SUSE-FU-2022:4496-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-FU-2022:4496-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-FU-2022:4496-1
Related
Published
2022-12-15T09:43:54Z
Modified
2022-12-15T09:43:54Z
Summary
Feature update for SCA patterns
Details

This update for SCA patterns fixes the following issues:

sca-patterns-base:

  • Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    • Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
    • Added Core.loadFullFile for sectionless parsing (bsc#1187194)
    • Added SUSE.getNetworkInterfaces (bsc#1144162)
    • Changed required dependencies from python to python3-base (bsc#1191199)
    • Fix SUSE.getFileSystems invalid index error (bsc#1185594)
    • Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)
    • Removed Novell/OES references from libraries (bsc#1186034)
    • Updated documentation for SUSE.compareKernel
    • Updated kernel version constants for all SUSE libraries (bsc#1189483)

sca-patterns-hae:

  • Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    • Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
    • Added distribution and service pack subdirectories (bsc#1193878)
    • False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793)
    • HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)
    • supportconfig indicates IPv6 required by HAE, is already enabled (bsc#1045605)

sca-patterns-suma:

  • Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    • Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)

sca-server-report:

  • Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    • Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
    • Changed absolute paths to relative ones (bsc#1186316)
    • Changed required dependencies from python to python3-base (bsc#1191199)
    • Ensure that the legacy SuSE-release file works (bsc#1196730)
    • Fix sca report header supportconfig file (bsc#1186442)
    • Fix the report file output path (bsc#1180894)
    • Removed preprocessor elements for OES Filr eDir (bsc#1186420)

sca-patterns-sle15:

  • Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    • Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
    • Added Video link to coredumpctl-000018634.py
    • Added video links to patterns (bsc#1190460):
      • bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl
    • Fixed crosstalk message strings (bsc#1186312)
    • Fixed field reference in sle15all/lvm-00003.pl
    • Fixed metadata tags in scc-registered.py
    • Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)
    • Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
    • Requires Core library 1.3.3 which contains Core.logFullFile function
    • Updated registration link in bhc-scc-registered.py
    • Updated renewal link in bhc-scc-expired.py
  • New security announcement patterns:
    • Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1
    • Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1
    • Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0367-1
    • Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1 SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1 SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1 SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1
    • Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1 SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1 SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1 SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1 SUSE-SU-2021:2470-1
    • Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1 SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1 SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1 SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1 SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1 SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1
    • May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1
    • May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1 SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1 SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1 SUSE-SU-2021:1455-1
  • New regular patterns:
    • sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#1179170)
    • sle15sp3/intelpstate153-000020273.py: Frequency scaling driver intelpstate not loading on some Intel Xeon Scalable processors (bsc#1185758)
    • sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest
    • sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed (bsc#1189394)
    • sle15sp2/nfstimeout152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)
    • sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIOGETGEO failed with 25 (bsc#1182917)
    • sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684)
    • sle15sp2/intelpstate152-000020273.py: Frequency scaling driver intelpstate not loading on some Intel Xeon Scalable processors (bsc#1185758)
    • sle15sp2/ghostcat152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle problems (bsc#1176140)
    • sle15sp1/qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards (bsc#1155990)
    • sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness on host (bsc#1152800)
    • sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
    • sle15sp1/nfsipv6151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)
    • sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356)
    • sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation failure (bsc#1157778)
    • sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768)
    • sle15sp1/ghostcat151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS (bsc#1131489)
    • sle15sp1/docore151-000019881.py: System crash in docoredump() when a process is restarted (bsc#1177753)
    • sle15sp0/mpiofindpaths-000019511.py: Using the findmultipaths yes option in multipath.conf (bsc#1138452)
    • sle15sp0/ghostcat150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0
    • sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis
    • sle15all/vmcore-00001.pl: Identifies kernel core dumps for review
    • sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or directory (bsc#1185357)
    • sle15all/systemd-current-failed-7017137.py: Check for failed systemd services
    • sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck
    • sle15all/softlock-000018705.py: soft lockup messages about
    • sle15all/slapd-000019711.py: slapd.service not enabled/failed after upgrade from SUSE Linux Enterprise 11 Service Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353)
    • sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
    • sle15all/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464)
    • sle15all/scc-registered.py: Check system registration status
    • sle15all/scc-expired.py: Identify if SCC registrations have expired
    • sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181)
    • sle15all/scatool-000004685.py: scatool fails with traceback
    • sle15all/proxy-00003.pl: Checks for proxy environment variables
    • sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled
    • sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905)
    • sle15all/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)
    • sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792)
    • sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170)
    • sle15all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue
    • sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata
    • sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for missing physical volumes.
    • sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
    • sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
    • sle15all/coredumpctl-000018634.py: How to obtain systemd service core dumps
    • sle15all/btrfsmaster-000018779.py: BTRFS Master TID
    • sle15all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled
    • sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)
    • sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890)
    • CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)
      • sle15sp2/crosstalk152-000019643.py
      • sle15sp1/crosstalk151-000019643.py
    • CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)
      • sle15sp2/ucodeintel152-000019635.py
      • sle15sp1/ucodeintel151-000019635.py
      • sle15sp0/ucodeintel150-000019635.py
  • Renamed pattern files for filename standard
    • Renamed patterns/SLE/sle15all/scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py
    • Renamed /SLE/sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py
  • Updated regular patterns:
    • sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for missing physical volumes

sca-patterns-sle12:

  • Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    • Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
    • Added Video link to coredumpctl-000018634.py
    • Added video links to patterns (bsc#1190460):
      • bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl
    • Fixed crosstalk message strings (bsc#1186312)
    • Fixed metadata tags for scc-registered.py
    • Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)
    • Requires Core library 1.3.3 which contains Core.logFullFile function
    • Updated registration link in bhc-scc-registered.py
    • Updated renewal link in bhc-scc-expired.py
    • Updated scc-registered.py pattern to fix registration detection
  • New security announcement patterns:
    • Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1
    • Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1
    • Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1
    • Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1 SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1 SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1
    • Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1 SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1 SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1
    • May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1 SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1 SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1 SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1
    • Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1 SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1 SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1 SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1
    • Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1 SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1 SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1
  • New regular patterns:
    • sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
    • sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)
    • sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services
    • sle12sp5/systemdSUSE-SU-20212405-112.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
    • sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464)
    • sle12sp5/qemuSUSE-SU-20212448-112.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
    • sle12sp5/python-pySUSE-SU-20212236-112.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
    • sle12sp5/permissionsSUSE-SU-20212280-112.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5
    • sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)
    • sle12sp5/nfstimeout125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)
    • sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
    • sle12sp5/nfsipv6125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)
    • sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623)
    • sle12sp5/linuxptpSUSE-SU-20212545-112.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
    • sle12sp5/kgraft-patchSUSE-SU-20212462-112.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
    • sle12sp5/kgraft-patchSUSE-SU-20212389-112.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
    • sle12sp5/kgraft-patchSUSE-SU-20212324-112.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5
    • sle12sp5/kernelSUSE-SU-20212416-112.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
    • sle12sp5/kernelSUSE-SU-20212407-112.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
    • sle12sp5/kernelSUSE-SU-20212321-112.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
    • sle12sp5/intelpstate125-000020273.py: Frequency scaling driver intelpstate not loading on some Intel Xeon Scalable processors (bsc#1185758)
    • sle12sp5/glibcSUSE-SU-20212480-112.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
    • sle12sp5/ghostcat125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle12sp5/docore125-000019881.py: System crash in docoredump() when a process is restarted (bsc#1182194)
    • sle12sp5/dbus-1SUSE-SU-20212424-112.5.py: Security fixes for SUSE Linux Enterprise 12 SP5
    • sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
    • sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
    • sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
    • sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)
    • sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel 4.12.14-95.48-default may crash the system (bsc#1176579)
    • sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)
    • sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd services
    • sle12sp4/systemdSUSE-SU-20212423-112.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
    • sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464)
    • sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible
    • sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)
    • sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)
    • sle12sp4/mpiofindpaths-000019511.py: Using the findmultipaths yes option in multipath.conf (bsc#1138452)
    • sle12sp4/linuxptpSUSE-SU-20212443-112.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
    • sle12sp4/kgraft-patchSUSE-SU-20212546-112.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS
    • sle12sp4/kgraft-patchSUSE-SU-20212389-112.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS
    • sle12sp4/kernelSUSE-SU-20212422-112.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
    • sle12sp4/ghostcat124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle12sp4/docore124-000019881.py: System crash in docoredump() when a process is restarted (bsc#1182194)
    • sle12sp4/curlSUSE-SU-20212425-112.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS
    • sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508)
    • sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
    • sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)
    • sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd services
    • sle12sp3/systemdSUSE-SU-20212423-112.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS
    • sle12sp3/mpiofindpaths-000019511.py: Using the findmultipaths yes option in multipath.conf (bsc#1138452)
    • sle12sp3/linuxptpSUSE-SU-20212443-112.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS
    • sle12sp3/kgraft-patchSUSE-SU-20212563-112.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
    • sle12sp3/kgraft-patchSUSE-SU-20212538-112.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
    • sle12sp3/kgraft-patchSUSE-SU-20212451-112.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
    • sle12sp3/kgraft-patchSUSE-SU-20212433-112.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
    • sle12sp3/kgraft-patchSUSE-SU-20212389-112.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS
    • sle12sp3/ghostcat123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services
    • sle12sp2/ghostcat122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd services
    • sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd services
    • sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0
    • sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579)
    • sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck
    • sle12all/softlock-000018705.py: soft lockup messages about
    • sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
    • sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316)
    • sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled
    • sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed
    • sle12all/lvm-volume-list-7016683.py: Fixed execution error
    • sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives
    • sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps
    • sle12all/btrfsmaster-000018779.py: BTRFS Master TID
    • sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891)
    • sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled
    • CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth
      • sle12sp5/bleedingtooth125-000019735.py
      • sle12sp4/bleedingtooth124-000019735.py
      • sle12sp3/bleedingtooth123-000019735.py
      • sle12sp2/bleedingtooth122-000019735.py
    • CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)
      • sle12sp5/ucodeintel125-000019635.py
      • sle12sp4/ucodeintel124-000019635.py
      • sle12sp3/ucodeintel123-000019635.py
      • sle12sp2/ucodeintel122-000019635.py
    • CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)
      • sle12sp5/crosstalk125-000019643.py
      • sle12sp4/crosstalk124-000019643.py
      • sle12sp3/crosstalk123-000019643.py
      • sle12sp2/crosstalk122-000019643.py
  • Updated patterns:
    • sle12all/scc-expired.py: Identify if SCC registrations have expired
    • sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for missing physical volumes
    • sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata
    • sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue
  • Renamed patterns for file standard:
    • Renamed patterns/SLE/sle12all/scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py
    • Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/bhc-scc-registered.py
  • Deleted regular patterns (1)
    • sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983)
    • sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)
    • sle12all/pdc-00001.pl: Pattern removed OES Dependent
    • sle12all/pdc-00002.pl: Pattern removed OES Dependent
    • sle12all/lvm-00001.pl: Pattern removed
    • sle12all/lvm-00002.pl: Pattern removed

sca-patterns-sle11:

  • Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):
    • Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)
    • Removed OES dependent patterns (bsc#1196873)
  • New security announcement patterns:
    • Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1
    • Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1
    • Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1
    • Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1 SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1
    • Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1 SUSE-SU-2021:14761-1
    • Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1 SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1 SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1
    • May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1 SUSE-SU-2021:14714-1
    • Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1 SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1 SUSE-SU-2021:14692-1
  • New regular patterns:
    • sle11sp4/ghostcat114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle11sp3/ghostcat113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)
    • sle11all/softlock-000018705.py: soft lockup messages about
    • sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition
    • sle11all/btrfsmaster-000018779.py: BTRFS Master TID
    • CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)
  • Deleted regular patterns:
    • sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)
References

Affected packages

SUSE:Linux Enterprise Module for Server Applications 15 SP3 / sca-patterns-base

Package

Name
sca-patterns-base
Purl
purl:rpm/suse/sca-patterns-base&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.0-150300.10.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Server Applications 15 SP3 / sca-patterns-hae

Package

Name
sca-patterns-hae
Purl
purl:rpm/suse/sca-patterns-hae&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.10.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Server Applications 15 SP3 / sca-patterns-sle11

Package

Name
sca-patterns-sle11
Purl
purl:rpm/suse/sca-patterns-sle11&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.18.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Server Applications 15 SP3 / sca-patterns-sle12

Package

Name
sca-patterns-sle12
Purl
purl:rpm/suse/sca-patterns-sle12&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.3.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Server Applications 15 SP3 / sca-patterns-sle15

Package

Name
sca-patterns-sle15
Purl
purl:rpm/suse/sca-patterns-sle15&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.14.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Server Applications 15 SP3 / sca-patterns-suma

Package

Name
sca-patterns-suma
Purl
purl:rpm/suse/sca-patterns-suma&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.0-150300.9.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

SUSE:Linux Enterprise Module for Server Applications 15 SP3 / sca-server-report

Package

Name
sca-server-report
Purl
purl:rpm/suse/sca-server-report&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.11.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

openSUSE:Leap 15.3 / sca-patterns-base

Package

Name
sca-patterns-base
Purl
purl:rpm/suse/sca-patterns-base&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.0-150300.10.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

openSUSE:Leap 15.3 / sca-patterns-hae

Package

Name
sca-patterns-hae
Purl
purl:rpm/suse/sca-patterns-hae&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.10.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

openSUSE:Leap 15.3 / sca-patterns-sle11

Package

Name
sca-patterns-sle11
Purl
purl:rpm/suse/sca-patterns-sle11&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.18.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

openSUSE:Leap 15.3 / sca-patterns-sle12

Package

Name
sca-patterns-sle12
Purl
purl:rpm/suse/sca-patterns-sle12&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.3.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

openSUSE:Leap 15.3 / sca-patterns-sle15

Package

Name
sca-patterns-sle15
Purl
purl:rpm/suse/sca-patterns-sle15&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.14.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

openSUSE:Leap 15.3 / sca-patterns-suma

Package

Name
sca-patterns-suma
Purl
purl:rpm/suse/sca-patterns-suma&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.0-150300.9.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}

openSUSE:Leap 15.3 / sca-server-report

Package

Name
sca-server-report
Purl
purl:rpm/suse/sca-server-report&distro=openSUSE%20Leap%2015.3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.5.1-150300.11.3.1

Ecosystem specific

{
    "binaries": [
        {
            "sca-patterns-sle15": "1.5.1-150300.14.3.1",
            "sca-patterns-sle11": "1.5.1-150300.18.3.1",
            "sca-patterns-hae": "1.5.1-150300.10.3.1",
            "sca-patterns-sle12": "1.5.1-150300.3.3.1",
            "sca-server-report": "1.5.1-150300.11.3.1",
            "sca-patterns-suma": "1.5.0-150300.9.3.1",
            "sca-patterns-base": "1.5.0-150300.10.3.1"
        }
    ]
}