Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package sca-patterns-sle12 for 
openSUSE:Factory checked in at 2021-03-28 11:55:04
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sca-patterns-sle12 (Old)
 and      /work/SRC/openSUSE:Factory/.sca-patterns-sle12.new.2401 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sca-patterns-sle12"

Sun Mar 28 11:55:04 2021 rev:12 rq:881400 version:1.0.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/sca-patterns-sle12/sca-patterns-sle12.changes    
2021-03-05 13:50:08.987887997 +0100
+++ 
/work/SRC/openSUSE:Factory/.sca-patterns-sle12.new.2401/sca-patterns-sle12.changes
  2021-03-28 11:57:09.612266344 +0200
@@ -2 +2,18 @@
-Thu Mar  4 03:02:23 UTC 2021 - jason.rec...@gmail.com
+Thu Mar 25 21:08:06 UTC 2021 - jason.rec...@suse.com
+
+- New regular patterns (5) for version 1.0.2
+  + sle12sp5/bleedingtooth_125-000019735.py: BleedingTooth aka CVE-2020-12351, 
CVE-2020-12352, and CVE-2020-24490
+  + sle12sp4/bleedingtooth_124-000019735.py: BleedingTooth aka CVE-2020-12351, 
CVE-2020-12352, and CVE-2020-24490
+  + sle12sp3/bleedingtooth_123-000019735.py: BleedingTooth aka CVE-2020-12351, 
CVE-2020-12352, and CVE-2020-24490
+  + sle12sp2/bleedingtooth_122-000019735.py: BleedingTooth aka CVE-2020-12351, 
CVE-2020-12352, and CVE-2020-24490
+  + sle12all/btrfscron-000019583.py: After upgrading to SLES 12 SP5 BTRFS cron 
jobs are not working anymore.
+
+-------------------------------------------------------------------
+Wed Mar 24 22:40:44 UTC 2021 - jason.rec...@suse.com
+
+- New regular patterns (2) for version 1.0.2
+  + sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion 
failed
+  + sle12sp4/plymouth-000019595.py: plymouth hang - login to console not 
possible
+
+-------------------------------------------------------------------
+Thu Mar  4 03:02:23 UTC 2021 - jason.rec...@suse.com
@@ -10 +27 @@
-Thu Feb 11 21:46:09 UTC 2021 - jason.rec...@gmail.com
+Thu Feb 11 21:46:09 UTC 2021 - jason.rec...@suse.com

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sca-patterns-sle12-1.0.2.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12all/btrfscron-000019583.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12all/btrfscron-000019583.py
--- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12all/btrfscron-000019583.py   
1970-01-01 01:00:00.000000000 +0100
+++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12all/btrfscron-000019583.py   
2021-03-25 20:06:33.166710188 +0100
@@ -0,0 +1,60 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019583
+# Description: After upgrading to SLES 12 SP5 BTRFS cron jobs are not working 
anymore.
+# Source:      Package Version Pattern Template v0.3.5
+# Options:     
SLE,Filesystem,Btrfs,000019583,1159891,btrfscron,btrfsmaintenance,0.2-15.1,0,1
+# Modified:    2021 Mar 25
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Filesystem"
+META_COMPONENT = "Btrfs"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019583|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1159891";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'btrfsmaintenance'
+RPM_VERSION_FIXED = '0.2-15.1'
+if( SUSE.packageInstalled(RPM_NAME) ):
+       INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+       if( INSTALLED_VERSION >= 0 ):
+               Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + 
RPM_NAME + "")
+       else:
+               Core.updateStatus(Core.WARN, "Weekly Btrfs cron jobs may fail, 
update system to apply fixes")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/bleedingtooth_122-000019735.py
 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/bleedingtooth_122-000019735.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/bleedingtooth_122-000019735.py
   1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/bleedingtooth_122-000019735.py
   2021-03-25 17:16:25.590193897 +0100
@@ -0,0 +1,65 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019735
+# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, 
CVE-2020-12352, and CVE-2020-24490
+# Source:      Package Version Pattern Template v0.3.5
+# Options:     
SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1
+# Distro:      SLES12 SP2
+# Modified:    2021 Mar 25
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Kernel"
+META_COMPONENT = "Bluetooth"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_BLUE = 'bluez'
+RPM_NAME = 'kernel-default'
+RPM_VERSION_FIXED = '4.4.121-92.146'
+if( SUSE.packageInstalled(RPM_BLUE) ):
+       if( SUSE.packageInstalled(RPM_NAME) ):
+               INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+               if( INSTALLED_VERSION >= 0 ):
+                       Core.updateStatus(Core.IGNORE, "Bug fixes applied for " 
+ RPM_NAME + "")
+               else:
+                       Core.updateStatus(Core.WARN, "Detected Security 
Vulnerability: BleedingTooth, update server to apply fixes")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not 
installed")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/bleedingtooth_123-000019735.py
 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/bleedingtooth_123-000019735.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/bleedingtooth_123-000019735.py
   1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/bleedingtooth_123-000019735.py
   2021-03-25 17:16:53.537449291 +0100
@@ -0,0 +1,65 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019735
+# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, 
CVE-2020-12352, and CVE-2020-24490
+# Source:      Package Version Pattern Template v0.3.5
+# Options:     
SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1
+# Distro:      SLES12 SP3
+# Modified:    2021 Mar 25
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Kernel"
+META_COMPONENT = "Bluetooth"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_BLUE = 'bluez'
+RPM_NAME = 'kernel-default'
+RPM_VERSION_FIXED = '4.4.180-94.135'
+if( SUSE.packageInstalled(RPM_BLUE) ):
+       if( SUSE.packageInstalled(RPM_NAME) ):
+               INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+               if( INSTALLED_VERSION >= 0 ):
+                       Core.updateStatus(Core.IGNORE, "Bug fixes applied for " 
+ RPM_NAME + "")
+               else:
+                       Core.updateStatus(Core.WARN, "Detected Security 
Vulnerability: BleedingTooth, update server to apply fixes")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not 
installed")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/bleedingtooth_124-000019735.py
 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/bleedingtooth_124-000019735.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/bleedingtooth_124-000019735.py
   1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/bleedingtooth_124-000019735.py
   2021-03-25 17:17:27.272549887 +0100
@@ -0,0 +1,65 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019735
+# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, 
CVE-2020-12352, and CVE-2020-24490
+# Source:      Package Version Pattern Template v0.3.5
+# Options:     
SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1
+# Distro:      SLES12 SP4
+# Modified:    2021 Mar 25
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Kernel"
+META_COMPONENT = "Bluetooth"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_BLUE = 'bluez'
+RPM_NAME = 'kernel-default'
+RPM_VERSION_FIXED = '4.12.14-95.65'
+if( SUSE.packageInstalled(RPM_BLUE) ):
+       if( SUSE.packageInstalled(RPM_NAME) ):
+               INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+               if( INSTALLED_VERSION >= 0 ):
+                       Core.updateStatus(Core.IGNORE, "Bug fixes applied for " 
+ RPM_NAME + "")
+               else:
+                       Core.updateStatus(Core.WARN, "Detected Security 
Vulnerability: BleedingTooth, update server to apply fixes")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not 
installed")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/plymouth-000019595.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/plymouth-000019595.py
--- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/plymouth-000019595.py    
1970-01-01 01:00:00.000000000 +0100
+++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/plymouth-000019595.py    
2021-03-24 23:37:16.964586519 +0100
@@ -0,0 +1,106 @@
+#!/usr/bin/python
+
+# Title:       Pattern for TID000019595
+# Description: plymouth hang - login to console not possible
+# Modified:    2021 Mar 24
+#
+##############################################################################
+# Copyright (C) 2021, SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+##############################################################################
+# Module Definition
+##############################################################################
+
+import os
+import re
+import Core
+import SUSE
+
+##############################################################################
+# Overriden (eventually or in part) from SDP::Core Module
+##############################################################################
+
+META_CLASS = "SLE"
+META_CATEGORY = "Login"
+META_COMPONENT = "Plymouth"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019595|META_LINK_TID2=https://www.suse.com/support/kb/doc/?id=000019853";
+
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def workAroundApplied():
+       fileOpen = "boot.txt"
+       section = "/proc/cmdline"
+       content = {}
+       CONFIRMED = re.compile("plymouth.enable=0", re.IGNORECASE)
+       if Core.getSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(content[line]):
+                               return True
+       return False
+
+def graphicalTarget():
+       fileOpen = "systemd.txt"
+       section = "/bin/ls -alR /etc/systemd/"
+       content = {}
+       CONFIRMED = re.compile("default\.target.*graphical\.target", 
re.IGNORECASE)
+       if Core.getSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(content[line]):
+                               return True
+       return False
+
+def plymouthRunning():
+       fileOpen = "systemd.txt"
+       section = "/bin/systemctl.*list-units"
+       content = {}
+       CONFIRMED = re.compile("plymouth-quit-wait.service.*start.*running", 
re.IGNORECASE)
+       if Core.getSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(content[line]):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+if( workAroundApplied() ):
+       Core.updateStatus(Core.IGNORE, "Workaround applied")
+else:
+       if( graphicalTarget() ):
+               if( plymouthRunning() ):
+                       Core.updateStatus(Core.WARN, "Plymouth hang may cause 
console login failure, consider disabling plymouth")
+               else:
+                       Core.updateStatus(Core.WARN, "Console login issue may 
occur, disable plymouth if needed")
+       else:
+               Core.updateStatus(Core.ERROR, "Not using graphical.target as 
default")
+
+Core.printPatternResults()
+
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/bleedingtooth_125-000019735.py
 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/bleedingtooth_125-000019735.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/bleedingtooth_125-000019735.py
   1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/bleedingtooth_125-000019735.py
   2021-03-25 17:17:48.903972854 +0100
@@ -0,0 +1,65 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019735
+# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, 
CVE-2020-12352, and CVE-2020-24490
+# Source:      Package Version Pattern Template v0.3.5
+# Options:     
SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1
+# Distro:      SLES12 SP5
+# Modified:    2021 Mar 25
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Kernel"
+META_COMPONENT = "Bluetooth"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_BLUE = 'bluez'
+RPM_NAME = 'kernel-default'
+RPM_VERSION_FIXED = '4.12.14-122.46'
+if( SUSE.packageInstalled(RPM_BLUE) ):
+       if( SUSE.packageInstalled(RPM_NAME) ):
+               INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+               if( INSTALLED_VERSION >= 0 ):
+                       Core.updateStatus(Core.IGNORE, "Bug fixes applied for " 
+ RPM_NAME + "")
+               else:
+                       Core.updateStatus(Core.WARN, "Detected Security 
Vulnerability: BleedingTooth, update server to apply fixes")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not 
installed")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/lscpu-000019784-12.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/lscpu-000019784-12.py
--- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/lscpu-000019784-12.py    
1970-01-01 01:00:00.000000000 +0100
+++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/lscpu-000019784-12.py    
2021-03-24 00:14:43.973277682 +0100
@@ -0,0 +1,87 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019784
+# Description: lscpu segfaults on IBM Power8 - Assertion failed
+# Source:      Package Version Pattern Template v0.3.5
+# Options:     
SLE,Utils,lscpu,000019784,1175623,lscpu,util-linux,2.33.2-4.6.1,0,1
+# Distro:      SLES12 SP5
+# Modified:    2021 Mar 23
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Utils"
+META_COMPONENT = "lscpu"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019784|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1175623";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def conditionConfirmed():
+       fileOpen = "crash.txt"
+       section = "coredumpctl list"
+       content = {}
+       CONFIRMED = re.compile("/usr/bin/lscpu", re.IGNORECASE)
+       if Core.getSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(content[line]):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'util-linux'
+RPM_VERSION_FIXED = '2.33.2-4.6.1'
+SERVER = SUSE.getHostInfo()
+POWER = re.compile("ppc64|s390", re.IGNORECASE)
+
+if POWER.search(SERVER['Architecture']):
+       if( SUSE.packageInstalled(RPM_NAME) ):
+               INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+               if( INSTALLED_VERSION >= 0 ):
+                       Core.updateStatus(Core.IGNORE, "Bug fixes applied for " 
+ RPM_NAME + "")
+               else:
+                       if( conditionConfirmed() ):
+                               Core.updateStatus(Core.CRIT, "Detected lscpu 
application crash, update server to apply fixes")
+                       else:
+                               Core.updateStatus(Core.WARN, "lscpu may crash, 
update server to apply fixes")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not 
installed")
+else:
+       Core.updateStatus(Core.ERROR,  "Invalid Architecture for Test Case - " 
+ SERVER['Architecture'])
+
+
+Core.printPatternResults()
+

Reply via email to