Recommended update for scap-security-guide

Announcement ID: SUSE-RU-2022:2013-1
Rating: moderate
References:
Affected Products:
  • SUSE Linux Enterprise High Performance Computing 12 SP5
  • SUSE Linux Enterprise Server 12 SP5
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5

An update that contains one feature can now be installed.

Description:

This update for scap-security-guide fixes the following issues:

scap-security-guide was updated to 0.1.61 (jsc#ECO-3319)

  • Stop building PCI-DSS-centric XCCDF benchmark for RHEL 7
  • Introduce OL9 product
  • Implement handling of logical expressions in platform definitions

Please note that SUSE supports only the DISA STIG, HIPAA and PCI-DSS profiles for SUSE Linux Enterprise Server 12 and 15.

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise High Performance Computing 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-2013=1
  • SUSE Linux Enterprise Server 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-2013=1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5
    zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-2013=1

Package List:

  • SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
    • scap-security-guide-ubuntu-0.1.61-3.26.1
    • scap-security-guide-debian-0.1.61-3.26.1
    • scap-security-guide-0.1.61-3.26.1
    • scap-security-guide-redhat-0.1.61-3.26.1
  • SUSE Linux Enterprise Server 12 SP5 (noarch)
    • scap-security-guide-ubuntu-0.1.61-3.26.1
    • scap-security-guide-debian-0.1.61-3.26.1
    • scap-security-guide-0.1.61-3.26.1
    • scap-security-guide-redhat-0.1.61-3.26.1
  • SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
    • scap-security-guide-ubuntu-0.1.61-3.26.1
    • scap-security-guide-debian-0.1.61-3.26.1
    • scap-security-guide-0.1.61-3.26.1
    • scap-security-guide-redhat-0.1.61-3.26.1

References: