Operating System:

[SUSE]

Published:

16 December 2022

Protect yourself against future threats.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2022.6539
                      Feature update for SCA patterns
                             16 December 2022

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           SCA patterns
Publisher:         SUSE
Operating System:  SUSE
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-24490 CVE-2020-12352 CVE-2020-12351
                   CVE-2020-1472 CVE-2020-0549 CVE-2020-0548
                   CVE-2020-0543  

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2022/suse-fu-20224496-1

Comment: CVSS (Max):  9.8 CVE-2020-1472 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: SUSE
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Feature Update: Feature update for SCA patterns

______________________________________________________________________________

Announcement ID:   SUSE-FU-2022:4496-1
Rating:            moderate
References:        #1045605 #1124793 #1131489 #1138452 #1144162 #1152800
                   #1154768 #1154824 #1155181 #1155990 #1156353 #1157778
                   #1158890 #1159356 #1159891 #1162119 #1163403 #1163508
                   #1164692 #1167689 #1175623 #1176021 #1176140 #1176375
                   #1176579 #1177369 #1177753 #1179170 #1180894 #1182194
                   #1182905 #1182917 #1183405 #1183464 #1184594 #1185357
                   #1185593 #1185594 #1185684 #1185758 #1185857 #1186034
                   #1186312 #1186316 #1186317 #1186420 #1186442 #1186792
                   #1187194 #1187508 #1187983 #1189394 #1189483 #1189889
                   #1190260 #1190460 #1191005 #1191199 #1193878 #1196730
                   #1196873
Affected Products:
                   SUSE Enterprise Storage 7.1
                   SUSE Linux Enterprise High Performance Computing 15-SP3
                   SUSE Linux Enterprise Module for Server Applications 15-SP3
                   SUSE Linux Enterprise Server 15-SP3
                   SUSE Linux Enterprise Server for SAP Applications 15-SP3
                   SUSE Manager Proxy 4.2
                   SUSE Manager Retail Branch Server 4.2
                   SUSE Manager Server 4.2
                   openSUSE Leap 15.3
______________________________________________________________________________

An update that solves 7 vulnerabilities, contains three features and has 54
fixes is now available.

Description:

This update for SCA patterns fixes the following issues:
sca-patterns-base:

  o Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool
    to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added
    Core.loadFullFile for sectionless parsing (bsc#1187194) * Added
    SUSE.getNetworkInterfaces (bsc#1144162) * Changed required dependencies
    from python to python3-base (bsc#1191199) * Fix SUSE.getFileSystems invalid
    index error (bsc#1185594) * Fix SUSE.getFileSystems unbound local SWAP
    variable (bsc#1185593) * Removed Novell/OES references from libraries (bsc#
    1186034) * Updated documentation for SUSE.compareKernel * Updated kernel
    version constants for all SUSE libraries (bsc#1189483)


sca-patterns-hae:

  o Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool
    to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added
    distribution and service pack subdirectories (bsc#1193878) * False positive
    hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793) * HAE
    Policies Quorum 2 node cluster requires ignore policy (bsc#1167689) *
    supportconfig indicates IPv6 required by HAE, is already enabled (bsc#
    1045605)


sca-patterns-suma:

  o Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to
    Python3 (jsc#SLE-25064, jsc#SLE-24335):
    * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)


sca-server-report:

  o Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool
    to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) *
    Changed absolute paths to relative ones (bsc#1186316) * Changed required
    dependencies from python to python3-base (bsc#1191199) * Ensure that the
    legacy SuSE-release file works (bsc#1196730) * Fix sca report header
    supportconfig file (bsc#1186442) * Fix the report file output path (bsc#
    1180894) * Removed preprocessor elements for OES Filr eDir (bsc#1186420)


sca-patterns-sle15:

  o Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool
    to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added
    Video link to coredumpctl-000018634.py * Added video links to patterns (bsc
    #1190460):
    * bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl,
    bhc-memused-00001.pl * Fixed crosstalk message strings (bsc#1186312) *
    Fixed field reference in sle15all/lvm-00003.pl * Fixed metadata tags in
    scc-registered.py * Fixed percent used calculation for bhc-memused-00001.pl
    (bsc#1189889) * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#
    1190260) * Requires Core library 1.3.3 which contains Core.logFullFile
    function * Updated registration link in bhc-scc-registered.py * Updated
    renewal link in bhc-scc-expired.py
  o New security announcement patterns: * Apr 2022 (13) for SUSE-SU-2022:1293-1
    SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1
    SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1
    SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1
    SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 * Mar 2022 (48)
    for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1
    SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1
    SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
    SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1
    SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1
    SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1
    SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1
    SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
    SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1
    SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1
    SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1
    SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1
    SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
    SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1
    SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1
    SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 * Feb 2022 (60)
    for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1
    SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1
    SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
    SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1
    SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1
    SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1
    SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1
    SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
    SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1
    SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1
    SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1
    SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1
    SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
    SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1
    SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1
    SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1
    SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1
    SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1
    SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1
    SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0367-1 * Jan 2022 (92)
    for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1
    SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1
    SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1
    SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1
    SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1
    SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1
    SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1
    SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1
    SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1
    SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1
    SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1
    SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1
    SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1
    SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1
    SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1
    SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1
    SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1
    SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1
    SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1
    SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0367-1
    SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1
    SUSE-SU-2022:0134-1 SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1
    SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1
    SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1
    SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1 SUSE-SU-2022:0091-1
    SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1
    SUSE-SU-2022:0050-1 SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1
    SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1
    SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1
    SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1
    SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1 * Jul 2021 (20) for
    SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1
    SUSE-SU-2021:2352-1 SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1
    SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1
    SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1
    SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1 SUSE-SU-2021:2438-1
    SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1
    SUSE-SU-2021:2421-1 SUSE-SU-2021:2470-1 * Jun 2021 (46) for
    SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1
    SUSE-SU-2021:2106-1 SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1
    SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1
    SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1
    SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1 SUSE-SU-2021:2184-1
    SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1
    SUSE-SU-2021:1834-1 SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1
    SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1
    SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1
    SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1 SUSE-SU-2021:1970-1
    SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1
    SUSE-SU-2021:1958-1 SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1
    SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1
    SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1
    SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1 SUSE-SU-2021:2211-1
    SUSE-SU-2021:1845-1 * May 2021 (39) for SUSE-SU-2021:1557-1
    SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1
    SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1
    SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1
    SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1
    SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1
    SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1
    SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1
    SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1
    SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1
    SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1
    SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1
    SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1
    SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1 * May 2021 (30) for
    SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1
    SUSE-SU-2021:1408-1 SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1
    SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1
    SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1
    SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1
    SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1
    SUSE-SU-2021:1409-1 SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1
    SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1
    SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1
    SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1 SUSE-SU-2021:1455-1
  o New regular patterns: * sle15sp3/oldlvm-000019878.py, sle15sp2/
    oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#
    1179170) * sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver
    intel_pstate not loading on some Intel Xeon Scalable processors (bsc#
    1185758) * sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on
    SUSE Linux Enterprise 15 Service Pack 3 KVM guest * sle15sp2/
    rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports
    cpio chmod failed (bsc#1189394) * sle15sp2/nfstimeout_152-000019943.py:
    Delayed outgoing packets causing NFS timeouts (bsc#1183405) * sle15sp2/
    mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem
    devices returns HDIO_GETGEO failed with 25 (bsc#1182917) * sle15sp2/
    ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684) *
    sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver
    intel_pstate not loading on some Intel Xeon Scalable processors (bsc#
    1185758) * sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP
    File Read/Inclusion Vulnerability (bsc#1164692) * sle15sp2/
    fcoe-000019889.py: System with FCoE connected devices fails to boot
    randomly due to wicked ordering cycle problems (bsc#1176140) * sle15sp1/
    qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV
    enabled QLogic cards (bsc#1155990) * sle15sp1/passthrough-000019579.py:
    Passthrough of Raid Controller to KVM guest results in NMI and
    unresponsiveness on host (bsc#1152800) * sle15sp1/nfsperf-151-000019615.py:
    Performance loss when writing large files over NFS (bsc#1163403) * sle15sp1
    /nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc
    #1144162) * sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages
    after updating the kernel (bsc#1159356) * sle15sp1/namespace-000019571.py:
    Activation of multiple namespaces simultaneously may lead to an activation
    failure (bsc#1157778) * sle15sp1/ipmi-000019602.py: IPMI driver can be
    unloaded when being accessed by user space (bsc#1154768) * sle15sp1/
    ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion
    Vulnerability (bsc#1164692) * sle15sp1/edac-000019537.py: A kernel message
    shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS (bsc#
    1131489) * sle15sp1/docore_151-000019881.py: System crash in do_coredump()
    when a process is restarted (bsc#1177753) * sle15sp0/
    mpiofindpaths-000019511.py: Using the find_multipaths yes option in
    multipath.conf (bsc#1138452) * sle15sp0/ghostcat_150-000019606.py: Ghostcat
    - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) *
    sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP
    response 0 * sle15all/vmcore-00002.pl: Detects the need for a kernel core
    analysis * sle15all/vmcore-00001.pl: Identifies kernel core dumps for
    review * sle15all/udevmac-000020260.py: systemd-udevd Could not generate
    persistent MAC address for br0 No such file or directory (bsc#1185357) *
    sle15all/systemd-current-failed-7017137.py: Check for failed systemd
    services * sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs
    that are hung or stuck * sle15all/softlock-000018705.py: soft lockup
    messages about * sle15all/slapd-000019711.py: slapd.service not enabled/
    failed after upgrade from SUSE Linux Enterprise 11 Service Pack 4 to SUSE
    Linux Enterprise 15 (bsc#1156353) * sle15all/sizingbtrfs-000018798.py: How
    to resize/extend a btrfs formatted root partition * sle15all/
    sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002
    HY000 Cannot connect to MySQL server (bsc#1183464) * sle15all/
    scc-registered.py: Check system registration status * sle15all/
    scc-expired.py: Identify if SCC registrations have expired * sle15all/
    scatool-000020253.py: scatool fails to analyze supportconfigs with xz
    compression (bsc#1155181) * sle15all/scatool-000004685.py: scatool fails
    with traceback * sle15all/proxy-00003.pl: Checks for proxy environment
    variables * sle15all/postfix-000020356.py: Postfix fails to start with IPv6
    disabled * sle15all/oomvsftpd-000020252.py: vsftpd and other processes
    terminated due to OOM scenario (bsc#1182905) * sle15all/
    nobarrier-000020240.py: XFS nobarrier option has been completely deprecated
    starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375) *
    sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under
    stress (bsc#1186792) * sle15all/lvmsnapshot-000019858.py: LVM snapshot
    changed state to Invalid and should be removed (bsc#1179170) * sle15all/
    lvm-00005.pl: Duplicate volume groups are usually a configuration issue *
    sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM
    metadata * sle15all/lvm-00003.pl: Physical volumes can be removed or
    damaged and appear missing. This pattern looks for missing physical
    volumes. * sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI
    drives * sle15all/cronlimit-000020338.py: crontab - More than 1000 entries
    in crontab file, can't install (bsc#1187508) * sle15all/
    coredumpctl-000018634.py: How to obtain systemd service core dumps *
    sle15all/btrfsmaster-000018779.py: BTRFS Master TID * sle15all/
    blacklist-000019607.py: System exit to emergency shell at boot with
    multipath enabled * sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#
    1186317) * sle15all/acpid-000019708.py: acpid.service failed to start after
    upgrade (bsc#1158890) * CVE-2020-0543: Special Register Buffer Data
    Sampling aka CrossTalk (bsc#1154824) + sle15sp2/crosstalk_152-000019643.py
    + sle15sp1/crosstalk_151-000019643.py * CVE-2020-0548, CVE-2020-0549: L1D
    data cache eviction and Vector Register sampling (bsc#1156353) + sle15sp2/
    ucodeintel_152-000019635.py + sle15sp1/ucodeintel_151-000019635.py +
    sle15sp0/ucodeintel_150-000019635.py
  o Renamed pattern files for filename standard * Renamed patterns/SLE/sle15all
    /scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py * Renamed /SLE/
    sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py
  o Updated regular patterns: * sle15all/lvm-00003.pl: Physical volumes can be
    removed or damaged and appear missing. This pattern looks for missing
    physical volumes


sca-patterns-sle12:

  o Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool
    to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added
    Video link to coredumpctl-000018634.py * Added video links to patterns (bsc
    #1190460):
    + bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl,
    bhc-memused-00001.pl * Fixed crosstalk message strings (bsc#1186312) *
    Fixed metadata tags for scc-registered.py * Removed outdated TID2 link in
    bhc-diskused-00001.pl (bsc#1190260) * Requires Core library 1.3.3 which
    contains Core.logFullFile function * Updated registration link in
    bhc-scc-registered.py * Updated renewal link in bhc-scc-expired.py *
    Updated scc-registered.py pattern to fix registration detection
  o New security announcement patterns: * Apr 2022 (53) for SUSE-SU-2022:1254-1
    SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
    SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1
    SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
    SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1
    SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1
    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
    SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1
    SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1
    SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
    SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1
    SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
    SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1
    SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
    SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1
    SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
    SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1
    SUSE-SU-2022:1428-1 * Mar 2022 (127) for SUSE-SU-2022:1254-1
    SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
    SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1
    SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
    SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1
    SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1
    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
    SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1
    SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1
    SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
    SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1
    SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
    SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1
    SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
    SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1
    SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
    SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1
    SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1
    SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1
    SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1
    SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
    SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1
    SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
    SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1
    SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1
    SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
    SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1
    SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1
    SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1
    SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1
    SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
    SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1
    SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
    SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1
    SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1
    SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
    SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
    SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1
    SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1
    SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1
    SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
    SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 * Feb 2022
    (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1
    SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1
    SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
    SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1
    SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1
    SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1
    SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1
    SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1
    SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1
    SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1
    SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1
    SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1
    SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1
    SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1
    SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1
    SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1
    SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1
    SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1
    SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1
    SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1
    SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1
    SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1
    SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
    SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1
    SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1
    SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
    SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1
    SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1
    SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1
    SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
    SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1
    SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1
    SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
    SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1
    SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1
    SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
    SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1
    SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1
    SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1
    SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1
    SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1
    SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1
    SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1
    SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1
    SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0323-1
    SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1
    SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1
    SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1
    SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1
    SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0271-1
    SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1
    SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1
    SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1
    SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1
    SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1 SUSE-SU-2022:0271-1
    SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1
    SUSE-SU-2022:0358-1 * Jan 2022 (218) for SUSE-SU-2022:1254-1
    SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1
    SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1
    SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1
    SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1
    SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1
    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
    SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1
    SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1
    SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
    SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1
    SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1
    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1
    SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1
    SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1
    SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1
    SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1
    SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1
    SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1
    SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1
    SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1
    SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1
    SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1
    SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1
    SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1
    SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1
    SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
    SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1
    SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1
    SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1
    SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1
    SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
    SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1
    SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1
    SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1
    SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1
    SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1
    SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1
    SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1
    SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1
    SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1
    SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1
    SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1
    SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1
    SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1
    SUSE-SU-2022:0505-1 SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1
    SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1
    SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1
    SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1
    SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1
    SUSE-SU-2022:0441-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1
    SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1
    SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1
    SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1
    SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1
    SUSE-SU-2022:0325-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1
    SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
    SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1
    SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1 SUSE-SU-2022:0118-1
    SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1
    SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1
    SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1
    SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1
    SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1 SUSE-SU-2022:0145-1
    SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1
    SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1
    SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1
    SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1
    SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1
    SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1
    SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1
    SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1
    SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1
    SUSE-SU-2022:0145-1 * Jun 2021 (80) for SUSE-SU-2021:2014-1
    SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1
    SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1
    SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1
    SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1
    SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1
    SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1
    SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1
    SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:2137-1
    SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1
    SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1
    SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1
    SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1
    SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1
    SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1
    SUSE-SU-2021:1891-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1
    SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1
    SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1
    SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1
    SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1
    SUSE-SU-2021:1842-1 SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1
    SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1
    SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1
    SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1 SUSE-SU-2021:2026-1
    SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1
    SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1
    SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1
    SUSE-SU-2021:2006-1 * May 2021 (39) for SUSE-SU-2021:1580-1
    SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1
    SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1
    SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1 SUSE-SU-2021:1595-1
    SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1
    SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1
    SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1
    SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1
    SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
    SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1
    SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1
    SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1
    SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1
    SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1 * Apr 2021 (69) for
    SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1
    SUSE-SU-2021:1438-1 SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1
    SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1
    SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1
    SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1 SUSE-SU-2021:1435-1
    SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1
    SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1
    SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1
    SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1
    SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1 SUSE-SU-2021:1401-1
    SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1
    SUSE-SU-2021:1435-1 SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1
    SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1
    SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1
    SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1
    SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1
    SUSE-SU-2021:1152-1 SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1
    SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1
    SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1
    SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1 SUSE-SU-2021:1439-1
    SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1
    SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1
    SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 * Mar 2021 New
    Security Announcement Patterns (79) for SUSE-SU-2021:0990-1
    SUSE-SU-2021:0720-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1
    SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1
    SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1
    SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1
    SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1
    SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1
    SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1
    SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1
    SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1 SUSE-SU-2021:0745-1
    SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1
    SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1
    SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1
    SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1
    SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1 SUSE-SU-2021:0681-1
    SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1
    SUSE-SU-2021:0929-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1
    SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1
    SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1
    SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0743-1
    SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1
    SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1
    SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2
    SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1
    SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1
    SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1
    SUSE-SU-2021:0679-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1
  o New regular patterns: * sle12sp5/vmtools-000004682.py: Extensive logging in
    vmware-vmsvc-root.log with open-vm-tools (bsc#1162119) * sle12sp5/
    tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc
    #1177369) * sle12sp5/systemd-current-failed-7017137.py: Check for failed
    systemd services * sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security
    fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/
    sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002
    HY000 Cannot connect to MySQL server (bsc#1183464) * sle12sp5/
    qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise
    12 Service Pack 5 * sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py:
    Security fixes for SUSE Linux Enterprise 12 Service Pack 5 * sle12sp5/
    permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux
    Enterprise 12 Service Pack 5 * sle12sp5/nobarrier-000020240.py: XFS
    nobarrier option has been completely deprecated starting from SUSE Linux
    Enterprise 15 Service Pack 2 (bsc#1176375) * sle12sp5/
    nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts
    (bsc#1183405) * sle12sp5/nfsperf-125-000019615.py: Performance loss when
    writing large files over NFS (bsc#1163403) * sle12sp5/
    nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#
    1144162) * sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 -
    Assertion failed (bsc#1175623) * sle12sp5/
    linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux
    Enterprise 12 SP5 * sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py:
    Security fixes for SUSE Linux Kernel Live Patch 12 SP5 * sle12sp5/
    kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux
    Kernel Live Patch 12 SP5 * sle12sp5/
    kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux
    Kernel Live Patch 12 SP5 * sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py:
    Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/
    kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux
    Enterprise 12 SP5 * sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security
    fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/
    intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not
    loading on some Intel Xeon Scalable processors (bsc#1185758) * sle12sp5/
    glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise
    12 SP5 * sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP
    File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp5/
    docore_125-000019881.py: System crash in do_coredump() when a process is
    restarted (bsc#1182194) * sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py:
    Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/
    cronlimit-000020338.py: crontab - More than 1000 entries in crontab file,
    can't install (bsc#1187508) * sle12sp5/btrfscrash-125-000019638.py: System
    crash during a BTRFS maintenance task (bsc#1163508) * sle12sp5/
    btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task
    (bsc#1163508) * sle12sp4/vmtools-000004682.py: Extensive logging in
    vmware-vmsvc-root.log with open-vm-tools (bsc#1162119) * sle12sp4/
    tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12
    Service Pack 4 System with Kernel 4.12.14-95.48-default may crash the
    system (bsc#1176579) * sle12sp4/tailf-000019885.py: Aborting tailf causes
    bash session to be corrupted (bsc#1177369) * sle12sp4/
    systemd-current-failed-7017137.py: Check for failed systemd services *
    sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE
    Linux Enterprise 12 SP4 LTSS * sle12sp4/sdagentconfig-000020301.py: SCA
    Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL
    server (bsc#1183464) * sle12sp4/plymouth-000019595.py: plymouth hang -
    login to console not possible * sle12sp4/nobarrier-000020240.py: XFS
    nobarrier option has been completely deprecated starting from SUSE Linux
    Enterprise 15 Service Pack 2 (bsc#1176375) * sle12sp4/
    nfsperf-124-000019615.py: Performance loss when writing large files over
    NFS (bsc#1163403) * sle12sp4/mpiofindpaths-000019511.py: Using the
    find_multipaths yes option in multipath.conf (bsc#1138452) * sle12sp4/
    linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux
    Enterprise 12 SP4 LTSS * sle12sp4/
    kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE
    Linux Kernel Live Patch 12 SP4 LTSS * sle12sp4/
    kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE
    Linux Kernel Live Patch 12 SP4 LTSS * sle12sp4/
    kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux
    Enterprise 12 SP4 LTSS * sle12sp4/ghostcat_124-000019606.py: Ghostcat -
    Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) *
    sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a
    process is restarted (bsc#1182194) * sle12sp4/
    curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux
    Enterprise 12 SP4 LTSS * sle12sp4/cronlimit-000020338.py: crontab - More
    than 1000 entries in crontab file, can't install (bsc#1187508) * sle12sp4/
    btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task
    (bsc#1163508) * sle12sp4/btrfscrash-124-000019638.py: System crash during a
    BTRFS maintenance task (bsc#1163508) * sle12sp3/
    systemd-current-failed-7017137.py: Check for failed systemd services *
    sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE
    Linux Enterprise 12 SP3 LTSS * sle12sp3/mpiofindpaths-000019511.py: Using
    the find_multipaths yes option in multipath.conf (bsc#1138452) * sle12sp3/
    linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux
    Enterprise 12 SP3 LTSS * sle12sp3/
    kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE
    Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/
    kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE
    Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/
    kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE
    Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/
    kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE
    Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/
    kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE
    Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/ghostcat_123-000019606.py:
    Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#
    1164692) * sle12sp2/systemd-current-failed-7017137.py: Check for failed
    systemd services * sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache
    Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp1/
    systemd-current-failed-7017137.py: Check for failed systemd services *
    sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/
    Inclusion Vulnerability (bsc#1164692) * sle12sp0/
    systemd-current-failed-7017137.py: Check for failed systemd services *
    sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP
    response 0 * sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472
    (bsc#1176579) * sle12all/sysdjobs-000020261.py: Troubleshooting systemd
    jobs that are hung or stuck * sle12all/softlock-000018705.py: soft lockup
    messages about * sle12all/sizingbtrfs-000018798.py: How to resize/extend a
    btrfs formatted root partition * sle12all/scatool-000020253.py: scatool
    fails to analyze supportconfigs with xz compression (bsc#1186316) *
    sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled *
    sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid
    and should be removed * sle12all/lvm-volume-list-7016683.py: Fixed
    execution error * sle12all/iscsimnts-000019648.py: Proper mount options for
    iSCSI drives * sle12all/coredumpctl-000018634.py: How to obtain systemd
    service core dumps * sle12all/btrfsmaster-000018779.py: BTRFS Master TID *
    sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not
    working anymore (bsc#1159891) * sle12all/blacklist-000019607.py: System
    exit to emergency shell at boot with multipath enabled * CVE-2020-12351,
    CVE-2020-12352, CVE-2020-24490: BleedingTooth + sle12sp5/
    bleedingtooth_125-000019735.py + sle12sp4/bleedingtooth_124-000019735.py +
    sle12sp3/bleedingtooth_123-000019735.py + sle12sp2/
    bleedingtooth_122-000019735.py * CVE-2020-0548, CVE-2020-0549: L1D data
    cache eviction and Vector Register sampling (bsc#1156353) + sle12sp5/
    ucodeintel_125-000019635.py + sle12sp4/ucodeintel_124-000019635.py +
    sle12sp3/ucodeintel_123-000019635.py + sle12sp2/ucodeintel_122-000019635.py
    * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#
    1154824) + sle12sp5/crosstalk_125-000019643.py + sle12sp4/
    crosstalk_124-000019643.py + sle12sp3/crosstalk_123-000019643.py + sle12sp2
    /crosstalk_122-000019643.py
  o Updated patterns: * sle12all/scc-expired.py: Identify if SCC registrations
    have expired * sle12all/lvm-00003.pl: Physical volumes can be removed or
    damaged and appear missing. This pattern looks for missing physical volumes
    * sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM
    metadata * sle12all/lvm-00005.pl: Duplicate volume groups are usually a
    configuration issue
  o Renamed patterns for file standard: * Renamed patterns/SLE/sle12all/
    scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py * Renamed
    patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/
    bhc-scc-registered.py
  o Deleted regular patterns (1) * sle12all/systemd-current-failed-7017137.py:
    Moved to service packs with fixes (bsc#1187983) * sle12all/bhc-scc.sh:
    Pattern removed (bsc#1184594) * sle12all/pdc-00001.pl: Pattern removed OES
    Dependent * sle12all/pdc-00002.pl: Pattern removed OES Dependent * sle12all
    /lvm-00001.pl: Pattern removed * sle12all/lvm-00002.pl: Pattern removed


sca-patterns-sle11:

  o Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool
    to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) *
    Removed OES dependent patterns (bsc#1196873)
  o New security announcement patterns: * Apr 2022 (5) for SUSE-SU-2022:14938-1
    SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
    SUSE-SU-2022:14951-1 * Mar 2022 (19) for SUSE-SU-2022:14938-1
    SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1
    SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1
    SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1
    SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1
    SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1
    SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 * Feb 2022
    (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1
    SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1
    SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
    SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1
    SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1
    SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1
    SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1
    SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1
    SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 * Jan 2022
    (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1
    SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1
    SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1
    SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1
    SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1
    SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1
    SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1
    SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1
    SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1
    SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1 SUSE-SU-2022:14872-1
    SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1
    SUSE-SU-2022:14879-1 * Jul 2021 (5) for SUSE-SU-2021:14769-1
    SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1
    SUSE-SU-2021:14761-1 * Jun 2021 (12) for SUSE-SU-2021:14747-1
    SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1
    SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1
    SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1 SUSE-SU-2021:14760-1
    SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1 * May 2021 (5) for
    SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1
    SUSE-SU-2021:14728-1 SUSE-SU-2021:14714-1 * Apr 2021 (10) for
    SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1
    SUSE-SU-2021:14709-1 SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1
    SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1
    SUSE-SU-2021:14692-1
  o New regular patterns: * sle11sp4/ghostcat_114-000019606.py: Ghostcat -
    Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) *
    sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/
    Inclusion Vulnerability (bsc#1164692) * sle11all/softlock-000018705.py:
    soft lockup messages about * sle11all/sizingbtrfs-000018798.py: How to
    resize/extend a btrfs formatted root partition * sle11all/
    btrfsmaster-000018779.py: BTRFS Master TID * CVE-2020-0543: sle11sp4/
    crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka
    CrossTalk (bsc#1154824)
  o Deleted regular patterns: * sle11all/bhc-scc.sh: Pattern removed (bsc#
    1184594)

Patch Instructions:

To install this SUSE Feature Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o openSUSE Leap 15.3:
    zypper in -t patch openSUSE-SLE-15.3-2022-4496=1
  o SUSE Linux Enterprise Module for Server Applications 15-SP3:
    zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496=1

Package List:

  o openSUSE Leap 15.3 (noarch):
       sca-patterns-base-1.5.0-150300.10.3.1
       sca-patterns-hae-1.5.1-150300.10.3.1
       sca-patterns-sle11-1.5.1-150300.18.3.1
       sca-patterns-sle12-1.5.1-150300.3.3.1
       sca-patterns-sle15-1.5.1-150300.14.3.1
       sca-patterns-suma-1.5.0-150300.9.3.1
       sca-server-report-1.5.1-150300.11.3.1
  o SUSE Linux Enterprise Module for Server Applications 15-SP3 (noarch):
       sca-patterns-base-1.5.0-150300.10.3.1
       sca-patterns-hae-1.5.1-150300.10.3.1
       sca-patterns-sle11-1.5.1-150300.18.3.1
       sca-patterns-sle12-1.5.1-150300.3.3.1
       sca-patterns-sle15-1.5.1-150300.14.3.1
       sca-patterns-suma-1.5.0-150300.9.3.1
       sca-server-report-1.5.1-150300.11.3.1


References:

  o https://www.suse.com/security/cve/CVE-2020-0543.html
  o https://www.suse.com/security/cve/CVE-2020-0548.html
  o https://www.suse.com/security/cve/CVE-2020-0549.html
  o https://www.suse.com/security/cve/CVE-2020-12351.html
  o https://www.suse.com/security/cve/CVE-2020-12352.html
  o https://www.suse.com/security/cve/CVE-2020-1472.html
  o https://www.suse.com/security/cve/CVE-2020-24490.html
  o https://bugzilla.suse.com/1045605
  o https://bugzilla.suse.com/1124793
  o https://bugzilla.suse.com/1131489
  o https://bugzilla.suse.com/1138452
  o https://bugzilla.suse.com/1144162
  o https://bugzilla.suse.com/1152800
  o https://bugzilla.suse.com/1154768
  o https://bugzilla.suse.com/1154824
  o https://bugzilla.suse.com/1155181
  o https://bugzilla.suse.com/1155990
  o https://bugzilla.suse.com/1156353
  o https://bugzilla.suse.com/1157778
  o https://bugzilla.suse.com/1158890
  o https://bugzilla.suse.com/1159356
  o https://bugzilla.suse.com/1159891
  o https://bugzilla.suse.com/1162119
  o https://bugzilla.suse.com/1163403
  o https://bugzilla.suse.com/1163508
  o https://bugzilla.suse.com/1164692
  o https://bugzilla.suse.com/1167689
  o https://bugzilla.suse.com/1175623
  o https://bugzilla.suse.com/1176021
  o https://bugzilla.suse.com/1176140
  o https://bugzilla.suse.com/1176375
  o https://bugzilla.suse.com/1176579
  o https://bugzilla.suse.com/1177369
  o https://bugzilla.suse.com/1177753
  o https://bugzilla.suse.com/1179170
  o https://bugzilla.suse.com/1180894
  o https://bugzilla.suse.com/1182194
  o https://bugzilla.suse.com/1182905
  o https://bugzilla.suse.com/1182917
  o https://bugzilla.suse.com/1183405
  o https://bugzilla.suse.com/1183464
  o https://bugzilla.suse.com/1184594
  o https://bugzilla.suse.com/1185357
  o https://bugzilla.suse.com/1185593
  o https://bugzilla.suse.com/1185594
  o https://bugzilla.suse.com/1185684
  o https://bugzilla.suse.com/1185758
  o https://bugzilla.suse.com/1185857
  o https://bugzilla.suse.com/1186034
  o https://bugzilla.suse.com/1186312
  o https://bugzilla.suse.com/1186316
  o https://bugzilla.suse.com/1186317
  o https://bugzilla.suse.com/1186420
  o https://bugzilla.suse.com/1186442
  o https://bugzilla.suse.com/1186792
  o https://bugzilla.suse.com/1187194
  o https://bugzilla.suse.com/1187508
  o https://bugzilla.suse.com/1187983
  o https://bugzilla.suse.com/1189394
  o https://bugzilla.suse.com/1189483
  o https://bugzilla.suse.com/1189889
  o https://bugzilla.suse.com/1190260
  o https://bugzilla.suse.com/1190460
  o https://bugzilla.suse.com/1191005
  o https://bugzilla.suse.com/1191199
  o https://bugzilla.suse.com/1193878
  o https://bugzilla.suse.com/1196730
  o https://bugzilla.suse.com/1196873

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=cHbm
-----END PGP SIGNATURE-----