Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2022.6539 Feature update for SCA patterns 16 December 2022 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: SCA patterns Publisher: SUSE Operating System: SUSE Resolution: Patch/Upgrade CVE Names: CVE-2020-24490 CVE-2020-12352 CVE-2020-12351 CVE-2020-1472 CVE-2020-0549 CVE-2020-0548 CVE-2020-0543 Original Bulletin: https://www.suse.com/support/update/announcement/2022/suse-fu-20224496-1 Comment: CVSS (Max): 9.8 CVE-2020-1472 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) CVSS Source: SUSE Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H - --------------------------BEGIN INCLUDED TEXT-------------------- SUSE Feature Update: Feature update for SCA patterns ______________________________________________________________________________ Announcement ID: SUSE-FU-2022:4496-1 Rating: moderate References: #1045605 #1124793 #1131489 #1138452 #1144162 #1152800 #1154768 #1154824 #1155181 #1155990 #1156353 #1157778 #1158890 #1159356 #1159891 #1162119 #1163403 #1163508 #1164692 #1167689 #1175623 #1176021 #1176140 #1176375 #1176579 #1177369 #1177753 #1179170 #1180894 #1182194 #1182905 #1182917 #1183405 #1183464 #1184594 #1185357 #1185593 #1185594 #1185684 #1185758 #1185857 #1186034 #1186312 #1186316 #1186317 #1186420 #1186442 #1186792 #1187194 #1187508 #1187983 #1189394 #1189483 #1189889 #1190260 #1190460 #1191005 #1191199 #1193878 #1196730 #1196873 Affected Products: SUSE Enterprise Storage 7.1 SUSE Linux Enterprise High Performance Computing 15-SP3 SUSE Linux Enterprise Module for Server Applications 15-SP3 SUSE Linux Enterprise Server 15-SP3 SUSE Linux Enterprise Server for SAP Applications 15-SP3 SUSE Manager Proxy 4.2 SUSE Manager Retail Branch Server 4.2 SUSE Manager Server 4.2 openSUSE Leap 15.3 ______________________________________________________________________________ An update that solves 7 vulnerabilities, contains three features and has 54 fixes is now available. Description: This update for SCA patterns fixes the following issues: sca-patterns-base: o Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added Core.loadFullFile for sectionless parsing (bsc#1187194) * Added SUSE.getNetworkInterfaces (bsc#1144162) * Changed required dependencies from python to python3-base (bsc#1191199) * Fix SUSE.getFileSystems invalid index error (bsc#1185594) * Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593) * Removed Novell/OES references from libraries (bsc# 1186034) * Updated documentation for SUSE.compareKernel * Updated kernel version constants for all SUSE libraries (bsc#1189483) sca-patterns-hae: o Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added distribution and service pack subdirectories (bsc#1193878) * False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793) * HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689) * supportconfig indicates IPv6 required by HAE, is already enabled (bsc# 1045605) sca-patterns-suma: o Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) sca-server-report: o Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Changed absolute paths to relative ones (bsc#1186316) * Changed required dependencies from python to python3-base (bsc#1191199) * Ensure that the legacy SuSE-release file works (bsc#1196730) * Fix sca report header supportconfig file (bsc#1186442) * Fix the report file output path (bsc# 1180894) * Removed preprocessor elements for OES Filr eDir (bsc#1186420) sca-patterns-sle15: o Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added Video link to coredumpctl-000018634.py * Added video links to patterns (bsc #1190460): * bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl * Fixed crosstalk message strings (bsc#1186312) * Fixed field reference in sle15all/lvm-00003.pl * Fixed metadata tags in scc-registered.py * Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889) * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc# 1190260) * Requires Core library 1.3.3 which contains Core.logFullFile function * Updated registration link in bhc-scc-registered.py * Updated renewal link in bhc-scc-expired.py o New security announcement patterns: * Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 * Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 * Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0367-1 * Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1 SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1 SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1 SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1 * Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1 SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1 SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1 SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1 SUSE-SU-2021:2470-1 * Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1 SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1 SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1 SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1 SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1 SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1 * May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1 * May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1 SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1 SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1 SUSE-SU-2021:1455-1 o New regular patterns: * sle15sp3/oldlvm-000019878.py, sle15sp2/ oldlvm-000019878.py: Physical Volume is using an old PV header (bsc# 1179170) * sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable processors (bsc# 1185758) * sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest * sle15sp2/ rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed (bsc#1189394) * sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405) * sle15sp2/ mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIO_GETGEO failed with 25 (bsc#1182917) * sle15sp2/ ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684) * sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable processors (bsc# 1185758) * sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle15sp2/ fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle problems (bsc#1176140) * sle15sp1/ qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards (bsc#1155990) * sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness on host (bsc#1152800) * sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403) * sle15sp1 /nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc #1144162) * sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356) * sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation failure (bsc#1157778) * sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768) * sle15sp1/ ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS (bsc# 1131489) * sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1177753) * sle15sp0/ mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452) * sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0 * sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis * sle15all/vmcore-00001.pl: Identifies kernel core dumps for review * sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or directory (bsc#1185357) * sle15all/systemd-current-failed-7017137.py: Check for failed systemd services * sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck * sle15all/softlock-000018705.py: soft lockup messages about * sle15all/slapd-000019711.py: slapd.service not enabled/ failed after upgrade from SUSE Linux Enterprise 11 Service Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353) * sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition * sle15all/ sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464) * sle15all/ scc-registered.py: Check system registration status * sle15all/ scc-expired.py: Identify if SCC registrations have expired * sle15all/ scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181) * sle15all/scatool-000004685.py: scatool fails with traceback * sle15all/proxy-00003.pl: Checks for proxy environment variables * sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled * sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905) * sle15all/ nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375) * sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792) * sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170) * sle15all/ lvm-00005.pl: Duplicate volume groups are usually a configuration issue * sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for missing physical volumes. * sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives * sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508) * sle15all/ coredumpctl-000018634.py: How to obtain systemd service core dumps * sle15all/btrfsmaster-000018779.py: BTRFS Master TID * sle15all/ blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled * sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc# 1186317) * sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890) * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824) + sle15sp2/crosstalk_152-000019643.py + sle15sp1/crosstalk_151-000019643.py * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353) + sle15sp2/ ucodeintel_152-000019635.py + sle15sp1/ucodeintel_151-000019635.py + sle15sp0/ucodeintel_150-000019635.py o Renamed pattern files for filename standard * Renamed patterns/SLE/sle15all /scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py * Renamed /SLE/ sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py o Updated regular patterns: * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for missing physical volumes sca-patterns-sle12: o Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added Video link to coredumpctl-000018634.py * Added video links to patterns (bsc #1190460): + bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl * Fixed crosstalk message strings (bsc#1186312) * Fixed metadata tags for scc-registered.py * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260) * Requires Core library 1.3.3 which contains Core.logFullFile function * Updated registration link in bhc-scc-registered.py * Updated renewal link in bhc-scc-expired.py * Updated scc-registered.py pattern to fix registration detection o New security announcement patterns: * Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 * Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 * Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 * Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1 SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1 SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1 * Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1 SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1 SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 * May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1 SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1 SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1 SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1 * Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1 SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1 SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1 SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 * Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1 SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1 SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 o New regular patterns: * sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119) * sle12sp5/ tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc #1177369) * sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/ sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464) * sle12sp5/ qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5 * sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5 * sle12sp5/ permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5 * sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375) * sle12sp5/ nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405) * sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403) * sle12sp5/ nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc# 1144162) * sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623) * sle12sp5/ linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5 * sle12sp5/ kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5 * sle12sp5/ kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5 * sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/ kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/ intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable processors (bsc#1185758) * sle12sp5/ glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp5/ docore_125-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194) * sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/ cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508) * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508) * sle12sp5/ btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508) * sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119) * sle12sp4/ tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel 4.12.14-95.48-default may crash the system (bsc#1176579) * sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369) * sle12sp4/ systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS * sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464) * sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible * sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375) * sle12sp4/ nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403) * sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452) * sle12sp4/ linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS * sle12sp4/ kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS * sle12sp4/ kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS * sle12sp4/ kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS * sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194) * sle12sp4/ curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS * sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508) * sle12sp4/ btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508) * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508) * sle12sp3/ systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS * sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452) * sle12sp3/ linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS * sle12sp3/ kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/ kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/ kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/ kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/ kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc# 1164692) * sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp1/ systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/ Inclusion Vulnerability (bsc#1164692) * sle12sp0/ systemd-current-failed-7017137.py: Check for failed systemd services * sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0 * sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579) * sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck * sle12all/softlock-000018705.py: soft lockup messages about * sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition * sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316) * sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled * sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed * sle12all/lvm-volume-list-7016683.py: Fixed execution error * sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives * sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps * sle12all/btrfsmaster-000018779.py: BTRFS Master TID * sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891) * sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled * CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth + sle12sp5/ bleedingtooth_125-000019735.py + sle12sp4/bleedingtooth_124-000019735.py + sle12sp3/bleedingtooth_123-000019735.py + sle12sp2/ bleedingtooth_122-000019735.py * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353) + sle12sp5/ ucodeintel_125-000019635.py + sle12sp4/ucodeintel_124-000019635.py + sle12sp3/ucodeintel_123-000019635.py + sle12sp2/ucodeintel_122-000019635.py * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc# 1154824) + sle12sp5/crosstalk_125-000019643.py + sle12sp4/ crosstalk_124-000019643.py + sle12sp3/crosstalk_123-000019643.py + sle12sp2 /crosstalk_122-000019643.py o Updated patterns: * sle12all/scc-expired.py: Identify if SCC registrations have expired * sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for missing physical volumes * sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata * sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue o Renamed patterns for file standard: * Renamed patterns/SLE/sle12all/ scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py * Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/ bhc-scc-registered.py o Deleted regular patterns (1) * sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983) * sle12all/bhc-scc.sh: Pattern removed (bsc#1184594) * sle12all/pdc-00001.pl: Pattern removed OES Dependent * sle12all/pdc-00002.pl: Pattern removed OES Dependent * sle12all /lvm-00001.pl: Pattern removed * sle12all/lvm-00002.pl: Pattern removed sca-patterns-sle11: o Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Removed OES dependent patterns (bsc#1196873) o New security announcement patterns: * Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 * Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 * Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 * Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1 SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1 * Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1 SUSE-SU-2021:14761-1 * Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1 SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1 SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1 * May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1 SUSE-SU-2021:14714-1 * Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1 SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1 SUSE-SU-2021:14692-1 o New regular patterns: * sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/ Inclusion Vulnerability (bsc#1164692) * sle11all/softlock-000018705.py: soft lockup messages about * sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition * sle11all/ btrfsmaster-000018779.py: BTRFS Master TID * CVE-2020-0543: sle11sp4/ crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824) o Deleted regular patterns: * sle11all/bhc-scc.sh: Pattern removed (bsc# 1184594) Patch Instructions: To install this SUSE Feature Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: o openSUSE Leap 15.3: zypper in -t patch openSUSE-SLE-15.3-2022-4496=1 o SUSE Linux Enterprise Module for Server Applications 15-SP3: zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496=1 Package List: o openSUSE Leap 15.3 (noarch): sca-patterns-base-1.5.0-150300.10.3.1 sca-patterns-hae-1.5.1-150300.10.3.1 sca-patterns-sle11-1.5.1-150300.18.3.1 sca-patterns-sle12-1.5.1-150300.3.3.1 sca-patterns-sle15-1.5.1-150300.14.3.1 sca-patterns-suma-1.5.0-150300.9.3.1 sca-server-report-1.5.1-150300.11.3.1 o SUSE Linux Enterprise Module for Server Applications 15-SP3 (noarch): sca-patterns-base-1.5.0-150300.10.3.1 sca-patterns-hae-1.5.1-150300.10.3.1 sca-patterns-sle11-1.5.1-150300.18.3.1 sca-patterns-sle12-1.5.1-150300.3.3.1 sca-patterns-sle15-1.5.1-150300.14.3.1 sca-patterns-suma-1.5.0-150300.9.3.1 sca-server-report-1.5.1-150300.11.3.1 References: o https://www.suse.com/security/cve/CVE-2020-0543.html o https://www.suse.com/security/cve/CVE-2020-0548.html o https://www.suse.com/security/cve/CVE-2020-0549.html o https://www.suse.com/security/cve/CVE-2020-12351.html o https://www.suse.com/security/cve/CVE-2020-12352.html o https://www.suse.com/security/cve/CVE-2020-1472.html o https://www.suse.com/security/cve/CVE-2020-24490.html o https://bugzilla.suse.com/1045605 o https://bugzilla.suse.com/1124793 o https://bugzilla.suse.com/1131489 o https://bugzilla.suse.com/1138452 o https://bugzilla.suse.com/1144162 o https://bugzilla.suse.com/1152800 o https://bugzilla.suse.com/1154768 o https://bugzilla.suse.com/1154824 o https://bugzilla.suse.com/1155181 o https://bugzilla.suse.com/1155990 o https://bugzilla.suse.com/1156353 o https://bugzilla.suse.com/1157778 o https://bugzilla.suse.com/1158890 o https://bugzilla.suse.com/1159356 o https://bugzilla.suse.com/1159891 o https://bugzilla.suse.com/1162119 o https://bugzilla.suse.com/1163403 o https://bugzilla.suse.com/1163508 o https://bugzilla.suse.com/1164692 o https://bugzilla.suse.com/1167689 o https://bugzilla.suse.com/1175623 o https://bugzilla.suse.com/1176021 o https://bugzilla.suse.com/1176140 o https://bugzilla.suse.com/1176375 o https://bugzilla.suse.com/1176579 o https://bugzilla.suse.com/1177369 o https://bugzilla.suse.com/1177753 o https://bugzilla.suse.com/1179170 o https://bugzilla.suse.com/1180894 o https://bugzilla.suse.com/1182194 o https://bugzilla.suse.com/1182905 o https://bugzilla.suse.com/1182917 o https://bugzilla.suse.com/1183405 o https://bugzilla.suse.com/1183464 o https://bugzilla.suse.com/1184594 o https://bugzilla.suse.com/1185357 o https://bugzilla.suse.com/1185593 o https://bugzilla.suse.com/1185594 o https://bugzilla.suse.com/1185684 o https://bugzilla.suse.com/1185758 o https://bugzilla.suse.com/1185857 o https://bugzilla.suse.com/1186034 o https://bugzilla.suse.com/1186312 o https://bugzilla.suse.com/1186316 o https://bugzilla.suse.com/1186317 o https://bugzilla.suse.com/1186420 o https://bugzilla.suse.com/1186442 o https://bugzilla.suse.com/1186792 o https://bugzilla.suse.com/1187194 o https://bugzilla.suse.com/1187508 o https://bugzilla.suse.com/1187983 o https://bugzilla.suse.com/1189394 o https://bugzilla.suse.com/1189483 o https://bugzilla.suse.com/1189889 o https://bugzilla.suse.com/1190260 o https://bugzilla.suse.com/1190460 o https://bugzilla.suse.com/1191005 o https://bugzilla.suse.com/1191199 o https://bugzilla.suse.com/1193878 o https://bugzilla.suse.com/1196730 o https://bugzilla.suse.com/1196873 - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBY5u3/skNZI30y1K9AQjobxAAmnivvqXmeQxqUmM8nn3VW+/ARegDvkZe SqjftlVU5wgq7FB9DhspX2gBo0Fg6w8VYNLSYe/BvyE4fsNLcYH1xp82pttVMKwB kDS09C02n9PFgijHl5Hgpsz/UkDvh47SBauQ4f87HWJjjGGbttPdYIv+8wyqK0Mh fYPQka5jR8gyoA5xZXKP3nIEmAyxn0OZt4VEQALFezT4ER/HL+CZexxeDhTc1XeD NpT9p2NGGFvGyL+ufI6u7H6yTf2YIvZ7+mPnYL3SbyZ9hZNB0qPdQ1pmkbbm8nv1 ID21/0Dj5inGy6lBxXtQRLYAEQvKpwHemct7jhNcEzppINmr1cyT6YztC9kfHYVk reEWk3aGd4l6hp7w8r6zQ7SLQjrKie6eDqJbiTPMK0s2Wbgx7P37OGs7Kph5TkAX iEnaIpjEMkydE73mubUu/z+Z3Fp0vCnK8KH8tXc8HSzFLa7d/yjAimM4XwwQNPWf KTolmKE7zuWxgQxFmDeGKHkMI9zGvFVlXRttCyVNkupauv/12BpEV1lWS4Cvk1jD fhfHPYK8LTJjbvTA1AEFMXQfBoqT91Hm8acD1wV7JUj46PF01CTOmNm7NDLgEvtC An6R5tJTPQez0Cvn+b01DxODrOMaGk6k92kYzf9gB9jBrat/P9V/FtSWAlTJgaAX bqQOUVAYAFw= =cHbm -----END PGP SIGNATURE-----