1051510). - hwmon: (jc42) optionally try to disable the SMBUS timeout (bsc#1051510). - hwmon: (nct6775) Fix writing pwmX_mode (bsc#1051510). - hwmon: (pmbus/adm1275) Accept negative page register values (bsc#1051510). - hwmon: (pmbus/max8688) Accept negative page register values (bsc#1051510). - hwtracing: stm: fix build error on some arches (bsc#1051510). - i2c: designware: fix poll-after-enable regression (bsc#1051510). - i2c: i801: Restore configuration at shutdown (bsc#1051510). - i2c: i801: Save register SMBSLVCMD value only once (bsc#1051510). - i2c: ismt: Separate I2C block read from SMBus block read (bsc#1051510). - i2c: mv64xxx: Apply errata delay only in standard mode (bsc#1051510). - i2c: pmcmsp: fix error return from master_xfer (bsc#1051510). - i2c: pmcmsp: return message count on master_xfer success (bsc#1051510). - i2c: viperboard: return message count on master_xfer success (bsc#1051510). - i40e: Close client on suspend and restore client MSIx on resume (bsc#1088821). - i40e: Do not allow use more TC queue pairs than MSI-X vectors exist (bsc#1094978). - i40e: Fix attach VF to VM issue (bsc#1056658 bsc#1056662 ). - i40e: Fix the number of queues available to be mapped for use (bsc#1094978). - i40e: program fragmented IPv4 filter input set (bsc#1056658 bsc#1056662 ). - i40evf: Do not schedule reset_task when device is being removed (bsc#1056658 bsc#1056662 ). - i40evf: do not rely on netif_running() outside rtnl_lock() (bsc#1056658 bsc#1056662 ). - i40evf: ignore link up if not running (bsc#1056658 bsc#1056662 ). - i40iw: Zero-out consumer key on allocate stag for FMR (bsc#1058659 ). - ibmvnic: Check CRQ command return codes (bsc#1094840). - ibmvnic: Clean actual number of RX or TX pools (bsc#1092289). - ibmvnic: Clear pending interrupt after device reset (bsc#1089644). - ibmvnic: Create separate initialization routine for resets (bsc#1094840). - ibmvnic: Define vnic_login_client_data name field as unsized array (bsc#1089198). - ibmvnic: Do not notify peers on parameter change resets (bsc#1089198). - ibmvnic: Fix non-fatal firmware error reset (bsc#1093990). - ibmvnic: Fix partial success login retries (bsc#1094840). - ibmvnic: Fix statistics buffers memory leak (bsc#1093990). - ibmvnic: Free coherent DMA memory if FW map failed (bsc#1093990). - ibmvnic: Handle all login error conditions (bsc#1089198). - ibmvnic: Handle error case when setting link state (bsc#1094840). - ibmvnic: Introduce active CRQ state (bsc#1094840). - ibmvnic: Introduce hard reset recovery (bsc#1094840). - ibmvnic: Mark NAPI flag as disabled when released (bsc#1094840). - ibmvnic: Only do H_EOI for mobility events (bsc#1094356). - ibmvnic: Return error code if init interrupted by transport event (bsc#1094840). - ibmvnic: Set resetting state at earliest possible point (bsc#1094840). - ide: Make ide_cdrom_prep_fs() initialize the sense buffer pointer (bsc#1099918). - ide: ide-atapi: fix compile error with defining macro DEBUG (bsc#1099918). - ide:ide-cd: fix kernel panic resulting from missing scsi_req_init (bsc#1099918). - idr: fix invalid ptr dereference on item delete (bsc#1051510). - ieee802154: 6lowpan: fix possible NULL deref in lowpan_device_event() (networking-stable-18_03_28). - igb: Allow to remove administratively set MAC on VFs (bsc#1056651 ). - igb: Clear TXSTMP when ptp_tx_work() is timeout (bsc#1056651 ). - igb: Fix a test with HWTSTAMP_TX_ON (bsc#1056651 bsc#1056643 ). - iio: ABI: Fix name of timestamp sysfs file (bsc#1051510). - iio: ad7793: Fix the serial interface reset (bsc#1051510). - iio: ad7793: implement IIO_CHAN_INFO_SAMP_FREQ (bsc#1051510). - iio: ad_sigma_delta: Implement a dedicated reset function (bsc#1051510). - iio: adc/accel: Fix up module licenses (bsc#1051510). - iio: adc: cpcap: fix incorrect validation (bsc#1051510). - iio: adc: mcp320x: Fix oops on module unload (bsc#1051510). - iio: adc: mcp320x: Fix readout of negative voltages (bsc#1051510). - iio: adc: meson-saradc: fix the bit_idx of the adc_en clock (bsc#1051510). - iio: adc: stm32: fix scan of multiple channels with DMA (bsc#1051510). - iio: adc: ti-ads1015: add 10% to conversion wait time (bsc#1051510). - iio: adc: twl4030: Disable the vusb3v1 rugulator in the error handling path of 'twl4030_madc_probe()' (bsc#1051510). - iio: adc: twl4030: Fix an error handling path in 'twl4030_madc_probe()' (bsc#1051510). - iio: adis_lib: Initialize trigger before requesting interrupt (bsc#1051510). - iio: buffer: check if a buffer has been set up when poll is called (bsc#1051510). - iio: buffer: fix the function signature to match implementation (bsc#1051510). - iio: core: Return error for failed read_reg (bsc#1051510). - iio: fix kernel-doc build errors (bsc#1051510). - iio: health: max30102: Add power enable parameter to get_temp function (bsc#1051510). - iio: health: max30102: Temperature should be in milli Celsius (bsc#1051510). - iio: imu: st_lsm6dsx: fix endianness in st_lsm6dsx_read_oneshot() (bsc#1051510). - iio: st_pressure: st_accel: Initialise sensor platform data properly (bsc#1051510). - iio: st_pressure: st_accel: pass correct platform data to init (bsc#1051510). - iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510). - iio: trigger: stm32-timer: fix get/set down count direction (bsc#1051510). - iio: trigger: stm32-timer: preset shouldn't be buffered (bsc#1051510). - iio:buffer: make length types match kfifo types (bsc#1051510). - iio:kfifo_buf: check for uint overflow (bsc#1051510). - ima: Fallback to the builtin hash algorithm (bsc#1091686). - infiniband: drop unknown function from core_priv.h (bsc#1046306 ). - init: fix false positives in W+X checking (bsc#1093721). - initial support (display-only) for GP108 (bsc#1095094). - intel_th: Use correct device when freeing buffers (bsc#1051510). - iommu/amd: Take into account that alloc_dev_data() may return NULL (bsc#975772). - iommu/vt-d: Clear pasid table entry when memory unbound (bsc#1087214). - iommu/vt-d: Fix race condition in add_unmap() (bsc#1096790, bsc#1097034). - iov_iter: fix memory leak in pipe_get_pages_alloc() (bsc#1092710). - iov_iter: fix return type of __pipe_get_pages() (bsc#1092710). - ip6_gre: better validate user provided tunnel names (networking-stable-18_04_10). - ip6_gre: fix device features for ioctl setup (networking-stable-17_12_31). - ip6_gre: init dev->mtu and dev->hard_header_len correctly (networking-stable-18_01_28). - ip6_gre: ip6gre_tap device should keep dst (networking-stable-17_10_09). - ip6_gre: only increase err_count for some certain type icmpv6 in ip6gre_err (networking-stable-17_11_14). - ip6_gre: skb_push ipv6hdr before packing the header in ip6gre_header (networking-stable-17_10_09). - ip6_tunnel: better validate user provided tunnel names (networking-stable-18_04_10). - ip6_tunnel: disable dst caching if tunnel is dual-stack (networking-stable-18_01_12). - ip6_tunnel: do not allow loading ip6_tunnel if ipv6 is disabled in cmdline (networking-stable-17_10_09). - ip6_vti: adjust vti mtu according to mtu of lower device (bsc#1082869). - ip6mr: fix stale iterator (networking-stable-18_02_06). - ip6mr: only set ip6mr_table from setsockopt when ip6mr_new_table succeeds (git-fixes). - ip_gre: fix IFLA_MTU ignored on NEWLINK (bsc#1076830). - ip_tunnel: better validate user provided tunnel names (networking-stable-18_04_10). - ipip: only increase err_count for some certain type icmp in ipip_err (networking-stable-17_11_14). - ipmi_ssif: Fix kernel panic at msg_done_handler (bsc#1088872). - ipv4: Fix use-after-free when flushing FIB tables (networking-stable-17_12_31). - ipv4: Make neigh lookup keys for loopback/point-to-point devices be INADDR_ANY (networking-stable-18_01_28). - ipv4: fix fnhe usage by non-cached routes (networking-stable-18_05_15). - ipv4: fix memory leaks in udp_sendmsg, ping_v4_sendmsg (networking-stable-18_05_15). - ipv4: igmp: guard against silly MTU values (bsc#1082869). - ipv6 sit: work around bogus gcc-8 -Wrestrict warning (networking-stable-18_03_07). - ipv6: Fix getsockopt() for sockets with default IPV6_AUTOFLOWLABEL (git-fixes). - ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policy (networking-stable-18_04_26). - ipv6: fix access to non-linear packet in ndisc_fill_redirect_hdr_option() (networking-stable-18_03_28). - ipv6: fix udpv6 sendmsg crash caused by too small MTU (networking-stable-18_01_28). - ipv6: flowlabel: do not leave opt->tot_len with garbage (networking-stable-17_11_14). - ipv6: mcast: better catch silly mtu values (networking-stable-17_12_31). - ipv6: old_dport should be a __be16 in __ip6_datagram_connect() (networking-stable-18_03_28). - ipv6: omit traffic class when calculating flow hash (bsc#1095042). - ipv6: sit: better validate user provided tunnel names (networking-stable-18_04_10). - ipv6: sr: fix NULL pointer dereference in seg6_do_srh_encap()- v4 pkts (git-fixes). - ipv6: sr: fix NULL pointer dereference when setting encap source address (networking-stable-18_03_28). - ipv6: sr: fix TLVs not being copied using setsockopt (networking-stable-18_01_12). - ipv6: sr: fix scheduling in RCU when creating seg6 lwtunnel state (networking-stable-18_03_28). - ipv6: sr: fix seg6 encap performances with TSO enabled (networking-stable-18_04_10). - ipv6: the entire IPv6 header chain must fit the first fragment (networking-stable-18_04_10). - irqchip/gic-v3-its: Ensure nr_ites >= nr_lpis (bsc#1098401). - isdn: eicon: fix a missing-check bug (bsc#1051510). - iw_cxgb4: Atomically flush per QP HW CQEs (bsc#1046543 ). - iw_cxgb4: Fix an error handling path in 'c4iw_get_dma_mr()' (bsc#1064802 bsc#1066129). - iw_cxgb4: print mapped ports correctly (bsc#1046543 ). - iwlmvm: tdls: Check TDLS channel switch support (bsc#1051510). - iwlwifi: add a bunch of new 9000 PCI IDs (1051510). - iwlwifi: add shared clock PHY config flag for some devices (bsc#1051510). - iwlwifi: avoid collecting firmware dump if not loaded (bsc#1051510). - iwlwifi: fix non_shared_ant for 9000 devices (bsc#1051510). - iwlwifi: fw: harden page loading code (bsc#1051510). - iwlwifi: mvm: Correctly set IGTK for AP (bsc#1051510). - iwlwifi: mvm: Correctly set the tid for mcast queue (bsc#1051510). - iwlwifi: mvm: Direct multicast frames to the correct station (bsc#1051510). - iwlwifi: mvm: Fix channel switch for count 0 and 1 (bsc#1051510). - iwlwifi: mvm: Increase session protection time after CS (bsc#1051510). - iwlwifi: mvm: always init rs with 20mhz bandwidth rates (b