suse-fu-2022:4496-1
Vulnerability from csaf_suse
Published
2022-12-15 09:43
Modified
2022-12-15 09:43
Summary
Feature update for SCA patterns

Notes

Title of the patch
Feature update for SCA patterns
Description of the patch
This update for SCA patterns fixes the following issues: sca-patterns-base: - Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added Core.loadFullFile for sectionless parsing (bsc#1187194) * Added SUSE.getNetworkInterfaces (bsc#1144162) * Changed required dependencies from python to python3-base (bsc#1191199) * Fix SUSE.getFileSystems invalid index error (bsc#1185594) * Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593) * Removed Novell/OES references from libraries (bsc#1186034) * Updated documentation for SUSE.compareKernel * Updated kernel version constants for all SUSE libraries (bsc#1189483) sca-patterns-hae: - Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added distribution and service pack subdirectories (bsc#1193878) * False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793) * HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689) * supportconfig indicates IPv6 required by HAE, is already enabled (bsc#1045605) sca-patterns-suma: - Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) sca-server-report: - Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Changed absolute paths to relative ones (bsc#1186316) * Changed required dependencies from python to python3-base (bsc#1191199) * Ensure that the legacy SuSE-release file works (bsc#1196730) * Fix sca report header supportconfig file (bsc#1186442) * Fix the report file output path (bsc#1180894) * Removed preprocessor elements for OES Filr eDir (bsc#1186420) sca-patterns-sle15: - Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added Video link to coredumpctl-000018634.py * Added video links to patterns (bsc#1190460): * bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl * Fixed crosstalk message strings (bsc#1186312) * Fixed field reference in sle15all/lvm-00003.pl * Fixed metadata tags in scc-registered.py * Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889) * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260) * Requires Core library 1.3.3 which contains Core.logFullFile function * Updated registration link in bhc-scc-registered.py * Updated renewal link in bhc-scc-expired.py - New security announcement patterns: * Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 * Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 * Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0367-1 * Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1 SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1 SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1 SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1 SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1 SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1 SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1 SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1 * Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1 SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1 SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1 SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1 SUSE-SU-2021:2470-1 * Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1 SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1 SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1 SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1 SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1 SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1 SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1 * May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1 * May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1 SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1 SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1 SUSE-SU-2021:1455-1 - New regular patterns: * sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#1179170) * sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable processors (bsc#1185758) * sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest * sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed (bsc#1189394) * sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405) * sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIO_GETGEO failed with 25 (bsc#1182917) * sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684) * sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable processors (bsc#1185758) * sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle problems (bsc#1176140) * sle15sp1/qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards (bsc#1155990) * sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness on host (bsc#1152800) * sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403) * sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162) * sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356) * sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation failure (bsc#1157778) * sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768) * sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS (bsc#1131489) * sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1177753) * sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452) * sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0 * sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis * sle15all/vmcore-00001.pl: Identifies kernel core dumps for review * sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or directory (bsc#1185357) * sle15all/systemd-current-failed-7017137.py: Check for failed systemd services * sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck * sle15all/softlock-000018705.py: soft lockup messages about * sle15all/slapd-000019711.py: slapd.service not enabled/failed after upgrade from SUSE Linux Enterprise 11 Service Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353) * sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition * sle15all/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464) * sle15all/scc-registered.py: Check system registration status * sle15all/scc-expired.py: Identify if SCC registrations have expired * sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181) * sle15all/scatool-000004685.py: scatool fails with traceback * sle15all/proxy-00003.pl: Checks for proxy environment variables * sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled * sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905) * sle15all/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375) * sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792) * sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170) * sle15all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue * sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for missing physical volumes. * sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives * sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508) * sle15all/coredumpctl-000018634.py: How to obtain systemd service core dumps * sle15all/btrfsmaster-000018779.py: BTRFS Master TID * sle15all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled * sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317) * sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890) * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824) + sle15sp2/crosstalk_152-000019643.py + sle15sp1/crosstalk_151-000019643.py * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353) + sle15sp2/ucodeintel_152-000019635.py + sle15sp1/ucodeintel_151-000019635.py + sle15sp0/ucodeintel_150-000019635.py - Renamed pattern files for filename standard * Renamed patterns/SLE/sle15all/scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py * Renamed /SLE/sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py - Updated regular patterns: * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for missing physical volumes sca-patterns-sle12: - Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Added Video link to coredumpctl-000018634.py * Added video links to patterns (bsc#1190460): + bhc-scc-expired.py, bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl * Fixed crosstalk message strings (bsc#1186312) * Fixed metadata tags for scc-registered.py * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260) * Requires Core library 1.3.3 which contains Core.logFullFile function * Updated registration link in bhc-scc-registered.py * Updated renewal link in bhc-scc-expired.py * Updated scc-registered.py pattern to fix registration detection - New security announcement patterns: * Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 * Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 * Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 * Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1 SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1 SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1 SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1 SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1 SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1 SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1 SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1 SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1 SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1 * Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1 SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1 SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 * May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1 SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1 SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1 SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1 * Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1 SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1 SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1 SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 * Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1 SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1 SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 - New regular patterns: * sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119) * sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369) * sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464) * sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5 * sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5 * sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5 * sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375) * sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405) * sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403) * sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162) * sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623) * sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5 * sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5 * sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5 * sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable processors (bsc#1185758) * sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194) * sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5 * sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508) * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508) * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508) * sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119) * sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel 4.12.14-95.48-default may crash the system (bsc#1176579) * sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369) * sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS * sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL server (bsc#1183464) * sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible * sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375) * sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403) * sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452) * sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS * sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS * sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS * sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS * sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194) * sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS * sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can't install (bsc#1187508) * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508) * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508) * sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS * sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452) * sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS * sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS * sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd services * sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd services * sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0 * sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579) * sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck * sle12all/softlock-000018705.py: soft lockup messages about * sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition * sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316) * sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled * sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed * sle12all/lvm-volume-list-7016683.py: Fixed execution error * sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives * sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps * sle12all/btrfsmaster-000018779.py: BTRFS Master TID * sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891) * sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled * CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth + sle12sp5/bleedingtooth_125-000019735.py + sle12sp4/bleedingtooth_124-000019735.py + sle12sp3/bleedingtooth_123-000019735.py + sle12sp2/bleedingtooth_122-000019735.py * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353) + sle12sp5/ucodeintel_125-000019635.py + sle12sp4/ucodeintel_124-000019635.py + sle12sp3/ucodeintel_123-000019635.py + sle12sp2/ucodeintel_122-000019635.py * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824) + sle12sp5/crosstalk_125-000019643.py + sle12sp4/crosstalk_124-000019643.py + sle12sp3/crosstalk_123-000019643.py + sle12sp2/crosstalk_122-000019643.py - Updated patterns: * sle12all/scc-expired.py: Identify if SCC registrations have expired * sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for missing physical volumes * sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata * sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue - Renamed patterns for file standard: * Renamed patterns/SLE/sle12all/scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py * Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/bhc-scc-registered.py - Deleted regular patterns (1) * sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983) * sle12all/bhc-scc.sh: Pattern removed (bsc#1184594) * sle12all/pdc-00001.pl: Pattern removed OES Dependent * sle12all/pdc-00002.pl: Pattern removed OES Dependent * sle12all/lvm-00001.pl: Pattern removed * sle12all/lvm-00002.pl: Pattern removed sca-patterns-sle11: - Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335): * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579) * Removed OES dependent patterns (bsc#1196873) - New security announcement patterns: * Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 * Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 * Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 * Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1 SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1 SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1 SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1 SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1 SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1 * Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1 SUSE-SU-2021:14761-1 * Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1 SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1 SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1 * May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1 SUSE-SU-2021:14714-1 * Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1 SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1 SUSE-SU-2021:14692-1 - New regular patterns: * sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) * sle11all/softlock-000018705.py: soft lockup messages about * sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition * sle11all/btrfsmaster-000018779.py: BTRFS Master TID * CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824) - Deleted regular patterns: * sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)
Patchnames
SUSE-2022-4496,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496,openSUSE-SLE-15.3-2022-4496
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Feature update for SCA patterns",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for SCA patterns fixes the following issues:\n\nsca-patterns-base:\n\n- Version update from 1.3.1 to 1.5.0 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n  * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n  * Added Core.loadFullFile for sectionless parsing (bsc#1187194)\n  * Added SUSE.getNetworkInterfaces (bsc#1144162)\n  * Changed required dependencies from python to python3-base (bsc#1191199)\n  * Fix SUSE.getFileSystems invalid index error (bsc#1185594)\n  * Fix SUSE.getFileSystems unbound local SWAP variable (bsc#1185593)\n  * Removed Novell/OES references from libraries (bsc#1186034)\n  * Updated documentation for SUSE.compareKernel\n  * Updated kernel version constants for all SUSE libraries (bsc#1189483)\n\nsca-patterns-hae:\n\n- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n  * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n  * Added distribution and service pack subdirectories (bsc#1193878)\n  * False positive hit from /usr/lib/sca/patterns/HAE/stonith-00002.pl (bsc#1124793)\n  * HAE Policies Quorum 2 node cluster requires ignore policy (bsc#1167689)\n  * supportconfig indicates IPv6 required by HAE, is already enabled (bsc#1045605)\n\nsca-patterns-suma:\n\n- Version update from 1.0 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n  * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n\nsca-server-report:\n\n- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n  * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n  * Changed absolute paths to relative ones (bsc#1186316)\n  * Changed required dependencies from python to python3-base (bsc#1191199)\n  * Ensure that the legacy SuSE-release file works (bsc#1196730) \n  * Fix sca report header supportconfig file (bsc#1186442)\n  * Fix the report file output path (bsc#1180894)\n  * Removed preprocessor elements for OES Filr eDir (bsc#1186420)\n\nsca-patterns-sle15:\n\n- Version update from 1.0.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n  * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n  * Added Video link to coredumpctl-000018634.py\n  * Added video links to patterns (bsc#1190460):\n    * bhc-scc-expired.py,  bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl\n  * Fixed crosstalk message strings (bsc#1186312)\n  * Fixed field reference in sle15all/lvm-00003.pl\n  * Fixed metadata tags in scc-registered.py\n  * Fixed percent used calculation for bhc-memused-00001.pl (bsc#1189889)\n  * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)\n  * Requires Core library 1.3.3 which contains Core.logFullFile function\n  * Updated registration link in bhc-scc-registered.py\n  * Updated renewal link in bhc-scc-expired.py\n- New security announcement patterns:\n  * Apr 2022 (13) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n      SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n      SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1\n  * Mar 2022 (48) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n      SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n      SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n      SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n      SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n      SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n      SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n      SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n      SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n      SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1\n  * Feb 2022 (60) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n      SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n      SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n      SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n      SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n      SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n      SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n      SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n      SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n      SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1\n      SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1\n      SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1\n      SUSE-SU-2022:0367-1\n  * Jan 2022 (92) for SUSE-SU-2022:1293-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1108-1\n      SUSE-SU-2022:1292-1 SUSE-SU-2022:1313-1 SUSE-SU-2022:1448-1 SUSE-SU-2022:1250-1 SUSE-SU-2022:1255-1\n      SUSE-SU-2022:1255-1 SUSE-SU-2022:1288-1 SUSE-SU-2022:1427-1 SUSE-SU-2022:1139-1 SUSE-SU-2022:0931-1\n      SUSE-SU-2022:0703-1 SUSE-SU-2022:0779-1 SUSE-SU-2022:0695-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n      SUSE-SU-2022:1058-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0853-1 SUSE-SU-2022:0819-1 SUSE-SU-2022:0778-1\n      SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0732-1\n      SUSE-SU-2022:0703-1 SUSE-SU-2022:0810-1 SUSE-SU-2022:0694-1 SUSE-SU-2022:0826-1 SUSE-SU-2022:0825-1\n      SUSE-SU-2022:1057-1 SUSE-SU-2022:0679-1 SUSE-SU-2022:0851-1 SUSE-SU-2022:1041-1 SUSE-SU-2022:0819-1\n      SUSE-SU-2022:0778-1 SUSE-SU-2022:0676-1 SUSE-SU-2022:0725-1 SUSE-SU-2022:0754-1 SUSE-SU-2022:0766-1\n      SUSE-SU-2022:0766-1 SUSE-SU-2022:0933-1 SUSE-SU-2022:0934-1 SUSE-SU-2022:0929-1 SUSE-SU-2022:0277-1\n      SUSE-SU-2022:0283-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0468-1 SUSE-SU-2022:0541-1 SUSE-SU-2022:0284-1\n      SUSE-SU-2022:0563-1 SUSE-SU-2022:0500-1 SUSE-SU-2022:0563-1 SUSE-SU-2022:0301-1 SUSE-SU-2022:0367-1\n      SUSE-SU-2022:0367-1 SUSE-SU-2022:0043-1 SUSE-SU-2022:0177-1 SUSE-SU-2022:0064-1 SUSE-SU-2022:0134-1\n      SUSE-SU-2022:0141-1 SUSE-SU-2022:0050-1 SUSE-SU-2022:0021-1 SUSE-SU-2022:0069-1 SUSE-SU-2022:0198-1\n      SUSE-SU-2022:0131-1 SUSE-SU-2022:0088-1 SUSE-SU-2022:0144-1 SUSE-SU-2022:0151-1 SUSE-SU-2022:0091-1\n      SUSE-SU-2022:0091-1 SUSE-SU-2022:0183-1 SUSE-SU-2022:0211-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0050-1\n      SUSE-SU-2022:0137-1 SUSE-SU-2022:0214-1 SUSE-SU-2022:0128-1 SUSE-SU-2022:0119-1 SUSE-SU-2022:0183-1\n      SUSE-SU-2022:0211-1 SUSE-SU-2022:0251-1 SUSE-SU-2022:0200-1 SUSE-SU-2022:0191-1 SUSE-SU-2022:0137-1\n      SUSE-SU-2022:0214-1 SUSE-SU-2022:0031-1 SUSE-SU-2022:0119-1\n  * Jul 2021 (20) for SUSE-SU-2021:2457-1 SUSE-SU-2021:2410-1 SUSE-SU-2021:2442-1 SUSE-SU-2021:2352-1\n      SUSE-SU-2021:1863-2 SUSE-SU-2021:2415-1 SUSE-SU-2021:2555-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2459-1\n      SUSE-SU-2021:2291-1 SUSE-SU-2021:2457-1 SUSE-SU-2021:2404-1 SUSE-SU-2021:2474-1 SUSE-SU-2021:2471-1\n      SUSE-SU-2021:2438-1 SUSE-SU-2021:2325-1 SUSE-SU-2021:2439-1 SUSE-SU-2021:2461-1 SUSE-SU-2021:2421-1\n      SUSE-SU-2021:2470-1\n  * Jun 2021 (46) for SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1998-1 SUSE-SU-2021:2106-1\n      SUSE-SU-2021:1951-1 SUSE-SU-2021:2213-1 SUSE-SU-2021:1942-1 SUSE-SU-2021:2012-1 SUSE-SU-2021:1859-1\n      SUSE-SU-2021:1843-1 SUSE-SU-2021:1825-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1\n      SUSE-SU-2021:2184-1 SUSE-SU-2021:1977-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1944-1 SUSE-SU-2021:1834-1\n      SUSE-SU-2021:1826-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:2011-1 SUSE-SU-2021:1933-1 SUSE-SU-2021:1999-1\n      SUSE-SU-2021:2106-1 SUSE-SU-2021:2212-1 SUSE-SU-2021:1893-1 SUSE-SU-2021:1859-1 SUSE-SU-2021:1994-1\n      SUSE-SU-2021:1970-1 SUSE-SU-2021:1843-1 SUSE-SU-2021:2196-1 SUSE-SU-2021:1917-1 SUSE-SU-2021:1958-1\n      SUSE-SU-2021:1890-1 SUSE-SU-2021:1819-1 SUSE-SU-2021:1834-1 SUSE-SU-2021:2127-1 SUSE-SU-2021:1901-1\n      SUSE-SU-2021:1911-1 SUSE-SU-2021:2104-1 SUSE-SU-2021:1895-1 SUSE-SU-2021:2155-1 SUSE-SU-2021:2122-1\n      SUSE-SU-2021:2211-1 SUSE-SU-2021:1845-1\n  * May 2021 (39) for SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1\n      SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 \n      SUSE-SU-2021:1755-1 SUSE-SU-2021:1599-1 SUSE-SU-2021:1761-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 \n      SUSE-SU-2021:1762-1 SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1557-1 SUSE-SU-2021:1806-1 \n      SUSE-SU-2021:1785-1 SUSE-SU-2021:1466-1 SUSE-SU-2021:1491-1 SUSE-SU-2021:1577-1 SUSE-SU-2021:1654-1 \n      SUSE-SU-2021:1523-1 SUSE-SU-2021:1765-1 SUSE-SU-2021:1755-1 SUSE-SU-2021:1574-1 SUSE-SU-2021:1599-1 \n      SUSE-SU-2021:1761-1 SUSE-SU-2021:1636-1 SUSE-SU-2021:1655-1 SUSE-SU-2021:1598-1 SUSE-SU-2021:1762-1 \n      SUSE-SU-2021:1474-1 SUSE-SU-2021:1493-1 SUSE-SU-2021:1500-1 SUSE-SU-2021:1792-1 SUSE-SU-2021:1573-1\n  * May 2021 (30) for SUSE-SU-2021:1182-1 SUSE-SU-2021:1430-1 SUSE-SU-2021:1168-1 SUSE-SU-2021:1408-1 \n      SUSE-SU-2021:1409-1 SUSE-SU-2021:1182-1 SUSE-SU-2021:1028-1 SUSE-SU-2021:1166-1 SUSE-SU-2021:1430-1\n      SUSE-SU-2021:1113-1 SUSE-SU-2021:1444-1 SUSE-SU-2021:1280-1 SUSE-SU-2021:1243-1 SUSE-SU-2021:1168-1\n      SUSE-SU-2021:1408-1 SUSE-SU-2021:1094-1 SUSE-SU-2021:1029-1 SUSE-SU-2021:1238-1 SUSE-SU-2021:1409-1\n      SUSE-SU-2021:1006-1 SUSE-SU-2021:1161-1 SUSE-SU-2021:1108-1 SUSE-SU-2021:1282-1 SUSE-SU-2021:1179-1\n      SUSE-SU-2021:1153-1 SUSE-SU-2021:1445-1 SUSE-SU-2021:1244-1 SUSE-SU-2021:1292-1 SUSE-SU-2021:1103-1\n      SUSE-SU-2021:1455-1\n- New regular patterns:\n  * sle15sp3/oldlvm-000019878.py, sle15sp2/oldlvm-000019878.py: Physical Volume is using an old PV header (bsc#1179170)\n  * sle15sp3/intelpstate_153-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon\n    Scalable processors (bsc#1185758)\n  * sle15sp3/dasdkvm-000020295.py: DASD partitions not recognized on SUSE Linux Enterprise 15 Service Pack 3 KVM guest\n  * sle15sp2/rpmnfs-000020364.py, sle15sp3/rpmnfs-000020364.py: Upgrading an RPM reports cpio chmod failed\n    (bsc#1189394)\n  * sle15sp2/nfstimeout_152-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)\n  * sle15sp2/mpiopmem-000019884.py: Executing multipath -ll on Optane memory based pmem devices returns HDIO_GETGEO\n    failed with 25 (bsc#1182917)\n  * sle15sp2/ipmitool-000020250.py: hanging on getting cipher suites (bsc#1185684)\n  * sle15sp2/intelpstate_152-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon Scalable\n    processors (bsc#1185758)\n  * sle15sp2/ghostcat_152-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle15sp2/fcoe-000019889.py: System with FCoE connected devices fails to boot randomly due to wicked ordering cycle\n    problems (bsc#1176140)\n  * sle15sp1/qlogic-000019630.py: System crashes when the system is rebooted with SR-IOV enabled QLogic cards\n    (bsc#1155990)\n  * sle15sp1/passthrough-000019579.py: Passthrough of Raid Controller to KVM guest results in NMI and unresponsiveness\n    on host (bsc#1152800)\n  * sle15sp1/nfsperf-151-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)  \n  * sle15sp1/nfsipv6_151-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)\n  * sle15sp1/nfit-000019688.py: dmesg shows NFIT related messages after updating the kernel (bsc#1159356)\n  * sle15sp1/namespace-000019571.py: Activation of multiple namespaces simultaneously may lead to an activation\n    failure (bsc#1157778)\n  * sle15sp1/ipmi-000019602.py: IPMI driver can be unloaded when being accessed by user space (bsc#1154768)\n  * sle15sp1/ghostcat_151-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle15sp1/edac-000019537.py: A kernel message shows EDAC amd64 Error F0 not found, device 0x1460 broken BIOS \n    (bsc#1131489)\n  * sle15sp1/docore_151-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1177753)\n  * sle15sp0/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n  * sle15sp0/ghostcat_150-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle15all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0\n  * sle15all/vmcore-00002.pl: Detects the need for a kernel core analysis\n  * sle15all/vmcore-00001.pl: Identifies kernel core dumps for review\n  * sle15all/udevmac-000020260.py: systemd-udevd Could not generate persistent MAC address for br0 No such file or\n    directory (bsc#1185357)\n  * sle15all/systemd-current-failed-7017137.py: Check for failed systemd services\n  * sle15all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck\n  * sle15all/softlock-000018705.py: soft lockup messages about\n  * sle15all/slapd-000019711.py: slapd.service not enabled/failed after upgrade from SUSE Linux Enterprise 11 Service\n    Pack 4 to SUSE Linux Enterprise 15 (bsc#1156353)\n  * sle15all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n  * sle15all/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n    server (bsc#1183464)\n  * sle15all/scc-registered.py: Check system registration status\n  * sle15all/scc-expired.py: Identify if SCC registrations have expired\n  * sle15all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1155181)\n  * sle15all/scatool-000004685.py: scatool fails with traceback\n  * sle15all/proxy-00003.pl: Checks for proxy environment variables\n  * sle15all/postfix-000020356.py: Postfix fails to start with IPv6 disabled\n  * sle15all/oomvsftpd-000020252.py: vsftpd and other processes terminated due to OOM scenario (bsc#1182905)\n  * sle15all/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux\n    Enterprise 15 Service Pack 2 (bsc#1176375)\n  * sle15all/mysqlperf-000020354.py: mysqld segfault when the system is under stress (bsc#1186792)\n  * sle15all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed (bsc#1179170)\n  * sle15all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue\n  * sle15all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata\n  * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n    missing physical volumes.\n  * sle15all/iscsimnts-000019648.py: Proper mount options for iSCSI drives\n  * sle15all/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can\u0027t install (bsc#1187508)\n  * sle15all/coredumpctl-000018634.py: How to obtain systemd service core dumps\n  * sle15all/btrfsmaster-000018779.py: BTRFS Master TID\n  * sle15all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled\n  * sle15all/bhc-scc.sh: Pattern removed (bsc#1184594, bsc#1186317)\n  * sle15all/acpid-000019708.py: acpid.service failed to start after upgrade (bsc#1158890)\n  * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)\n    + sle15sp2/crosstalk_152-000019643.py\n    + sle15sp1/crosstalk_151-000019643.py\n  * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)\n    + sle15sp2/ucodeintel_152-000019635.py\n    + sle15sp1/ucodeintel_151-000019635.py\n    + sle15sp0/ucodeintel_150-000019635.py\n- Renamed pattern files for filename standard\n  * Renamed patterns/SLE/sle15all/scc-expired.py to patterns/SLE/sle15all/bhc-scc-expired.py\n  * Renamed /SLE/sle15all/scc-registered.py to patterns/SLE/sle15all/bhc-scc-registered.py\n- Updated regular patterns:\n  * sle15all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n    missing physical volumes\n\nsca-patterns-sle12:\n\n- Version update from 1.0.2 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n  * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n  * Added Video link to coredumpctl-000018634.py\n  * Added video links to patterns (bsc#1190460): \n    + bhc-scc-expired.py,  bhc-scc-registered.py, bhc-diskused-00001.pl, bhc-memused-00001.pl\n  * Fixed crosstalk message strings (bsc#1186312)\n  * Fixed metadata tags for scc-registered.py\n  * Removed outdated TID2 link in bhc-diskused-00001.pl (bsc#1190260)\n  * Requires Core library 1.3.3 which contains Core.logFullFile function\n  * Updated registration link in bhc-scc-registered.py\n  * Updated renewal link in bhc-scc-expired.py\n  * Updated scc-registered.py pattern to fix registration detection\n- New security announcement patterns:\n  * Apr 2022 (53) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n    SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n    SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n    SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n    SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n    SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n    SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n    SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n    SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n    SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1\n  * Mar 2022 (127) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n    SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n    SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n    SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n    SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n    SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n    SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n    SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n    SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n    SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n    SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n    SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n    SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n    SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n    SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n    SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n    SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n    SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n    SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n    SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n    SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n    SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n    SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n    SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n    SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1\n  * Feb 2022 (169) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n    SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n    SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n    SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n    SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n    SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n    SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n    SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n    SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n    SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n    SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n    SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n    SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n    SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n    SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n    SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n    SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n    SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n    SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n    SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n    SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n    SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n    SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n    SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n    SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1 \n    SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1\n    SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1\n    SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1\n    SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1\n    SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1\n    SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1\n    SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1\n    SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1\n  * Jan 2022 (218) for SUSE-SU-2022:1254-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1294-1 SUSE-SU-2022:1151-1\n    SUSE-SU-2022:1094-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1478-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1\n    SUSE-SU-2022:1168-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1272-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1266-1\n    SUSE-SU-2022:1474-1 SUSE-SU-2022:1475-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1\n    SUSE-SU-2022:1417-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1285-1 SUSE-SU-2022:1105-1 SUSE-SU-2022:1294-1\n    SUSE-SU-2022:1258-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n    SUSE-SU-2022:1312-1 SUSE-SU-2022:1217-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1267-1 SUSE-SU-2022:1275-1\n    SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1429-1 SUSE-SU-2022:1160-1 SUSE-SU-2022:1408-1\n    SUSE-SU-2022:1294-1 SUSE-SU-2022:1129-1 SUSE-SU-2022:1113-1 SUSE-SU-2022:1308-1 SUSE-SU-2022:1168-1\n    SUSE-SU-2022:1440-1 SUSE-SU-2022:1312-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1270-1 SUSE-SU-2022:1275-1\n    SUSE-SU-2022:1123-1 SUSE-SU-2022:1306-1 SUSE-SU-2022:1289-1 SUSE-SU-2022:1428-1 SUSE-SU-2022:0733-1\n    SUSE-SU-2022:1023-1 SUSE-SU-2022:0939-1 SUSE-SU-2022:0811-1 SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1\n    SUSE-SU-2022:0895-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1\n    SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:0913-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n    SUSE-SU-2022:1024-1 SUSE-SU-2022:0765-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0730-1\n    SUSE-SU-2022:0678-1 SUSE-SU-2022:0677-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1 SUSE-SU-2022:0908-1\n    SUSE-SU-2022:0881-1 SUSE-SU-2022:0928-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1062-1 SUSE-SU-2022:0811-1\n    SUSE-SU-2022:0690-1 SUSE-SU-2022:0784-1 SUSE-SU-2022:0860-1 SUSE-SU-2022:0857-1 SUSE-SU-2022:0822-1\n    SUSE-SU-2022:0777-1 SUSE-SU-2022:0782-1 SUSE-SU-2022:0820-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1\n    SUSE-SU-2022:1024-1 SUSE-SU-2022:0910-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n    SUSE-SU-2022:0908-1 SUSE-SU-2022:0918-1 SUSE-SU-2022:0733-1 SUSE-SU-2022:1043-1 SUSE-SU-2022:0811-1\n    SUSE-SU-2022:0690-1 SUSE-SU-2022:0854-1 SUSE-SU-2022:0822-1 SUSE-SU-2022:0777-1 SUSE-SU-2022:0820-1\n    SUSE-SU-2022:1036-1 SUSE-SU-2022:1026-1 SUSE-SU-2022:1025-1 SUSE-SU-2022:1024-1 SUSE-SU-2022:1012-1\n    SUSE-SU-2022:1003-1 SUSE-SU-2022:0668-1 SUSE-SU-2022:0667-1 SUSE-SU-2022:0653-1 SUSE-SU-2022:0762-1\n    SUSE-SU-2022:0762-1 SUSE-SU-2022:0871-1 SUSE-SU-2022:0909-1 SUSE-SU-2022:0842-1 SUSE-SU-2022:0698-1\n    SUSE-SU-2022:0918-1 SUSE-SU-2022:1044-1 SUSE-SU-2022:0882-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0469-1\n    SUSE-SU-2022:0504-1 SUSE-SU-2022:0478-1 SUSE-SU-2022:0576-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1\n    SUSE-SU-2022:0323-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1 SUSE-SU-2022:0372-1 SUSE-SU-2022:0561-1\n    SUSE-SU-2022:0495-1 SUSE-SU-2022:0440-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0331-1 SUSE-SU-2022:0478-1\n    SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1 SUSE-SU-2022:0441-1\n    SUSE-SU-2022:0271-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1 SUSE-SU-2022:0542-1 SUSE-SU-2022:0359-1\n    SUSE-SU-2022:0478-1 SUSE-SU-2022:0575-1 SUSE-SU-2022:0496-1 SUSE-SU-2022:0505-1 SUSE-SU-2022:0565-1\n    SUSE-SU-2022:0552-1 SUSE-SU-2022:0329-1 SUSE-SU-2022:0328-1 SUSE-SU-2022:0327-1 SUSE-SU-2022:0325-1\n    SUSE-SU-2022:0271-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0362-1 SUSE-SU-2022:0495-1 SUSE-SU-2022:0358-1\n    SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0110-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0060-1\n    SUSE-SU-2022:0118-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0061-1 SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1\n    SUSE-SU-2022:0212-1 SUSE-SU-2022:0032-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0080-1 SUSE-SU-2022:0068-1\n    SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0081-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0160-1\n    SUSE-SU-2022:0145-1 SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1\n    SUSE-SU-2022:0030-1 SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0042-1 SUSE-SU-2022:0034-1\n    SUSE-SU-2022:0166-1 SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1\n    SUSE-SU-2022:0161-1 SUSE-SU-2022:0142-1 SUSE-SU-2022:0202-1 SUSE-SU-2022:0189-1 SUSE-SU-2022:0030-1\n    SUSE-SU-2022:0115-1 SUSE-SU-2022:0212-1 SUSE-SU-2022:0041-1 SUSE-SU-2022:0034-1 SUSE-SU-2022:0166-1\n    SUSE-SU-2022:0107-1 SUSE-SU-2022:0179-1 SUSE-SU-2022:0065-1 SUSE-SU-2022:0145-1\n  * Jun 2021 (80) for SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1929-1 SUSE-SU-2021:1838-1\n    SUSE-SU-2021:1906-1 SUSE-SU-2021:1880-1 SUSE-SU-2021:1837-1 SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1\n    SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1\n    SUSE-SU-2021:2135-1 SUSE-SU-2021:1957-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2016-1 SUSE-SU-2021:1913-1\n    SUSE-SU-2021:1887-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1959-1 SUSE-SU-2021:1822-1\n    SUSE-SU-2021:2137-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1\n    SUSE-SU-2021:2014-1 SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1947-1\n    SUSE-SU-2021:1842-1 SUSE-SU-2021:2152-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1\n    SUSE-SU-2021:1830-1 SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:1891-1\n    SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1 SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1\n    SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1 SUSE-SU-2021:2006-1 SUSE-SU-2021:1900-1 SUSE-SU-2021:2014-1\n    SUSE-SU-2021:1990-1 SUSE-SU-2021:1930-1 SUSE-SU-2021:1906-1 SUSE-SU-2021:1894-1 SUSE-SU-2021:1842-1\n    SUSE-SU-2021:2119-1 SUSE-SU-2021:2159-1 SUSE-SU-2021:1886-1 SUSE-SU-2021:1892-1 SUSE-SU-2021:1830-1\n    SUSE-SU-2021:2180-1 SUSE-SU-2021:2135-1 SUSE-SU-2021:2156-1 SUSE-SU-2021:2060-1 SUSE-SU-2021:2042-1\n    SUSE-SU-2021:2026-1 SUSE-SU-2021:1870-1 SUSE-SU-2021:1865-1 SUSE-SU-2021:1980-1 SUSE-SU-2021:1875-1\n    SUSE-SU-2021:1960-1 SUSE-SU-2021:1822-1 SUSE-SU-2021:1943-1 SUSE-SU-2021:1494-2 SUSE-SU-2021:2175-1\n    SUSE-SU-2021:2006-1\n  * May 2021 (39) for SUSE-SU-2021:1580-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1490-1 SUSE-SU-2021:1783-1\n    SUSE-SU-2021:1782-1 SUSE-SU-2021:1576-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1524-1 SUSE-SU-2021:1766-1\n    SUSE-SU-2021:1595-1 SUSE-SU-2021:1572-1 SUSE-SU-2021:1760-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1\n    SUSE-SU-2021:1645-1 SUSE-SU-2021:1763-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1494-1 SUSE-SU-2021:1648-1\n    SUSE-SU-2021:1492-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1596-1 SUSE-SU-2021:1646-1\n    SUSE-SU-2021:1813-1 SUSE-SU-2021:1645-1 SUSE-SU-2021:1786-1 SUSE-SU-2021:1468-1 SUSE-SU-2021:1492-1\n    SUSE-SU-2021:1621-1 SUSE-SU-2021:1658-1 SUSE-SU-2021:1623-1 SUSE-SU-2021:1646-1 SUSE-SU-2021:1813-1\n    SUSE-SU-2021:1645-1 SUSE-SU-2021:1469-1 SUSE-SU-2021:1621-1 SUSE-SU-2021:1617-1 SUSE-SU-2021:1469-1\n  * Apr 2021 (69) for SUSE-SU-2021:1181-1 SUSE-SU-2021:1023-1 SUSE-SU-2021:1274-1 SUSE-SU-2021:1438-1\n    SUSE-SU-2021:1242-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1396-1 SUSE-SU-2021:1325-1\n    SUSE-SU-2021:1152-1 SUSE-SU-2021:1125-1 SUSE-SU-2021:1248-1 SUSE-SU-2021:1210-1 SUSE-SU-2021:1175-1\n    SUSE-SU-2021:1435-1 SUSE-SU-2021:1314-1 SUSE-SU-2021:1277-1 SUSE-SU-2021:1030-1 SUSE-SU-2021:1165-1\n    SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1174-1 SUSE-SU-2021:1159-1 SUSE-SU-2021:1315-1\n    SUSE-SU-2021:1180-1 SUSE-SU-2021:1251-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1241-1 SUSE-SU-2021:1429-1\n    SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1 SUSE-SU-2021:1435-1\n    SUSE-SU-2021:1165-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1\n    SUSE-SU-2021:1252-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1273-1 SUSE-SU-2021:1240-1 SUSE-SU-2021:1401-1\n    SUSE-SU-2021:1399-1 SUSE-SU-2021:1373-1 SUSE-SU-2021:1341-1 SUSE-SU-2021:1325-1 SUSE-SU-2021:1152-1\n    SUSE-SU-2021:1075-1 SUSE-SU-2021:1074-1 SUSE-SU-2021:1435-1 SUSE-SU-2021:1111-1 SUSE-SU-2021:1453-1\n    SUSE-SU-2021:1189-1 SUSE-SU-2021:1187-1 SUSE-SU-2021:1431-1 SUSE-SU-2021:1267-1 SUSE-SU-2021:1442-1\n    SUSE-SU-2021:1439-1 SUSE-SU-2021:1305-1 SUSE-SU-2021:1401-1 SUSE-SU-2021:1399-1 SUSE-SU-2021:1325-1\n    SUSE-SU-2021:1152-1 SUSE-SU-2021:1148-1 SUSE-SU-2021:1145-1 SUSE-SU-2021:1453-1 SUSE-SU-2021:1189-1\n  * Mar 2021 New Security Announcement Patterns (79) for SUSE-SU-2021:0990-1 SUSE-SU-2021:0720-1\n    SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0975-1 SUSE-SU-2021:0776-1 SUSE-SU-2021:0794-1\n    SUSE-SU-2021:0886-1 SUSE-SU-2021:0887-1 SUSE-SU-2021:0675-1 SUSE-SU-2021:0987-1 SUSE-SU-2021:0954-1\n    SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0998-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0663-1\n    SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0742-1 SUSE-SU-2021:0739-1\n    SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0713-1 SUSE-SU-2021:0779-1\n    SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1 SUSE-SU-2021:0988-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1\n    SUSE-SU-2020:2173-2 SUSE-SU-2021:0954-1 SUSE-SU-2021:0752-1 SUSE-SU-2021:0725-1 SUSE-SU-2021:0693-1\n    SUSE-SU-2021:0663-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0736-1\n    SUSE-SU-2021:0681-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1 SUSE-SU-2021:0929-1\n    SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2 SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1\n    SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1\n    SUSE-SU-2021:0743-1 SUSE-SU-2021:0682-1 SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1 SUSE-SU-2021:0745-1\n    SUSE-SU-2021:0929-1 SUSE-SU-2021:0928-1 SUSE-SU-2021:0794-1 SUSE-SU-2021:0675-1 SUSE-SU-2020:2173-2\n    SUSE-SU-2021:0939-1 SUSE-SU-2021:0693-1 SUSE-SU-2021:0932-1 SUSE-SU-2021:0999-1 SUSE-SU-2021:0999-1\n    SUSE-SU-2021:0667-1 SUSE-SU-2021:0870-1 SUSE-SU-2021:0835-1 SUSE-SU-2021:0744-1 SUSE-SU-2021:0679-1\n    SUSE-SU-2021:0801-1 SUSE-SU-2021:0756-1\n- New regular patterns:\n  * sle12sp5/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)\n  * sle12sp5/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)\n  * sle12sp5/systemd-current-failed-7017137.py: Check for failed systemd services\n  * sle12sp5/systemd_SUSE-SU-2021_2405-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n  * sle12sp5/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n    server (bsc#1183464)\n  * sle12sp5/qemu_SUSE-SU-2021_2448-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n  * sle12sp5/python-py_SUSE-SU-2021_2236-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n  * sle12sp5/permissions_SUSE-SU-2021_2280-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 Service Pack 5\n  * sle12sp5/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from\n    SUSE Linux Enterprise 15 Service Pack 2 (bsc#1176375)\n  * sle12sp5/nfstimeout_125-000019943.py: Delayed outgoing packets causing NFS timeouts (bsc#1183405)\n  * sle12sp5/nfsperf-125-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)\n  * sle12sp5/nfsipv6_125-000019618.py: Timeout when attempting NFS mount over IPv6 (bsc#1144162)\n  * sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed (bsc#1175623)\n  * sle12sp5/linuxptp_SUSE-SU-2021_2545-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n  * sle12sp5/kgraft-patch_SUSE-SU-2021_2462-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n  * sle12sp5/kgraft-patch_SUSE-SU-2021_2389-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n  * sle12sp5/kgraft-patch_SUSE-SU-2021_2324-1_12.5.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP5\n  * sle12sp5/kernel_SUSE-SU-2021_2416-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n  * sle12sp5/kernel_SUSE-SU-2021_2407-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n  * sle12sp5/kernel_SUSE-SU-2021_2321-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n  * sle12sp5/intelpstate_125-000020273.py: Frequency scaling driver intel_pstate not loading on some Intel Xeon\n    Scalable processors (bsc#1185758)\n  * sle12sp5/glibc_SUSE-SU-2021_2480-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n  * sle12sp5/ghostcat_125-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle12sp5/docore_125-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)\n  * sle12sp5/dbus-1_SUSE-SU-2021_2424-1_12.5.py: Security fixes for SUSE Linux Enterprise 12 SP5\n  * sle12sp5/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can\u0027t install (bsc#1187508)\n  * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n  * sle12sp5/btrfscrash-125-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n  * sle12sp4/vmtools-000004682.py: Extensive logging in vmware-vmsvc-root.log with open-vm-tools (bsc#1162119)\n  * sle12sp4/tcpdumpcore-000019666.py: Running tcpdump on a SUSE Linux Enterprise 12 Service Pack 4 System with Kernel\n     4.12.14-95.48-default may crash the system (bsc#1176579)\n  * sle12sp4/tailf-000019885.py: Aborting tailf causes bash session to be corrupted (bsc#1177369)\n  * sle12sp4/systemd-current-failed-7017137.py: Check for failed systemd services\n  * sle12sp4/systemd_SUSE-SU-2021_2423-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n  * sle12sp4/sdagentconfig-000020301.py: SCA Appliance configuration reports ERROR 2002 HY000 Cannot connect to MySQL\n    server (bsc#1183464)\n  * sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible\n  * sle12sp4/nobarrier-000020240.py: XFS nobarrier option has been completely deprecated starting from SUSE Linux \n    Enterprise 15 Service Pack 2 (bsc#1176375)\n  * sle12sp4/nfsperf-124-000019615.py: Performance loss when writing large files over NFS (bsc#1163403)\n  * sle12sp4/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n  * sle12sp4/linuxptp_SUSE-SU-2021_2443-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n  * sle12sp4/kgraft-patch_SUSE-SU-2021_2546-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS\n  * sle12sp4/kgraft-patch_SUSE-SU-2021_2389-1_12.4.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP4 LTSS\n  * sle12sp4/kernel_SUSE-SU-2021_2422-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n  * sle12sp4/ghostcat_124-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle12sp4/docore_124-000019881.py: System crash in do_coredump() when a process is restarted (bsc#1182194)\n  * sle12sp4/curl_SUSE-SU-2021_2425-1_12.4.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP4 LTSS\n  * sle12sp4/cronlimit-000020338.py: crontab - More than 1000 entries in crontab file, can\u0027t install (bsc#1187508)\n  * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n  * sle12sp4/btrfscrash-124-000019638.py: System crash during a BTRFS maintenance task (bsc#1163508)\n  * sle12sp3/systemd-current-failed-7017137.py: Check for failed systemd services\n  * sle12sp3/systemd_SUSE-SU-2021_2423-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS\n  * sle12sp3/mpiofindpaths-000019511.py: Using the find_multipaths yes option in multipath.conf (bsc#1138452)\n  * sle12sp3/linuxptp_SUSE-SU-2021_2443-1_12.3.ltss.py: Security fixes for SUSE Linux Enterprise 12 SP3 LTSS\n  * sle12sp3/kgraft-patch_SUSE-SU-2021_2563-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n  * sle12sp3/kgraft-patch_SUSE-SU-2021_2538-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n  * sle12sp3/kgraft-patch_SUSE-SU-2021_2451-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n  * sle12sp3/kgraft-patch_SUSE-SU-2021_2433-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n  * sle12sp3/kgraft-patch_SUSE-SU-2021_2389-1_12.3.ltss.py: Security fixes for SUSE Linux Kernel Live Patch 12 SP3 LTSS\n  * sle12sp3/ghostcat_123-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle12sp2/systemd-current-failed-7017137.py: Check for failed systemd services\n  * sle12sp2/ghostcat_122-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle12sp1/systemd-current-failed-7017137.py: Check for failed systemd services\n  * sle12sp1/ghostcat_121-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle12sp0/systemd-current-failed-7017137.py: Check for failed systemd services\n  * sle12all/zypproxy-000020275.py: zypper commands return Error code HTTP response 0\n  * sle12all/zerologon-000019713.py: Zerologon aka CVE-2020-1472 (bsc#1176579)\n  * sle12all/sysdjobs-000020261.py: Troubleshooting systemd jobs that are hung or stuck\n  * sle12all/softlock-000018705.py: soft lockup messages about\n  * sle12all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n  * sle12all/scatool-000020253.py: scatool fails to analyze supportconfigs with xz compression (bsc#1186316)\n  * sle12all/postfix-000020356.py: Postfix fails to start with IPv6 disabled\n  * sle12all/lvmsnapshot-000019858.py: LVM snapshot changed state to Invalid and should be removed\n  * sle12all/lvm-volume-list-7016683.py: Fixed execution error\n  * sle12all/iscsimnts-000019648.py: Proper mount options for iSCSI drives\n  * sle12all/coredumpctl-000018634.py: How to obtain systemd service core dumps\n  * sle12all/btrfsmaster-000018779.py: BTRFS Master TID\n  * sle12all/btrfscron-000019583.py: After upgrading BTRFS cron jobs are not working anymore (bsc#1159891)\n  * sle12all/blacklist-000019607.py: System exit to emergency shell at boot with multipath enabled\n  * CVE-2020-12351, CVE-2020-12352, CVE-2020-24490: BleedingTooth\n    + sle12sp5/bleedingtooth_125-000019735.py\n    + sle12sp4/bleedingtooth_124-000019735.py\n    + sle12sp3/bleedingtooth_123-000019735.py\n    + sle12sp2/bleedingtooth_122-000019735.py\n  * CVE-2020-0548, CVE-2020-0549: L1D data cache eviction and Vector Register sampling (bsc#1156353)\n    + sle12sp5/ucodeintel_125-000019635.py\n    + sle12sp4/ucodeintel_124-000019635.py\n    + sle12sp3/ucodeintel_123-000019635.py\n    + sle12sp2/ucodeintel_122-000019635.py\n  * CVE-2020-0543: Special Register Buffer Data Sampling aka CrossTalk (bsc#1154824)\n    + sle12sp5/crosstalk_125-000019643.py\n    + sle12sp4/crosstalk_124-000019643.py\n    + sle12sp3/crosstalk_123-000019643.py\n    + sle12sp2/crosstalk_122-000019643.py\n- Updated patterns:\n  * sle12all/scc-expired.py: Identify if SCC registrations have expired\n  * sle12all/lvm-00003.pl: Physical volumes can be removed or damaged and appear missing. This pattern looks for\n    missing physical volumes\n  * sle12all/lvm-00004.pl: LMV Check sum errors may indicate corrupted LVM metadata\n  * sle12all/lvm-00005.pl: Duplicate volume groups are usually a configuration issue\n- Renamed patterns for file standard:\n  * Renamed patterns/SLE/sle12all/scc-expired.py to patterns/SLE/sle12all/bhc-scc-expired.py\n  * Renamed patterns/SLE/sle12all/scc-registered.py to patterns/SLE/sle12all/bhc-scc-registered.py\n- Deleted regular patterns (1)\n  * sle12all/systemd-current-failed-7017137.py: Moved to service packs with fixes (bsc#1187983)\n  * sle12all/bhc-scc.sh: Pattern removed (bsc#1184594)\n  * sle12all/pdc-00001.pl: Pattern removed OES Dependent\n  * sle12all/pdc-00002.pl: Pattern removed OES Dependent\n  * sle12all/lvm-00001.pl: Pattern removed\n  * sle12all/lvm-00002.pl: Pattern removed\n\nsca-patterns-sle11:\n\n- Version update from 1.3.1 to 1.5.1 to implement the conversion of SCA Tool to Python3 (jsc#SLE-25064, jsc#SLE-24335):\n  * Convert SCA Tool from Python2 to Python3 (bsc#1191005, SLE-21579)\n  * Removed OES dependent patterns (bsc#1196873)\n- New security announcement patterns:\n  * Apr 2022 (5) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1 \n    SUSE-SU-2022:14951-1\n  * Mar 2022 (19) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n    SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n    SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n    SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n  * Feb 2022 (27) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n    SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n    SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n    SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n    SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1\n    SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1\n  * Jan 2022 (34) for SUSE-SU-2022:14938-1 SUSE-SU-2022:14943-1 SUSE-SU-2022:14936-1 SUSE-SU-2022:14941-1\n    SUSE-SU-2022:14951-1 SUSE-SU-2022:14910-1 SUSE-SU-2022:14929-1 SUSE-SU-2022:14908-1 SUSE-SU-2022:14914-1\n    SUSE-SU-2022:14915-1 SUSE-SU-2022:14906-1 SUSE-SU-2022:14904-1 SUSE-SU-2022:14909-1 SUSE-SU-2022:14905-1\n    SUSE-SU-2022:14927-1 SUSE-SU-2022:14923-1 SUSE-SU-2022:14934-1 SUSE-SU-2022:14903-1 SUSE-SU-2022:14924-1\n    SUSE-SU-2022:14889-1 SUSE-SU-2022:14886-1 SUSE-SU-2022:14888-1 SUSE-SU-2022:14890-1 SUSE-SU-2022:14887-1\n    SUSE-SU-2022:14896-1 SUSE-SU-2022:14884-1 SUSE-SU-2022:14894-1 SUSE-SU-2022:14880-1 SUSE-SU-2022:14881-1\n    SUSE-SU-2022:14872-1 SUSE-SU-2022:14875-1 SUSE-SU-2022:14878-1 SUSE-SU-2022:14882-1 SUSE-SU-2022:14879-1\n  * Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1\n    SUSE-SU-2021:14761-1\n  * Jun 2021 (12) for SUSE-SU-2021:14747-1 SUSE-SU-2021:14748-1 SUSE-SU-2021:14744-1 SUSE-SU-2021:14757-1\n    SUSE-SU-2021:14743-1 SUSE-SU-2021:14758-1 SUSE-SU-2021:14751-1 SUSE-SU-2021:14750-1 SUSE-SU-2021:14740-1\n    SUSE-SU-2021:14760-1 SUSE-SU-2021:14759-1 SUSE-SU-2021:14749-1\n  * May 2021 (5) for SUSE-SU-2021:14729-1 SUSE-SU-2021:14724-1 SUSE-SU-2021:14738-1 SUSE-SU-2021:14728-1\n    SUSE-SU-2021:14714-1\n  * Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1\n    SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1\n    SUSE-SU-2021:14692-1\n- New regular patterns:\n  * sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692)\n  * sle11all/softlock-000018705.py: soft lockup messages about\n  * sle11all/sizingbtrfs-000018798.py: How to resize/extend a btrfs formatted root partition\n  * sle11all/btrfsmaster-000018779.py: BTRFS Master TID\n  * CVE-2020-0543: sle11sp4/crosstalk_114-000019643.py: Special Register Buffer Data Sampling aka CrossTalk\n    (bsc#1154824)\n- Deleted regular patterns:\n  * sle11all/bhc-scc.sh: Pattern removed (bsc#1184594)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2022-4496,SUSE-SLE-Module-Server-Applications-15-SP3-2022-4496,openSUSE-SLE-15.3-2022-4496",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-fu-2022_4496-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-FU-2022:4496-1",
        "url": "https://www.suse.com/support/update/announcement//suse-fu-20224496-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-FU-2022:4496-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2022-December/026906.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1045605",
        "url": "https://bugzilla.suse.com/1045605"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1124793",
        "url": "https://bugzilla.suse.com/1124793"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1131489",
        "url": "https://bugzilla.suse.com/1131489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1138452",
        "url": "https://bugzilla.suse.com/1138452"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1144162",
        "url": "https://bugzilla.suse.com/1144162"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1152800",
        "url": "https://bugzilla.suse.com/1152800"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154768",
        "url": "https://bugzilla.suse.com/1154768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154824",
        "url": "https://bugzilla.suse.com/1154824"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155181",
        "url": "https://bugzilla.suse.com/1155181"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1155990",
        "url": "https://bugzilla.suse.com/1155990"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1156353",
        "url": "https://bugzilla.suse.com/1156353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1157778",
        "url": "https://bugzilla.suse.com/1157778"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1158890",
        "url": "https://bugzilla.suse.com/1158890"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159356",
        "url": "https://bugzilla.suse.com/1159356"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1159891",
        "url": "https://bugzilla.suse.com/1159891"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1162119",
        "url": "https://bugzilla.suse.com/1162119"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163403",
        "url": "https://bugzilla.suse.com/1163403"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1163508",
        "url": "https://bugzilla.suse.com/1163508"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1164692",
        "url": "https://bugzilla.suse.com/1164692"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1167689",
        "url": "https://bugzilla.suse.com/1167689"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1175623",
        "url": "https://bugzilla.suse.com/1175623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176021",
        "url": "https://bugzilla.suse.com/1176021"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176140",
        "url": "https://bugzilla.suse.com/1176140"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176375",
        "url": "https://bugzilla.suse.com/1176375"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176579",
        "url": "https://bugzilla.suse.com/1176579"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177369",
        "url": "https://bugzilla.suse.com/1177369"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177753",
        "url": "https://bugzilla.suse.com/1177753"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1179170",
        "url": "https://bugzilla.suse.com/1179170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1180894",
        "url": "https://bugzilla.suse.com/1180894"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1182194",
        "url": "https://bugzilla.suse.com/1182194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1182905",
        "url": "https://bugzilla.suse.com/1182905"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1182917",
        "url": "https://bugzilla.suse.com/1182917"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183405",
        "url": "https://bugzilla.suse.com/1183405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183464",
        "url": "https://bugzilla.suse.com/1183464"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1184594",
        "url": "https://bugzilla.suse.com/1184594"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185357",
        "url": "https://bugzilla.suse.com/1185357"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185593",
        "url": "https://bugzilla.suse.com/1185593"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185594",
        "url": "https://bugzilla.suse.com/1185594"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185684",
        "url": "https://bugzilla.suse.com/1185684"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185758",
        "url": "https://bugzilla.suse.com/1185758"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185857",
        "url": "https://bugzilla.suse.com/1185857"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186034",
        "url": "https://bugzilla.suse.com/1186034"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186312",
        "url": "https://bugzilla.suse.com/1186312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186316",
        "url": "https://bugzilla.suse.com/1186316"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186317",
        "url": "https://bugzilla.suse.com/1186317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186420",
        "url": "https://bugzilla.suse.com/1186420"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186442",
        "url": "https://bugzilla.suse.com/1186442"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1186792",
        "url": "https://bugzilla.suse.com/1186792"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187194",
        "url": "https://bugzilla.suse.com/1187194"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187508",
        "url": "https://bugzilla.suse.com/1187508"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187983",
        "url": "https://bugzilla.suse.com/1187983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189394",
        "url": "https://bugzilla.suse.com/1189394"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189483",
        "url": "https://bugzilla.suse.com/1189483"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1189889",
        "url": "https://bugzilla.suse.com/1189889"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190260",
        "url": "https://bugzilla.suse.com/1190260"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190460",
        "url": "https://bugzilla.suse.com/1190460"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191005",
        "url": "https://bugzilla.suse.com/1191005"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191199",
        "url": "https://bugzilla.suse.com/1191199"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193878",
        "url": "https://bugzilla.suse.com/1193878"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196730",
        "url": "https://bugzilla.suse.com/1196730"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1196873",
        "url": "https://bugzilla.suse.com/1196873"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0543 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0543/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0548 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0548/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-0549 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-0549/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12351 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12351/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-12352 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-12352/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-1472 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-1472/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-24490 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-24490/"
      }
    ],
    "title": "Feature update for SCA patterns",
    "tracking": {
      "current_release_date": "2022-12-15T09:43:54Z",
      "generator": {
        "date": "2022-12-15T09:43:54Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-FU-2022:4496-1",
      "initial_release_date": "2022-12-15T09:43:54Z",
      "revision_history": [
        {
          "date": "2022-12-15T09:43:54Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch",
                "product": {
                  "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch",
                  "product_id": "sca-patterns-base-1.5.0-150300.10.3.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
                "product": {
                  "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
                  "product_id": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
                "product": {
                  "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
                  "product_id": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
                "product": {
                  "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
                  "product_id": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
                "product": {
                  "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
                  "product_id": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
                "product": {
                  "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
                  "product_id": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "sca-server-report-1.5.1-150300.11.3.1.noarch",
                "product": {
                  "name": "sca-server-report-1.5.1-150300.11.3.1.noarch",
                  "product_id": "sca-server-report-1.5.1-150300.11.3.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Server Applications 15 SP3",
                  "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-server-applications:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch"
        },
        "product_reference": "sca-patterns-base-1.5.0-150300.10.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch"
        },
        "product_reference": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch"
        },
        "product_reference": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch"
        },
        "product_reference": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch"
        },
        "product_reference": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch"
        },
        "product_reference": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-server-report-1.5.1-150300.11.3.1.noarch as component of SUSE Linux Enterprise Module for Server Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch"
        },
        "product_reference": "sca-server-report-1.5.1-150300.11.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Server Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-base-1.5.0-150300.10.3.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch"
        },
        "product_reference": "sca-patterns-base-1.5.0-150300.10.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch"
        },
        "product_reference": "sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch"
        },
        "product_reference": "sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch"
        },
        "product_reference": "sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch"
        },
        "product_reference": "sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch"
        },
        "product_reference": "sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "sca-server-report-1.5.1-150300.11.3.1.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
        },
        "product_reference": "sca-server-report-1.5.1-150300.11.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-0543",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0543"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0543",
          "url": "https://www.suse.com/security/cve/CVE-2020-0543"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1154824 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1154824"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172205 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172205"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172206 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172206"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172207 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172207"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1172770 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1172770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2020-0543",
          "url": "https://bugzilla.suse.com/1201877"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-15T09:43:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0543"
    },
    {
      "cve": "CVE-2020-0548",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0548"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Cleanup errors in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0548",
          "url": "https://www.suse.com/security/cve/CVE-2020-0548"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156353 for CVE-2020-0548",
          "url": "https://bugzilla.suse.com/1156353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-15T09:43:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0548"
    },
    {
      "cve": "CVE-2020-0549",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-0549"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Cleanup errors in some data cache evictions for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-0549",
          "url": "https://www.suse.com/security/cve/CVE-2020-0549"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1156353 for CVE-2020-0549",
          "url": "https://bugzilla.suse.com/1156353"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-15T09:43:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-0549"
    },
    {
      "cve": "CVE-2020-12351",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12351"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12351",
          "url": "https://www.suse.com/security/cve/CVE-2020-12351"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177724 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1177724"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177729 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1177729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178397 for CVE-2020-12351",
          "url": "https://bugzilla.suse.com/1178397"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-15T09:43:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-12351"
    },
    {
      "cve": "CVE-2020-12352",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-12352"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper access control in BlueZ may allow an unauthenticated user to potentially enable information disclosure via adjacent access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-12352",
          "url": "https://www.suse.com/security/cve/CVE-2020-12352"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177725 for CVE-2020-12352",
          "url": "https://bugzilla.suse.com/1177725"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178398 for CVE-2020-12352",
          "url": "https://bugzilla.suse.com/1178398"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.1,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-15T09:43:54Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-12352"
    },
    {
      "cve": "CVE-2020-1472",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-1472"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "unknown",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-1472",
          "url": "https://www.suse.com/security/cve/CVE-2020-1472"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1176579 for CVE-2020-1472",
          "url": "https://bugzilla.suse.com/1176579"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-15T09:43:54Z",
          "details": "critical"
        }
      ],
      "title": "CVE-2020-1472"
    },
    {
      "cve": "CVE-2020-24490",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-24490"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Improper buffer restrictions in BlueZ may allow an unauthenticated user to potentially enable denial of service via adjacent access. This affects all Linux kernel versions that support BlueZ.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
          "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
          "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-24490",
          "url": "https://www.suse.com/security/cve/CVE-2020-24490"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177726 for CVE-2020-24490",
          "url": "https://bugzilla.suse.com/1177726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1177727 for CVE-2020-24490",
          "url": "https://bugzilla.suse.com/1177727"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "SUSE Linux Enterprise Module for Server Applications 15 SP3:sca-server-report-1.5.1-150300.11.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-base-1.5.0-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-hae-1.5.1-150300.10.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle11-1.5.1-150300.18.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle12-1.5.1-150300.3.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-sle15-1.5.1-150300.14.3.1.noarch",
            "openSUSE Leap 15.3:sca-patterns-suma-1.5.0-150300.9.3.1.noarch",
            "openSUSE Leap 15.3:sca-server-report-1.5.1-150300.11.3.1.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-12-15T09:43:54Z",
          "details": "important"
        }
      ],
      "title": "CVE-2020-24490"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…