Vulnerability from csaf_suse
Published
2022-12-15 09:43
Modified
2022-12-15 09:43
Summary
Feature update for SCA patterns
Notes
Title of the patch
Feature update for SCA patterns
Description of the patch
This update for SCA patterns fixes the following issues:
sca-patterns-base:
- Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Core.loadFullFile for sectionless parsing (bsc#1187194)
* Added SUSE.getNetworkInterfaces (bsc#1144162)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Fix SUSE.getFileSystems invalid index error (bsc#1185594)
* Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)
* Removed Novell/OES references from libraries (bsc#1186034)
* Updated documentation for SUSE.compareKernel
* Updated kernel version constants for all SUSE libraries (bsc#1189483)
sca-patterns-hae:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added distribution and service pack subdirectories (bsc#1193878)
* False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793)
* HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)
* supportconfig indicates IPv6 required by HAE, is already enabled (bsc#1045605)
sca-patterns-suma:
- Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
sca-server-report:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Changed absolute paths to relative ones (bsc#1186316)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Ensure that the legacy SuSE-release file works (bsc#1196730)
* Fix sca report header supportconfig file (bsc#1186442)
* Fix the report file output path (bsc#1180894)
* Removed preprocessor elements for OES Filr eDir (bsc#1186420)
sca-patterns-sle15:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
* bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed field reference in sle15all/lvm-00003.pl
* Fixed metadata tags in scc-registered.py
* Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
- New security announcement patterns:
* Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1
* Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1
* Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1
SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1
* Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1
SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1
SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1
SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1
SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1
SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1
SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1
SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1
SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1
* Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1
SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1
SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1
SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1
SUSE-SU-2021:2470-1
* Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1
SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1
SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1
SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1
SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1
SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1
SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1
SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1
SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1
SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1
* May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1
SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1
SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1
SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1
SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1
SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1
SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1
SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1
* May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1
SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1
SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1
SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1
SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1
SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1
SUSE-SU-2021:1455-1
- New regular patterns:
* sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#1179170)
* sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon
Scalable processors (bsc#1185758)
* sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest
* sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed
(bsc#1189394)
* sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)
* sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIO_GETGEO
failed with 25 (bsc#1182917)
* sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684)
* sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable
processors (bsc#1185758)
* sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle
problems (bsc#1176140)
* sle15sp1/qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards
(bsc#1155990)
* sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness
on host (bsc#1152800)
* sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
* sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)
* sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356)
* sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation
failure (bsc#1157778)
* sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768)
* sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS
(bsc#1131489)
* sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1177753)
* sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)
* sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0
* sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis
* sle15all/vmcore-00001.pl: Identifies kernel core dumps for review
* sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or
directory (bsc#1185357)
* sle15all/systemd-current-failed-7017137.py: Check for failed systemd services
* sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck
* sle15all/softlock-000018705.py: soft lockup messages about
* sle15all/slapd-000019711.py: slapd.service not enabled/failed after upgrade from SUSE Linux Enterprise 11 Service
Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353)
* sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
* sle15all/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
server (bsc#1183464)
* sle15all/scc-registered.py: Check system registration status
* sle15all/scc-expired.py: Identify if SCC registrations have expired
* sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181)
* sle15all/scatool-000004685.py: scatool fails with traceback
* sle15all/proxy-00003.pl: Checks for proxy environment variables
* sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled
* sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905)
* sle15all/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux
Enterprise 15 Service Pack 2 (bsc#1176375)
* sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792)
* sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170)
* sle15all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue
* sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for
missing physical volumes.
* sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
* sle15all/coredumpctl-000018634.py: How to obtain systemd service core dumps
* sle15all/btrfsmaster-000018779.py: BTRFS Master TID
* sle15all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled
* sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)
* sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890)
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)
+ sle15sp2/crosstalk_152-000019643.py
+ sle15sp1/crosstalk_151-000019643.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)
+ sle15sp2/ucodeintel_152-000019635.py
+ sle15sp1/ucodeintel_151-000019635.py
+ sle15sp0/ucodeintel_150-000019635.py
- Renamed pattern files for filename standard
* Renamed patterns/SLE/sle15all/scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py
* Renamed /SLE/sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py
- Updated regular patterns:
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for
missing physical volumes
sca-patterns-sle12:
- Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
+ bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed metadata tags for scc-registered.py
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
* Updated scc-registered.py pattern to fix registration detection
- New security announcement patterns:
* Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
* Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1
* Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1
SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1
SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
* Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1
SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1
SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1
SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1
SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1
SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1
SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1
SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1
SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1
SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1
SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1
SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1
* Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1
SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1
SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1
SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1
SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1
SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1
SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1
SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1
SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1
SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1
SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1
SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1
SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1
SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1
SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1
SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1
SUSE-SU-2021:2006-1
* May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1
SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1
SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1
SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1
SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1
SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1
* Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1
SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1
SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1
SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1
SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1
SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1
SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1
SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1
SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1
SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1
SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1
SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1
SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1
SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1
* Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1
SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1
SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1
SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1
SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1
SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1
SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1
SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1
SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1
SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1
SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1
SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1
SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1
SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2
SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1
SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1
SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1
- New regular patterns:
* sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)
* sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
server (bsc#1183464)
* sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from
SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)
* sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)
* sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
* sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)
* sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623)
* sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon
Scalable processors (bsc#1185758)
* sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)
* sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
* sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel
4.12.14-95.48-default may crash the system (bsc#1176579)
* sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)
* sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
server (bsc#1183464)
* sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible
* sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux
Enterprise 15 Service Pack 2 (bsc#1176375)
* sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
* sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)
* sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)
* sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
* sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)
* sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd services
* sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0
* sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579)
* sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck
* sle12all/softlock-000018705.py: soft lockup messages about
* sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
* sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316)
* sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled
* sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed
* sle12all/lvm-volume-list-7016683.py: Fixed execution error
* sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps
* sle12all/btrfsmaster-000018779.py: BTRFS Master TID
* sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891)
* sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled
* CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth
+ sle12sp5/bleedingtooth_125-000019735.py
+ sle12sp4/bleedingtooth_124-000019735.py
+ sle12sp3/bleedingtooth_123-000019735.py
+ sle12sp2/bleedingtooth_122-000019735.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)
+ sle12sp5/ucodeintel_125-000019635.py
+ sle12sp4/ucodeintel_124-000019635.py
+ sle12sp3/ucodeintel_123-000019635.py
+ sle12sp2/ucodeintel_122-000019635.py
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)
+ sle12sp5/crosstalk_125-000019643.py
+ sle12sp4/crosstalk_124-000019643.py
+ sle12sp3/crosstalk_123-000019643.py
+ sle12sp2/crosstalk_122-000019643.py
- Updated patterns:
* sle12all/scc-expired.py: Identify if SCC registrations have expired
* sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for
missing physical volumes
* sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata
* sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue
- Renamed patterns for file standard:
* Renamed patterns/SLE/sle12all/scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py
* Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/bhc-scc-registered.py
- Deleted regular patterns (1)
* sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983)
* sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)
* sle12all/pdc-00001.pl: Pattern removed OES Dependent
* sle12all/pdc-00002.pl: Pattern removed OES Dependent
* sle12all/lvm-00001.pl: Pattern removed
* sle12all/lvm-00002.pl: Pattern removed
sca-patterns-sle11:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Removed OES dependent patterns (bsc#1196873)
- New security announcement patterns:
* Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1
* Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
* Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1
SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1
* Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1
SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1
SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1
* Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1
SUSE-SU-2021:14761-1
* Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1
SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1
SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1
* May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1
SUSE-SU-2021:14714-1
* Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1
SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1
SUSE-SU-2021:14692-1
- New regular patterns:
* sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
* sle11all/softlock-000018705.py: soft lockup messages about
* sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
* sle11all/btrfsmaster-000018779.py: BTRFS Master TID
* CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk
(bsc#1154824)
- Deleted regular patterns:
* sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)
Patchnames
SUSE-2022-4496,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496,openSUSE-SLE-15.3-2022-4496
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "moderate", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Feature update for SCA patterns", title: "Title of the patch", }, { category: "description", text: "This update for SCA patterns fixes the following issues:\n\nsca-patterns-base:\n\n- Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added Core.loadFullFile for sectionless parsing (bsc#1187194)\n * Added SUSE.getNetworkInterfaces (bsc#1144162)\n * Changed required dependencies from python to python3-base (bsc#1191199)\n * Fix SUSE.getFileSystems invalid index error (bsc#1185594)\n * Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)\n * Removed Novell/OES references from libraries (bsc#1186034)\n * Updated documentation for SUSE.compareKernel\n * Updated kernel version constants for all SUSE libraries (bsc#1189483)\n\nsca-patterns-hae:\n\n- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added distribution and service pack subdirectories (bsc#1193878)\n * False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793)\n * HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)\n * supportconfig indicates IPv6 required by HAE, is already enabled (bsc#1045605)\n\nsca-patterns-suma:\n\n- Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n\nsca-server-report:\n\n- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Changed absolute paths to relative ones (bsc#1186316)\n * Changed required dependencies from python to python3-base (bsc#1191199)\n * Ensure that the legacy SuSE-release file works (bsc#1196730) \n * Fix sca report header supportconfig file (bsc#1186442)\n * Fix the report file output path (bsc#1180894)\n * Removed preprocessor elements for OES Filr eDir (bsc#1186420)\n\nsca-patterns-sle15:\n\n- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added Video link to coredumpctl-000018634.py\n * Added video links to patterns (bsc#1190460):\n * bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl\n * Fixed crosstalk message strings (bsc#1186312)\n * Fixed field reference in sle15all/lvm-00003.pl\n * Fixed metadata tags in scc-registered.py\n * Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)\n * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)\n * Requires Core library 1.3.3 which contains Core.logFullFile function\n * Updated registration link in bhc-scc-registered.py\n * Updated renewal link in bhc-scc-expired.py\n- New security announcement patterns:\n * Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1\n * Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1\n * Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1\n SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1\n SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1\n SUSE-SU-2022:0367-1\n * Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1\n SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1\n SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1\n SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1\n SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1\n SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1\n SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1\n SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1\n SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1\n SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1\n * Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1\n SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1\n SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1\n SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1\n SUSE-SU-2021:2470-1\n * Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1\n SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1\n SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1\n SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1\n SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1\n SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1\n SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1\n SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1\n SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1\n SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1\n * May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1\n SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 \n SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 \n SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 \n SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 \n SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1 \n SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 \n SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1\n * May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 \n SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1\n SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1\n SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1\n SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1\n SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1\n SUSE-SU-2021:1455-1\n- New regular patterns:\n * sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#1179170)\n * sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon\n Scalable processors (bsc#1185758)\n * sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest\n * sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed\n (bsc#1189394)\n * sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)\n * sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIO_GETGEO\n failed with 25 (bsc#1182917)\n * sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684)\n * sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable\n processors (bsc#1185758)\n * sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle\n problems (bsc#1176140)\n * sle15sp1/qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards\n (bsc#1155990)\n * sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness\n on host (bsc#1152800)\n * sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403) \n * sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)\n * sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356)\n * sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation\n failure (bsc#1157778)\n * sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768)\n * sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS \n (bsc#1131489)\n * sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1177753)\n * sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n * sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0\n * sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis\n * sle15all/vmcore-00001.pl: Identifies kernel core dumps for review\n * sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or\n directory (bsc#1185357)\n * sle15all/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck\n * sle15all/softlock-000018705.py: soft lockup messages about\n * sle15all/slapd-000019711.py: slapd.service not enabled/failed after upgrade from SUSE Linux Enterprise 11 Service\n Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353)\n * sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n * sle15all/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n server (bsc#1183464)\n * sle15all/scc-registered.py: Check system registration status\n * sle15all/scc-expired.py: Identify if SCC registrations have expired\n * sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181)\n * sle15all/scatool-000004685.py: scatool fails with traceback\n * sle15all/proxy-00003.pl: Checks for proxy environment variables\n * sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled\n * sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905)\n * sle15all/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux\n Enterprise 15 Service Pack 2 (bsc#1176375)\n * sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792)\n * sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170)\n * sle15all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue\n * sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata\n * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n missing physical volumes.\n * sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives\n * sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)\n * sle15all/coredumpctl-000018634.py: How to obtain systemd service core dumps\n * sle15all/btrfsmaster-000018779.py: BTRFS Master TID\n * sle15all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled\n * sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)\n * sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890)\n * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)\n + sle15sp2/crosstalk_152-000019643.py\n + sle15sp1/crosstalk_151-000019643.py\n * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)\n + sle15sp2/ucodeintel_152-000019635.py\n + sle15sp1/ucodeintel_151-000019635.py\n + sle15sp0/ucodeintel_150-000019635.py\n- Renamed pattern files for filename standard\n * Renamed patterns/SLE/sle15all/scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py\n * Renamed /SLE/sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py\n- Updated regular patterns:\n * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n missing physical volumes\n\nsca-patterns-sle12:\n\n- Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Added Video link to coredumpctl-000018634.py\n * Added video links to patterns (bsc#1190460): \n + bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl\n * Fixed crosstalk message strings (bsc#1186312)\n * Fixed metadata tags for scc-registered.py\n * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)\n * Requires Core library 1.3.3 which contains Core.logFullFile function\n * Updated registration link in bhc-scc-registered.py\n * Updated renewal link in bhc-scc-expired.py\n * Updated scc-registered.py pattern to fix registration detection\n- New security announcement patterns:\n * Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1\n * Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1\n * Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 \n SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1\n SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1\n SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1\n SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1\n SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1\n SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1\n * Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1\n SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1\n SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1\n SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1\n SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1\n SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1\n SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1\n SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1\n SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1\n SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1\n SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1\n SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1\n SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1\n SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1\n SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1\n SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1\n SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1\n SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1\n * Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1\n SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1\n SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1\n SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1\n SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1\n SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1\n SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1\n SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1\n SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1\n SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1\n SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1\n SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1\n SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1\n SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1\n SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1\n SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1\n SUSE-SU-2021:2006-1\n * May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1\n SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1\n SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1\n SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1\n SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1\n SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1\n SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1\n SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1\n * Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1\n SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1\n SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1\n SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1\n SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1\n SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1\n SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1\n SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1\n SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1\n SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1\n SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1\n SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1\n SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1\n SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1\n * Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1\n SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1\n SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1\n SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1\n SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1\n SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1\n SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1\n SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1\n SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1\n SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1\n SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1\n SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1\n SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1\n SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2\n SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1\n SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1\n SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1\n- New regular patterns:\n * sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)\n * sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)\n * sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n server (bsc#1183464)\n * sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n * sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n * sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n * sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from\n SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)\n * sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)\n * sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)\n * sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)\n * sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623)\n * sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n * sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n * sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n * sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon\n Scalable processors (bsc#1185758)\n * sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)\n * sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n * sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)\n * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)\n * sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel\n 4.12.14-95.48-default may crash the system (bsc#1176579)\n * sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)\n * sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n server (bsc#1183464)\n * sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible\n * sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux \n Enterprise 15 Service Pack 2 (bsc#1176375)\n * sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)\n * sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n * sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS\n * sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS\n * sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)\n * sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n * sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)\n * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n * sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS\n * sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n * sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n * sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd services\n * sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0\n * sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579)\n * sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck\n * sle12all/softlock-000018705.py: soft lockup messages about\n * sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n * sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316)\n * sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled\n * sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed\n * sle12all/lvm-volume-list-7016683.py: Fixed execution error\n * sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives\n * sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps\n * sle12all/btrfsmaster-000018779.py: BTRFS Master TID\n * sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891)\n * sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled\n * CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth\n + sle12sp5/bleedingtooth_125-000019735.py\n + sle12sp4/bleedingtooth_124-000019735.py\n + sle12sp3/bleedingtooth_123-000019735.py\n + sle12sp2/bleedingtooth_122-000019735.py\n * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)\n + sle12sp5/ucodeintel_125-000019635.py\n + sle12sp4/ucodeintel_124-000019635.py\n + sle12sp3/ucodeintel_123-000019635.py\n + sle12sp2/ucodeintel_122-000019635.py\n * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)\n + sle12sp5/crosstalk_125-000019643.py\n + sle12sp4/crosstalk_124-000019643.py\n + sle12sp3/crosstalk_123-000019643.py\n + sle12sp2/crosstalk_122-000019643.py\n- Updated patterns:\n * sle12all/scc-expired.py: Identify if SCC registrations have expired\n * sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n missing physical volumes\n * sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata\n * sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue\n- Renamed patterns for file standard:\n * Renamed patterns/SLE/sle12all/scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py\n * Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/bhc-scc-registered.py\n- Deleted regular patterns (1)\n * sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983)\n * sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)\n * sle12all/pdc-00001.pl: Pattern removed OES Dependent\n * sle12all/pdc-00002.pl: Pattern removed OES Dependent\n * sle12all/lvm-00001.pl: Pattern removed\n * sle12all/lvm-00002.pl: Pattern removed\n\nsca-patterns-sle11:\n\n- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n * Removed OES dependent patterns (bsc#1196873)\n- New security announcement patterns:\n * Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 \n SUSE-SU-2022:14951-1\n * Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n * Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1\n SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1\n * Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1\n SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1\n SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1\n * Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1\n SUSE-SU-2021:14761-1\n * Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1\n SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1\n SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1\n * May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1\n SUSE-SU-2021:14714-1\n * Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1\n SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1\n SUSE-SU-2021:14692-1\n- New regular patterns:\n * sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n * sle11all/softlock-000018705.py: soft lockup messages about\n * sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n * sle11all/btrfsmaster-000018779.py: BTRFS Master TID\n * CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk\n (bsc#1154824)\n- Deleted regular patterns:\n * sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)\n", title: "Description of the patch", }, { category: "details", text: "SUSE-2022-4496,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496,openSUSE-SLE-15.3-2022-4496", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-fu-2022_4496-1.json", }, { category: "self", summary: "URL for SUSE-FU-2022:4496-1", url: "https://www.suse.com/support/update/announcement//suse-fu-20224496-1/", }, { category: "self", summary: "E-Mail link for SUSE-FU-2022:4496-1", url: "https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html", }, { category: "self", summary: "SUSE Bug 1045605", url: "https://bugzilla.suse.com/1045605", }, { category: "self", summary: "SUSE Bug 1124793", url: "https://bugzilla.suse.com/1124793", }, { category: "self", summary: "SUSE Bug 1131489", url: "https://bugzilla.suse.com/1131489", }, { category: "self", summary: "SUSE Bug 1138452", url: "https://bugzilla.suse.com/1138452", }, { category: "self", summary: "SUSE Bug 1144162", url: "https://bugzilla.suse.com/1144162", }, { category: "self", summary: "SUSE Bug 1152800", url: "https://bugzilla.suse.com/1152800", }, { category: "self", summary: "SUSE Bug 1154768", url: "https://bugzilla.suse.com/1154768", }, { category: "self", summary: "SUSE Bug 1154824", url: "https://bugzilla.suse.com/1154824", }, { category: "self", summary: "SUSE Bug 1155181", url: "https://bugzilla.suse.com/1155181", }, { category: "self", summary: "SUSE Bug 1155990", url: "https://bugzilla.suse.com/1155990", }, { category: "self", summary: "SUSE Bug 1156353", url: "https://bugzilla.suse.com/1156353", }, { category: "self", summary: "SUSE Bug 1157778", url: "https://bugzilla.suse.com/1157778", }, { category: "self", summary: "SUSE Bug 1158890", url: "https://bugzilla.suse.com/1158890", }, { category: "self", summary: "SUSE Bug 1159356", url: "https://bugzilla.suse.com/1159356", }, { category: "self", summary: "SUSE Bug 1159891", url: "https://bugzilla.suse.com/1159891", }, { category: "self", summary: "SUSE Bug 1162119", url: "https://bugzilla.suse.com/1162119", }, { category: "self", summary: "SUSE Bug 1163403", url: "https://bugzilla.suse.com/1163403", }, { category: "self", summary: "SUSE Bug 1163508", url: "https://bugzilla.suse.com/1163508", }, { category: "self", summary: "SUSE Bug 1164692", url: "https://bugzilla.suse.com/1164692", }, { category: "self", summary: "SUSE Bug 1167689", url: "https://bugzilla.suse.com/1167689", }, { category: "self", summary: "SUSE Bug 1175623", url: "https://bugzilla.suse.com/1175623", }, { category: "self", summary: "SUSE Bug 1176021", url: "https://bugzilla.suse.com/1176021", }, { category: "self", summary: "SUSE Bug 1176140", url: "https://bugzilla.suse.com/1176140", }, { category: "self", summary: "SUSE Bug 1176375", url: "https://bugzilla.suse.com/1176375", }, { category: "self", summary: "SUSE Bug 1176579", url: "https://bugzilla.suse.com/1176579", }, { category: "self", summary: "SUSE Bug 1177369", url: "https://bugzilla.suse.com/1177369", }, { category: "self", summary: "SUSE Bug 1177753", url: "https://bugzilla.suse.com/1177753", }, { category: "self", summary: "SUSE Bug 1179170", url: "https://bugzilla.suse.com/1179170", }, { category: "self", summary: "SUSE Bug 1180894", url: "https://bugzilla.suse.com/1180894", }, { category: "self", summary: "SUSE Bug 1182194", url: "https://bugzilla.suse.com/1182194", }, { category: "self", summary: "SUSE Bug 1182905", url: "https://bugzilla.suse.com/1182905", }, { category: "self", summary: "SUSE Bug 1182917", url: "https://bugzilla.suse.com/1182917", }, { category: "self", summary: "SUSE Bug 1183405", url: "https://bugzilla.suse.com/1183405", }, { category: "self", summary: "SUSE Bug 1183464", url: "https://bugzilla.suse.com/1183464", }, { category: "self", summary: "SUSE Bug 1184594", url: "https://bugzilla.suse.com/1184594", }, { category: "self", summary: "SUSE Bug 1185357", url: "https://bugzilla.suse.com/1185357", }, { category: "self", summary: "SUSE Bug 1185593", url: "https://bugzilla.suse.com/1185593", }, { category: "self", summary: "SUSE Bug 1185594", url: "https://bugzilla.suse.com/1185594", }, { category: "self", summary: "SUSE Bug 1185684", url: "https://bugzilla.suse.com/1185684", }, { category: "self", summary: "SUSE Bug 1185758", url: "https://bugzilla.suse.com/1185758", }, { category: "self", summary: "SUSE Bug 1185857", url: "https://bugzilla.suse.com/1185857", }, { category: "self", summary: "SUSE Bug 1186034", url: "https://bugzilla.suse.com/1186034", }, { category: "self", summary: "SUSE Bug 1186312", url: "https://bugzilla.suse.com/1186312", }, { category: "self", summary: "SUSE Bug 1186316", url: "https://bugzilla.suse.com/1186316", }, { category: "self", summary: "SUSE Bug 1186317", url: "https://bugzilla.suse.com/1186317", }, { category: "self", summary: "SUSE Bug 1186420", url: "https://bugzilla.suse.com/1186420", }, { category: "self", summary: "SUSE Bug 1186442", url: "https://bugzilla.suse.com/1186442", }, { category: "self", summary: "SUSE Bug 1186792", url: "https://bugzilla.suse.com/1186792", }, { category: "self", summary: "SUSE Bug 1187194", url: "https://bugzilla.suse.com/1187194", }, { category: "self", summary: "SUSE Bug 1187508", url: "https://bugzilla.suse.com/1187508", }, { category: "self", summary: "SUSE Bug 1187983", url: "https://bugzilla.suse.com/1187983", }, { category: "self", summary: "SUSE Bug 1189394", url: "https://bugzilla.suse.com/1189394", }, { category: "self", summary: "SUSE Bug 1189483", url: "https://bugzilla.suse.com/1189483", }, { category: "self", summary: "SUSE Bug 1189889", url: "https://bugzilla.suse.com/1189889", }, { category: "self", summary: "SUSE Bug 1190260", url: "https://bugzilla.suse.com/1190260", }, { category: "self", summary: "SUSE Bug 1190460", url: "https://bugzilla.suse.com/1190460", }, { category: "self", summary: "SUSE Bug 1191005", url: "https://bugzilla.suse.com/1191005", }, { category: "self", summary: "SUSE Bug 1191199", url: "https://bugzilla.suse.com/1191199", }, { category: "self", summary: "SUSE Bug 1193878", url: "https://bugzilla.suse.com/1193878", }, { category: "self", summary: "SUSE Bug 1196730", url: "https://bugzilla.suse.com/1196730", }, { category: "self", summary: "SUSE Bug 1196873", url: "https://bugzilla.suse.com/1196873", }, { category: "self", summary: "SUSE CVE CVE-2020-0543 page", url: "https://www.suse.com/security/cve/CVE-2020-0543/", }, { category: "self", summary: "SUSE CVE CVE-2020-0548 page", url: "https://www.suse.com/security/cve/CVE-2020-0548/", }, { category: "self", summary: "SUSE CVE CVE-2020-0549 page", url: "https://www.suse.com/security/cve/CVE-2020-0549/", }, { category: "self", summary: "SUSE CVE CVE-2020-12351 page", url: "https://www.suse.com/security/cve/CVE-2020-12351/", }, { category: "self", summary: "SUSE CVE CVE-2020-12352 page", url: "https://www.suse.com/security/cve/CVE-2020-12352/", }, { category: "self", summary: "SUSE CVE CVE-2020-1472 page", url: "https://www.suse.com/security/cve/CVE-2020-1472/", }, { category: "self", summary: "SUSE CVE CVE-2020-24490 page", url: "https://www.suse.com/security/cve/CVE-2020-24490/", }, ], title: "Feature update for SCA patterns", tracking: { current_release_date: "2022-12-15T09:43:54Z", generator: { date: "2022-12-15T09:43:54Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-FU-2022:4496-1", initial_release_date: "2022-12-15T09:43:54Z", revision_history: [ { date: "2022-12-15T09:43:54Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "sca-patterns-base-1.5.0-150300.10.3.1.noarch", product: { name: "sca-patterns-base-1.5.0-150300.10.3.1.noarch", product_id: "sca-patterns-base-1.5.0-150300.10.3.1.noarch", }, }, { category: "product_version", name: "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", product: { name: "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", product_id: "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", }, }, { category: "product_version", name: "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", product: { name: "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", product_id: "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", }, }, { category: "product_version", name: "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", product: { name: "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", product_id: "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", }, }, { category: "product_version", name: "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", product: { name: "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", product_id: "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", }, }, { category: "product_version", name: "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", product: { name: "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", product_id: "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", }, }, { category: "product_version", name: "sca-server-report-1.5.1-150300.11.3.1.noarch", product: { name: "sca-server-report-1.5.1-150300.11.3.1.noarch", product_id: "sca-server-report-1.5.1-150300.11.3.1.noarch", }, }, ], category: "architecture", name: "noarch", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Module for Server Applications 15 SP3", product: { name: "SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3", product_identification_helper: { cpe: "cpe:/o:suse:sle-module-server-applications:15:sp3", }, }, }, { category: "product_name", name: "openSUSE Leap 15.3", product: { name: "openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3", product_identification_helper: { cpe: "cpe:/o:opensuse:leap:15.3", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "sca-patterns-base-1.5.0-150300.10.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", }, product_reference: "sca-patterns-base-1.5.0-150300.10.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-hae-1.5.1-150300.10.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", }, product_reference: "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", }, product_reference: "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", }, product_reference: "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", }, product_reference: "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-suma-1.5.0-150300.9.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", }, product_reference: "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "sca-server-report-1.5.1-150300.11.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3", product_id: "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", }, product_reference: "sca-server-report-1.5.1-150300.11.3.1.noarch", relates_to_product_reference: "SUSE Linux Enterprise Module for Server Applications 15 SP3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-base-1.5.0-150300.10.3.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", }, product_reference: "sca-patterns-base-1.5.0-150300.10.3.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-hae-1.5.1-150300.10.3.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", }, product_reference: "sca-patterns-hae-1.5.1-150300.10.3.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", }, product_reference: "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", }, product_reference: "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", }, product_reference: "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "sca-patterns-suma-1.5.0-150300.9.3.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", }, product_reference: "sca-patterns-suma-1.5.0-150300.9.3.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, { category: "default_component_of", full_product_name: { name: "sca-server-report-1.5.1-150300.11.3.1.noarch as component of openSUSE Leap 15.3", product_id: "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", }, product_reference: "sca-server-report-1.5.1-150300.11.3.1.noarch", relates_to_product_reference: "openSUSE Leap 15.3", }, ], }, vulnerabilities: [ { cve: "CVE-2020-0543", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0543", }, ], notes: [ { category: "general", text: "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-0543", url: "https://www.suse.com/security/cve/CVE-2020-0543", }, { category: "external", summary: "SUSE Bug 1154824 for CVE-2020-0543", url: "https://bugzilla.suse.com/1154824", }, { category: "external", summary: "SUSE Bug 1172205 for CVE-2020-0543", url: "https://bugzilla.suse.com/1172205", }, { category: "external", summary: "SUSE Bug 1172206 for CVE-2020-0543", url: "https://bugzilla.suse.com/1172206", }, { category: "external", summary: "SUSE Bug 1172207 for CVE-2020-0543", url: "https://bugzilla.suse.com/1172207", }, { category: "external", summary: "SUSE Bug 1172770 for CVE-2020-0543", url: "https://bugzilla.suse.com/1172770", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2020-0543", url: "https://bugzilla.suse.com/1178658", }, { category: "external", summary: "SUSE Bug 1201877 for CVE-2020-0543", url: "https://bugzilla.suse.com/1201877", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-15T09:43:54Z", details: "moderate", }, ], title: "CVE-2020-0543", }, { cve: "CVE-2020-0548", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0548", }, ], notes: [ { category: "general", text: "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-0548", url: "https://www.suse.com/security/cve/CVE-2020-0548", }, { category: "external", summary: "SUSE Bug 1156353 for CVE-2020-0548", url: "https://bugzilla.suse.com/1156353", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 2.8, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-15T09:43:54Z", details: "moderate", }, ], title: "CVE-2020-0548", }, { cve: "CVE-2020-0549", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-0549", }, ], notes: [ { category: "general", text: "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-0549", url: "https://www.suse.com/security/cve/CVE-2020-0549", }, { category: "external", summary: "SUSE Bug 1156353 for CVE-2020-0549", url: "https://bugzilla.suse.com/1156353", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-15T09:43:54Z", details: "moderate", }, ], title: "CVE-2020-0549", }, { cve: "CVE-2020-12351", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12351", }, ], notes: [ { category: "general", text: "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-12351", url: "https://www.suse.com/security/cve/CVE-2020-12351", }, { category: "external", summary: "SUSE Bug 1177724 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177724", }, { category: "external", summary: "SUSE Bug 1177729 for CVE-2020-12351", url: "https://bugzilla.suse.com/1177729", }, { category: "external", summary: "SUSE Bug 1178397 for CVE-2020-12351", url: "https://bugzilla.suse.com/1178397", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-15T09:43:54Z", details: "important", }, ], title: "CVE-2020-12351", }, { cve: "CVE-2020-12352", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-12352", }, ], notes: [ { category: "general", text: "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-12352", url: "https://www.suse.com/security/cve/CVE-2020-12352", }, { category: "external", summary: "SUSE Bug 1177725 for CVE-2020-12352", url: "https://bugzilla.suse.com/1177725", }, { category: "external", summary: "SUSE Bug 1178398 for CVE-2020-12352", url: "https://bugzilla.suse.com/1178398", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 3.1, baseSeverity: "LOW", vectorString: "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-15T09:43:54Z", details: "moderate", }, ], title: "CVE-2020-12352", }, { cve: "CVE-2020-1472", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-1472", }, ], notes: [ { category: "general", text: "An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network.\nTo exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access.\nMicrosoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels.\nFor guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472 (updated September 28, 2020).\nWhen the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.\n", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-1472", url: "https://www.suse.com/security/cve/CVE-2020-1472", }, { category: "external", summary: "SUSE Bug 1176579 for CVE-2020-1472", url: "https://bugzilla.suse.com/1176579", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 9.8, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-15T09:43:54Z", details: "critical", }, ], title: "CVE-2020-1472", }, { cve: "CVE-2020-24490", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2020-24490", }, ], notes: [ { category: "general", text: "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, references: [ { category: "external", summary: "CVE-2020-24490", url: "https://www.suse.com/security/cve/CVE-2020-24490", }, { category: "external", summary: "SUSE Bug 1177726 for CVE-2020-24490", url: "https://bugzilla.suse.com/1177726", }, { category: "external", summary: "SUSE Bug 1177727 for CVE-2020-24490", url: "https://bugzilla.suse.com/1177727", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], scores: [ { cvss_v3: { baseScore: 8.8, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, products: [ "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch", "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch", "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch", ], }, ], threats: [ { category: "impact", date: "2022-12-15T09:43:54Z", details: "important", }, ], title: "CVE-2020-24490", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.