Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package sca-patterns-sle12 for openSUSE:Factory checked in at 2021-03-28 11:55:04 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/sca-patterns-sle12 (Old) and /work/SRC/openSUSE:Factory/.sca-patterns-sle12.new.2401 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "sca-patterns-sle12" Sun Mar 28 11:55:04 2021 rev:12 rq:881400 version:1.0.2 Changes: -------- --- /work/SRC/openSUSE:Factory/sca-patterns-sle12/sca-patterns-sle12.changes 2021-03-05 13:50:08.987887997 +0100 +++ /work/SRC/openSUSE:Factory/.sca-patterns-sle12.new.2401/sca-patterns-sle12.changes 2021-03-28 11:57:09.612266344 +0200 @@ -2 +2,18 @@ -Thu Mar 4 03:02:23 UTC 2021 - jason.rec...@gmail.com +Thu Mar 25 21:08:06 UTC 2021 - jason.rec...@suse.com + +- New regular patterns (5) for version 1.0.2 + + sle12sp5/bleedingtooth_125-000019735.py: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 + + sle12sp4/bleedingtooth_124-000019735.py: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 + + sle12sp3/bleedingtooth_123-000019735.py: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 + + sle12sp2/bleedingtooth_122-000019735.py: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 + + sle12all/btrfscron-000019583.py: After upgrading to SLES 12 SP5 BTRFS cron jobs are not working anymore. + +------------------------------------------------------------------- +Wed Mar 24 22:40:44 UTC 2021 - jason.rec...@suse.com + +- New regular patterns (2) for version 1.0.2 + + sle12sp5/lscpu-000019784-12.py: lscpu segfaults on IBM Power8 - Assertion failed + + sle12sp4/plymouth-000019595.py: plymouth hang - login to console not possible + +------------------------------------------------------------------- +Thu Mar 4 03:02:23 UTC 2021 - jason.rec...@suse.com @@ -10 +27 @@ -Thu Feb 11 21:46:09 UTC 2021 - jason.rec...@gmail.com +Thu Feb 11 21:46:09 UTC 2021 - jason.rec...@suse.com ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ sca-patterns-sle12-1.0.2.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12all/btrfscron-000019583.py new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12all/btrfscron-000019583.py --- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12all/btrfscron-000019583.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12all/btrfscron-000019583.py 2021-03-25 20:06:33.166710188 +0100 @@ -0,0 +1,60 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019583 +# Description: After upgrading to SLES 12 SP5 BTRFS cron jobs are not working anymore. +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Filesystem,Btrfs,000019583,1159891,btrfscron,btrfsmaintenance,0.2-15.1,0,1 +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Filesystem" +META_COMPONENT = "Btrfs" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019583|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1159891" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_NAME = 'btrfsmaintenance' +RPM_VERSION_FIXED = '0.2-15.1' +if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + Core.updateStatus(Core.WARN, "Weekly Btrfs cron jobs may fail, update system to apply fixes") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/bleedingtooth_122-000019735.py new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/bleedingtooth_122-000019735.py --- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/bleedingtooth_122-000019735.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/bleedingtooth_122-000019735.py 2021-03-25 17:16:25.590193897 +0100 @@ -0,0 +1,65 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019735 +# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1 +# Distro: SLES12 SP2 +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "Bluetooth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_BLUE = 'bluez' +RPM_NAME = 'kernel-default' +RPM_VERSION_FIXED = '4.4.121-92.146' +if( SUSE.packageInstalled(RPM_BLUE) ): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + Core.updateStatus(Core.WARN, "Detected Security Vulnerability: BleedingTooth, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/bleedingtooth_123-000019735.py new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/bleedingtooth_123-000019735.py --- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/bleedingtooth_123-000019735.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/bleedingtooth_123-000019735.py 2021-03-25 17:16:53.537449291 +0100 @@ -0,0 +1,65 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019735 +# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1 +# Distro: SLES12 SP3 +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "Bluetooth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_BLUE = 'bluez' +RPM_NAME = 'kernel-default' +RPM_VERSION_FIXED = '4.4.180-94.135' +if( SUSE.packageInstalled(RPM_BLUE) ): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + Core.updateStatus(Core.WARN, "Detected Security Vulnerability: BleedingTooth, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/bleedingtooth_124-000019735.py new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/bleedingtooth_124-000019735.py --- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/bleedingtooth_124-000019735.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/bleedingtooth_124-000019735.py 2021-03-25 17:17:27.272549887 +0100 @@ -0,0 +1,65 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019735 +# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1 +# Distro: SLES12 SP4 +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "Bluetooth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_BLUE = 'bluez' +RPM_NAME = 'kernel-default' +RPM_VERSION_FIXED = '4.12.14-95.65' +if( SUSE.packageInstalled(RPM_BLUE) ): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + Core.updateStatus(Core.WARN, "Detected Security Vulnerability: BleedingTooth, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/plymouth-000019595.py new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/plymouth-000019595.py --- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/plymouth-000019595.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/plymouth-000019595.py 2021-03-24 23:37:16.964586519 +0100 @@ -0,0 +1,106 @@ +#!/usr/bin/python + +# Title: Pattern for TID000019595 +# Description: plymouth hang - login to console not possible +# Modified: 2021 Mar 24 +# +############################################################################## +# Copyright (C) 2021, SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +############################################################################## +# Module Definition +############################################################################## + +import os +import re +import Core +import SUSE + +############################################################################## +# Overriden (eventually or in part) from SDP::Core Module +############################################################################## + +META_CLASS = "SLE" +META_CATEGORY = "Login" +META_COMPONENT = "Plymouth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019595|META_LINK_TID2=https://www.suse.com/support/kb/doc/?id=000019853" + + +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) +############################################################################## +# Local Function Definitions +############################################################################## + +def workAroundApplied(): + fileOpen = "boot.txt" + section = "/proc/cmdline" + content = {} + CONFIRMED = re.compile("plymouth.enable=0", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +def graphicalTarget(): + fileOpen = "systemd.txt" + section = "/bin/ls -alR /etc/systemd/" + content = {} + CONFIRMED = re.compile("default\.target.*graphical\.target", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +def plymouthRunning(): + fileOpen = "systemd.txt" + section = "/bin/systemctl.*list-units" + content = {} + CONFIRMED = re.compile("plymouth-quit-wait.service.*start.*running", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +############################################################################## +# Main Program Execution +############################################################################## + +if( workAroundApplied() ): + Core.updateStatus(Core.IGNORE, "Workaround applied") +else: + if( graphicalTarget() ): + if( plymouthRunning() ): + Core.updateStatus(Core.WARN, "Plymouth hang may cause console login failure, consider disabling plymouth") + else: + Core.updateStatus(Core.WARN, "Console login issue may occur, disable plymouth if needed") + else: + Core.updateStatus(Core.ERROR, "Not using graphical.target as default") + +Core.printPatternResults() + + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/bleedingtooth_125-000019735.py new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/bleedingtooth_125-000019735.py --- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/bleedingtooth_125-000019735.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/bleedingtooth_125-000019735.py 2021-03-25 17:17:48.903972854 +0100 @@ -0,0 +1,65 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019735 +# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1 +# Distro: SLES12 SP5 +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "Bluetooth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_BLUE = 'bluez' +RPM_NAME = 'kernel-default' +RPM_VERSION_FIXED = '4.12.14-122.46' +if( SUSE.packageInstalled(RPM_BLUE) ): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + Core.updateStatus(Core.WARN, "Detected Security Vulnerability: BleedingTooth, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/lscpu-000019784-12.py new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/lscpu-000019784-12.py --- old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/lscpu-000019784-12.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/lscpu-000019784-12.py 2021-03-24 00:14:43.973277682 +0100 @@ -0,0 +1,87 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019784 +# Description: lscpu segfaults on IBM Power8 - Assertion failed +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Utils,lscpu,000019784,1175623,lscpu,util-linux,2.33.2-4.6.1,0,1 +# Distro: SLES12 SP5 +# Modified: 2021 Mar 23 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import re +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Utils" +META_COMPONENT = "lscpu" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019784|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1175623" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Local Function Definitions +############################################################################## + +def conditionConfirmed(): + fileOpen = "crash.txt" + section = "coredumpctl list" + content = {} + CONFIRMED = re.compile("/usr/bin/lscpu", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_NAME = 'util-linux' +RPM_VERSION_FIXED = '2.33.2-4.6.1' +SERVER = SUSE.getHostInfo() +POWER = re.compile("ppc64|s390", re.IGNORECASE) + +if POWER.search(SERVER['Architecture']): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + if( conditionConfirmed() ): + Core.updateStatus(Core.CRIT, "Detected lscpu application crash, update server to apply fixes") + else: + Core.updateStatus(Core.WARN, "lscpu may crash, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "Invalid Architecture for Test Case - " + SERVER['Architecture']) + + +Core.printPatternResults() +