SUSE-FU-2022:4496-1: moderate: Feature update for SCA patterns
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Thu Dec 15 17:21:50 UTC 2022
SUSE Feature Update: Feature update for SCA patterns
______________________________________________________________________________
Announcement ID: SUSE-FU-2022:4496-1
Rating: moderate
References: #1045605 #1124793 #1131489 #1138452 #1144162
#1152800 #1154768 #1154824 #1155181 #1155990
#1156353 #1157778 #1158890 #1159356 #1159891
#1162119 #1163403 #1163508 #1164692 #1167689
#1175623 #1176021 #1176140 #1176375 #1176579
#1177369 #1177753 #1179170 #1180894 #1182194
#1182905 #1182917 #1183405 #1183464 #1184594
#1185357 #1185593 #1185594 #1185684 #1185758
#1185857 #1186034 #1186312 #1186316 #1186317
#1186420 #1186442 #1186792 #1187194 #1187508
#1187983 #1189394 #1189483 #1189889 #1190260
#1190460 #1191005 #1191199 #1193878 #1196730
#1196873 SLE-21579 SLE-24335 SLE-25064
Affected Products:
SUSE Enterprise Storage 7.1
SUSE Linux Enterprise High Performance Computing 15-SP3
SUSE Linux Enterprise Module for Server Applications 15-SP3
SUSE Linux Enterprise Server 15-SP3
SUSE Linux Enterprise Server for SAP Applications 15-SP3
SUSE Manager Proxy 4.2
SUSE Manager Retail Branch Server 4.2
SUSE Manager Server 4.2
openSUSE Leap 15.3
______________________________________________________________________________
An update that solves 7 vulnerabilities, contains three
features and has 54 fixes is now available.
Description:
This update for SCA patterns fixes the following issues:
sca-patterns-base:
- Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Core.loadFullFile for sectionless parsing (bsc#1187194)
* Added SUSE.getNetworkInterfaces (bsc#1144162)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Fix SUSE.getFileSystems invalid index error (bsc#1185594)
* Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)
* Removed Novell/OES references from libraries (bsc#1186034)
* Updated documentation for SUSE.compareKernel
* Updated kernel version constants for all SUSE libraries (bsc#1189483)
sca-patterns-hae:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added distribution and service pack subdirectories (bsc#1193878)
* False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl
(bsc#1124793)
* HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)
* supportconfig indicates IPv6 required by HAE, is already enabled
(bsc#1045605)
sca-patterns-suma:
- Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool
to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
sca-server-report:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Changed absolute paths to relative ones (bsc#1186316)
* Changed required dependencies from python to python3-base (bsc#1191199)
* Ensure that the legacy SuSE-release file works (bsc#1196730)
* Fix sca report header supportconfig file (bsc#1186442)
* Fix the report file output path (bsc#1180894)
* Removed preprocessor elements for OES Filr eDir (bsc#1186420)
sca-patterns-sle15:
- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
* bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl,
bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed field reference in sle15all/lvm-00003.pl
* Fixed metadata tags in scc-registered.py
* Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
- New security announcement patterns:
* Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1
SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1
SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1
SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1
* Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1
SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1
SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1
SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1
SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1
SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1
SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1
SUSE-SU-2022:0929-1
* Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1
SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1
SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1
SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1
SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1
SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1
SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1
SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1
SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1
SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1
* Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1
SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1
SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1
SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1
SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1
SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1
SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1
SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1
SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1
SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1
SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1
SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1
SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1
SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1
SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1
SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1
SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1
SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1
SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1 SUSE-SU-2022:0141-1
SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1
SUSE-SU-2022:0198-1 SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1
SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1
SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1
SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0137-1
SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1
SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1
SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1
SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1
* Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1
SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1 SUSE-SU-2021:1863-2
SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1
SUSE-SU-2021:2459-1 SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1
SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1
SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1
SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1 SUSE-SU-2021:2470-1
* Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1
SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:1951-1
SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1
SUSE-SU-2021:1859-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1
SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1
SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1
SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:1826-1
SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1
SUSE-SU-2021:1999-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1
SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1
SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1
SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1 SUSE-SU-2021:1890-1
SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1
SUSE-SU-2021:1901-1 SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1
SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1
SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1
* May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1
SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1
SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1
SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1
SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1
SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1
SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1
SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1
SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1
SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1
SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1
SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1
SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1
SUSE-SU-2021:1573-1
* May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1
SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 SUSE-SU-2021:1409-1
SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1
SUSE-SU-2021:1430-1 SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1
SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1
SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1
SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1 SUSE-SU-2021:1006-1
SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1
SUSE-SU-2021:1179-1 SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1
SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1
SUSE-SU-2021:1455-1
- New regular patterns:
* sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical
Volume is using an old PV header (bsc#1179170)
* sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver
intel_pstate not loading on some Intel Xeon Scalable processors
(bsc#1185758)
* sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE
Linux Enterprise 15 Service Pack 3 KVM guest
* sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading
an RPM reports cpio chmod failed (bsc#1189394)
* sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing
NFS timeouts (bsc#1183405)
* sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane
memory based pmem devices returns HDIO_GETGEO failed with 25
(bsc#1182917)
* sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites
(bsc#1185684)
* sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver
intel_pstate not loading on some Intel Xeon Scalable processors
(bsc#1185758)
* sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails
to boot randomly due to wicked ordering cycle problems (bsc#1176140)
* sle15sp1/qlogic-000019630.py: System crashes when the system is
rebooted with SR-IOV enabled QLogic cards (bsc#1155990)
* sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to
KVM guest results in NMI and unresponsiveness
on host (bsc#1152800)
* sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large
files over NFS (bsc#1163403)
* sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount
over IPv6 (bsc#1144162)
* sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after
updating the kernel (bsc#1159356)
* sle15sp1/namespace-000019571.py: Activation of multiple namespaces
simultaneously may lead to an activation failure (bsc#1157778)
* sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being
accessed by user space (bsc#1154768)
* sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0
not found, device 0x1460 broken BIOS (bsc#1131489)
* sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a
process is restarted (bsc#1177753)
* sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes
option in multipath.conf (bsc#1138452)
* sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP
response 0
* sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis
* sle15all/vmcore-00001.pl: Identifies kernel core dumps for review
* sle15all/udevmac-000020260.py: systemd-udevd Could not generate
persistent MAC address for br0 No such file or directory (bsc#1185357)
* sle15all/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are
hung or stuck
* sle15all/softlock-000018705.py: soft lockup messages about
* sle15all/slapd-000019711.py: slapd.service not enabled/failed after
upgrade from SUSE Linux Enterprise 11 Service Pack 4 to SUSE Linux
Enterprise 15 (bsc#1156353)
* sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs
formatted root partition
* sle15all/sdagentconfig-000020301.py: SCA Appliance configuration
reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464)
* sle15all/scc-registered.py: Check system registration status
* sle15all/scc-expired.py: Identify if SCC registrations have expired
* sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs
with xz compression (bsc#1155181)
* sle15all/scatool-000004685.py: scatool fails with traceback
* sle15all/proxy-00003.pl: Checks for proxy environment variables
* sle15all/postfix-000020356.py: Postfix fails to start with IPv6
disabled
* sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated
due to OOM scenario (bsc#1182905)
* sle15all/nobarrier-000020240.py: XFS nobarrier option has been
completely deprecated starting from SUSE Linux Enterprise 15 Service
Pack 2 (bsc#1176375)
* sle15all/mysqlperf-000020354.py: mysqld segfault when the system is
under stress (bsc#1186792)
* sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to
Invalid and should be removed (bsc#1179170)
* sle15all/lvm-00005.pl: Duplicate volume groups are usually a
configuration issue
* sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM
metadata
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and
appear missing. This pattern looks for missing physical volumes.
* sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in
crontab file, can't install (bsc#1187508)
* sle15all/coredumpctl-000018634.py: How to obtain systemd service core
dumps
* sle15all/btrfsmaster-000018779.py: BTRFS Master TID
* sle15all/blacklist-000019607.py: System exit to emergency shell at
boot with multipath enabled
* sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)
* sle15all/acpid-000019708.py: acpid.service failed to start after
upgrade (bsc#1158890)
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk
(bsc#1154824)
+ sle15sp2/crosstalk_152-000019643.py
+ sle15sp1/crosstalk_151-000019643.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector
Register sampling (bsc#1156353)
+ sle15sp2/ucodeintel_152-000019635.py
+ sle15sp1/ucodeintel_151-000019635.py
+ sle15sp0/ucodeintel_150-000019635.py
- Renamed pattern files for filename standard
* Renamed patterns/SLE/sle15all/scc-expired.py to
patterns/SLE/sle15all/bhc-scc-expired.py
* Renamed /SLE/sle15all/scc-registered.py to
patterns/SLE/sle15all/bhc-scc-registered.py
- Updated regular patterns:
* sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and
appear missing. This pattern looks for missing physical volumes
sca-patterns-sle12:
- Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Added Video link to coredumpctl-000018634.py
* Added video links to patterns (bsc#1190460):
+ bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl,
bhc-memused-00001.pl
* Fixed crosstalk message strings (bsc#1186312)
* Fixed metadata tags for scc-registered.py
* Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
* Requires Core library 1.3.3 which contains Core.logFullFile function
* Updated registration link in bhc-scc-registered.py
* Updated renewal link in bhc-scc-expired.py
* Updated scc-registered.py pattern to fix registration detection
- New security announcement patterns:
* Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1
SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1
SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1
SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1
SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1
SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1
SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
* Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1
SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1
SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1
SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1
SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1
SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1
SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1
SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1
SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1
SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1
SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1
SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1
SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1
* Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1
SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1
SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1
SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1
SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1
SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1
SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1
SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1
SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1
SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1
SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1
SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1
SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1
SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1
SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1
SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1
SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
* Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1
SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1
SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1
SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1
SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1
SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1
SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1
SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1
SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1
SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1
SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1
SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1
SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1
SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1
SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1
SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1
SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1
SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1
SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1
SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1
SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1
SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1
SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1
SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1
SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1
SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1
SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1
SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1
SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1
SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1
SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1
SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1
SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1
SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1
SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1
SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0161-1
SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1
SUSE-SU-2022:0060-1 SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1
SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1
SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1
SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1 SUSE-SU-2022:0166-1
SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1
SUSE-SU-2022:0160-1 SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1
SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1
SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1
SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1
SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1
SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1
SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1
SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1
SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1
SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1
* Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1
SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1 SUSE-SU-2021:1906-1
SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1
SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1
SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1
SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1
SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1 SUSE-SU-2021:1887-1
SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1
SUSE-SU-2021:1822-1 SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1
SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1
SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1
SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1 SUSE-SU-2021:1842-1
SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1
SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1
SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1
SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1
SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2
SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1
SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1
SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1
SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1
SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1
SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1
SUSE-SU-2021:2042-1 SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1
SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1
SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1
SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1
* May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1
SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1 SUSE-SU-2021:1782-1
SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1
SUSE-SU-2021:1766-1 SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1
SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1
SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1 SUSE-SU-2021:1492-1
SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1
SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1
SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1
SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1
SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1
SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1
SUSE-SU-2021:1469-1
* Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1
SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1 SUSE-SU-2021:1242-1
SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1
SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1
SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1
SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1
SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1
SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1
SUSE-SU-2021:1315-1 SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1
SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1
SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1
SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1165-1
SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1
SUSE-SU-2021:1187-1 SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1
SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1
SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1
SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1075-1
SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1
SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1
SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1
SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1
SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1
SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1
SUSE-SU-2021:1189-1
* Mar 2021 New Security Announcement Patterns (79) for
SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1 SUSE-SU-2021:0929-1
SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1
SUSE-SU-2021:0794-1 SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1
SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1
SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1
SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1
SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1
SUSE-SU-2021:0739-1 SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1
SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1
SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1
SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2
SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1
SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1
SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1
SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1
SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0794-1
SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1
SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1
SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1
SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1
SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1
SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1
SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1
SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1
SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1
SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1 SUSE-SU-2021:0801-1
SUSE-SU-2021:0756-1
- New regular patterns:
* sle12sp5/vmtools-000004682.py: Extensive logging in
vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be
corrupted (bsc#1177369)
* sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration
reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464)
* sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 Service Pack 5
* sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for
SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for
SUSE Linux Enterprise 12 Service Pack 5
* sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been
completely deprecated starting from SUSE Linux Enterprise 15 Service
Pack 2 (bsc#1176375)
* sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing
NFS timeouts (bsc#1183405)
* sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large
files over NFS (bsc#1163403)
* sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount
over IPv6 (bsc#1144162)
* sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 -
Assertion failed (bsc#1175623)
* sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for
SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for
SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for
SUSE Linux Kernel Live Patch 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver
intel_pstate not loading on some Intel Xeon Scalable processors
(bsc#1185758)
* sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a
process is restarted (bsc#1182194)
* sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE
Linux Enterprise 12 SP5
* sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in
crontab file, can't install (bsc#1187508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS
maintenance task (bsc#1163508)
* sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS
maintenance task (bsc#1163508)
* sle12sp4/vmtools-000004682.py: Extensive logging in
vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
* sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux
Enterprise 12 Service Pack 4 System with Kernel 4.12.14-95.48-default
may crash the system (bsc#1176579)
* sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be
corrupted (bsc#1177369)
* sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration
reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464)
* sle12sp4/plymouth-000019595.py: plymouth hang - login to console not
possible
* sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been
completely deprecated starting from SUSE Linux Enterprise 15 Service
Pack 2 (bsc#1176375)
* sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large
files over NFS (bsc#1163403)
* sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes
option in multipath.conf (bsc#1138452)
* sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP4 LTSS
* sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a
process is restarted (bsc#1182194)
* sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP4 LTSS
* sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in
crontab file, can't install (bsc#1187508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS
maintenance task (bsc#1163508)
* sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS
maintenance task (bsc#1163508)
* sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes
option in multipath.conf (bsc#1138452)
* sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for
SUSE Linux Enterprise 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes
for SUSE Linux Kernel Live Patch 12 SP3 LTSS
* sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd
services
* sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP
response 0
* sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472
(bsc#1176579)
* sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are
hung or stuck
* sle12all/softlock-000018705.py: soft lockup messages about
* sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs
formatted root partition
* sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs
with xz compression (bsc#1186316)
* sle12all/postfix-000020356.py: Postfix fails to start with IPv6
disabled
* sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to
Invalid and should be removed
* sle12all/lvm-volume-list-7016683.py: Fixed execution error
* sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
* sle12all/coredumpctl-000018634.py: How to obtain systemd service core
dumps
* sle12all/btrfsmaster-000018779.py: BTRFS Master TID
* sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are
not working anymore (bsc#1159891)
* sle12all/blacklist-000019607.py: System exit to emergency shell at
boot with multipath enabled
* CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth
+ sle12sp5/bleedingtooth_125-000019735.py
+ sle12sp4/bleedingtooth_124-000019735.py
+ sle12sp3/bleedingtooth_123-000019735.py
+ sle12sp2/bleedingtooth_122-000019735.py
* CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector
Register sampling (bsc#1156353)
+ sle12sp5/ucodeintel_125-000019635.py
+ sle12sp4/ucodeintel_124-000019635.py
+ sle12sp3/ucodeintel_123-000019635.py
+ sle12sp2/ucodeintel_122-000019635.py
* CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk
(bsc#1154824)
+ sle12sp5/crosstalk_125-000019643.py
+ sle12sp4/crosstalk_124-000019643.py
+ sle12sp3/crosstalk_123-000019643.py
+ sle12sp2/crosstalk_122-000019643.py
- Updated patterns:
* sle12all/scc-expired.py: Identify if SCC registrations have expired
* sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and
appear missing. This pattern looks for missing physical volumes
* sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM
metadata
* sle12all/lvm-00005.pl: Duplicate volume groups are usually a
configuration issue
- Renamed patterns for file standard:
* Renamed patterns/SLE/sle12all/scc-expired.py to
patterns/SLE/sle12all/bhc-scc-expired.py
* Renamed patterns/SLE/sle12all/scc-registered.py to
patterns/SLE/sle12all/bhc-scc-registered.py
- Deleted regular patterns (1)
* sle12all/systemd-current-failed-7017137.py: Moved to service packs
with fixes (bsc#1187983)
* sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)
* sle12all/pdc-00001.pl: Pattern removed OES Dependent
* sle12all/pdc-00002.pl: Pattern removed OES Dependent
* sle12all/lvm-00001.pl: Pattern removed
* sle12all/lvm-00002.pl: Pattern removed
sca-patterns-sle11:
- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA
Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
* Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
* Removed OES dependent patterns (bsc#1196873)
- New security announcement patterns:
* Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1
SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1
* Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1
SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1
SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1
SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1
SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1
SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
* Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1
SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1
SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1
SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1
SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1
SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1
SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1
SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1
SUSE-SU-2022:14894-1
* Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1
SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1
SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1
SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1
SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1
SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1
SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1
SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1
SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1
SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1
SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1
SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1
* Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1
SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1 SUSE-SU-2021:14761-1
* Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1
SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1 SUSE-SU-2021:14743-1
SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1
SUSE-SU-2021:14740-1 SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1
SUSE-SU-2021:14749-1
* May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1
SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1 SUSE-SU-2021:14714-1
* Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1
SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1 SUSE-SU-2021:14700-1
SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1
SUSE-SU-2021:14712-1 SUSE-SU-2021:14692-1
- New regular patterns:
* sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File
Read/Inclusion Vulnerability (bsc#1164692)
* sle11all/softlock-000018705.py: soft lockup messages about
* sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs
formatted root partition
* sle11all/btrfsmaster-000018779.py: BTRFS Master TID
* CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register
Buffer Data Sampling aka CrossTalk (bsc#1154824)
- Deleted regular patterns:
* sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)
Patch Instructions:
To install this SUSE Feature Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- openSUSE Leap 15.3:
zypper in -t patch openSUSE-SLE-15.3-2022-4496=1
- SUSE Linux Enterprise Module for Server Applications 15-SP3:
zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496=1
Package List:
- openSUSE Leap 15.3 (noarch):
sca-patterns-base-1.5.0-150300.10.3.1
sca-patterns-hae-1.5.1-150300.10.3.1
sca-patterns-sle11-1.5.1-150300.18.3.1
sca-patterns-sle12-1.5.1-150300.3.3.1
sca-patterns-sle15-1.5.1-150300.14.3.1
sca-patterns-suma-1.5.0-150300.9.3.1
sca-server-report-1.5.1-150300.11.3.1
- SUSE Linux Enterprise Module for Server Applications 15-SP3 (noarch):
sca-patterns-base-1.5.0-150300.10.3.1
sca-patterns-hae-1.5.1-150300.10.3.1
sca-patterns-sle11-1.5.1-150300.18.3.1
sca-patterns-sle12-1.5.1-150300.3.3.1
sca-patterns-sle15-1.5.1-150300.14.3.1
sca-patterns-suma-1.5.0-150300.9.3.1
sca-server-report-1.5.1-150300.11.3.1
References:
https://www.suse.com/security/cve/CVE-2020-0543.html
https://www.suse.com/security/cve/CVE-2020-0548.html
https://www.suse.com/security/cve/CVE-2020-0549.html
https://www.suse.com/security/cve/CVE-2020-12351.html
https://www.suse.com/security/cve/CVE-2020-12352.html
https://www.suse.com/security/cve/CVE-2020-1472.html
https://www.suse.com/security/cve/CVE-2020-24490.html
https://bugzilla.suse.com/1045605
https://bugzilla.suse.com/1124793
https://bugzilla.suse.com/1131489
https://bugzilla.suse.com/1138452
https://bugzilla.suse.com/1144162
https://bugzilla.suse.com/1152800
https://bugzilla.suse.com/1154768
https://bugzilla.suse.com/1154824
https://bugzilla.suse.com/1155181
https://bugzilla.suse.com/1155990
https://bugzilla.suse.com/1156353
https://bugzilla.suse.com/1157778
https://bugzilla.suse.com/1158890
https://bugzilla.suse.com/1159356
https://bugzilla.suse.com/1159891
https://bugzilla.suse.com/1162119
https://bugzilla.suse.com/1163403
https://bugzilla.suse.com/1163508
https://bugzilla.suse.com/1164692
https://bugzilla.suse.com/1167689
https://bugzilla.suse.com/1175623
https://bugzilla.suse.com/1176021
https://bugzilla.suse.com/1176140
https://bugzilla.suse.com/1176375
https://bugzilla.suse.com/1176579
https://bugzilla.suse.com/1177369
https://bugzilla.suse.com/1177753
https://bugzilla.suse.com/1179170
https://bugzilla.suse.com/1180894
https://bugzilla.suse.com/1182194
https://bugzilla.suse.com/1182905
https://bugzilla.suse.com/1182917
https://bugzilla.suse.com/1183405
https://bugzilla.suse.com/1183464
https://bugzilla.suse.com/1184594
https://bugzilla.suse.com/1185357
https://bugzilla.suse.com/1185593
https://bugzilla.suse.com/1185594
https://bugzilla.suse.com/1185684
https://bugzilla.suse.com/1185758
https://bugzilla.suse.com/1185857
https://bugzilla.suse.com/1186034
https://bugzilla.suse.com/1186312
https://bugzilla.suse.com/1186316
https://bugzilla.suse.com/1186317
https://bugzilla.suse.com/1186420
https://bugzilla.suse.com/1186442
https://bugzilla.suse.com/1186792
https://bugzilla.suse.com/1187194
https://bugzilla.suse.com/1187508
https://bugzilla.suse.com/1187983
https://bugzilla.suse.com/1189394
https://bugzilla.suse.com/1189483
https://bugzilla.suse.com/1189889
https://bugzilla.suse.com/1190260
https://bugzilla.suse.com/1190460
https://bugzilla.suse.com/1191005
https://bugzilla.suse.com/1191199
https://bugzilla.suse.com/1193878
https://bugzilla.suse.com/1196730
https://bugzilla.suse.com/1196873
More information about the sle-updates
mailing list