Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package sca-patterns-sle12 for 
openSUSE:Factory checked in at 2021-04-22 18:03:52
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sca-patterns-sle12 (Old)
 and      /work/SRC/openSUSE:Factory/.sca-patterns-sle12.new.12324 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sca-patterns-sle12"

Thu Apr 22 18:03:52 2021 rev:14 rq:887355 version:1.0.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/sca-patterns-sle12/sca-patterns-sle12.changes    
2021-04-01 14:19:26.304166046 +0200
+++ 
/work/SRC/openSUSE:Factory/.sca-patterns-sle12.new.12324/sca-patterns-sle12.changes
 2021-04-22 18:04:39.522570349 +0200
@@ -1,0 +2,13 @@
+Wed Apr 21 17:43:35 UTC 2021 - Jason Record <jason.rec...@suse.com>
+
+- New regular patterns (8) for version 1.0.2
+  + sle12sp2/crosstalk_122-000019643.py: Special Register Buffer Data Sampling 
aka CrossTalk (CVE-2020-0543) (bsc#1154824)
+  + sle12sp2/ucodeintel_122-000019635.py: L1D data cache eviction and Vector 
Register sampling - CVE-2020-0548, CVE-2020-0549 (bsc#1156353)
+  + sle12sp3/crosstalk_123-000019643.py: Special Register Buffer Data Sampling 
aka CrossTalk (CVE-2020-0543) (bsc#1154824)
+  + sle12sp3/ucodeintel_123-000019635.py: L1D data cache eviction and Vector 
Register sampling - CVE-2020-0548, CVE-2020-0549 (bsc#1156353)
+  + sle12sp4/crosstalk_124-000019643.py: Special Register Buffer Data Sampling 
aka CrossTalk (CVE-2020-0543) (bsc#1154824)
+  + sle12sp4/ucodeintel_124-000019635.py: L1D data cache eviction and Vector 
Register sampling - CVE-2020-0548, CVE-2020-0549 (bsc#1156353)
+  + sle12sp5/crosstalk_125-000019643.py: Special Register Buffer Data Sampling 
aka CrossTalk (CVE-2020-0543) (bsc#1154824)
+  + sle12sp5/ucodeintel_125-000019635.py: L1D data cache eviction and Vector 
Register sampling - CVE-2020-0548, CVE-2020-0549 (bsc#1156353)
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sca-patterns-sle12-1.0.2.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/crosstalk_122-000019643.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/crosstalk_122-000019643.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/crosstalk_122-000019643.py   
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/crosstalk_122-000019643.py   
    2021-04-21 19:25:38.380981336 +0200
@@ -0,0 +1,90 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019643
+# Description: Security Vulnerability: Special Register Buffer Data Sampling 
aka CrossTalk (CVE-2020-0543)
+# Source:      Kernel Package Version Pattern Template v0.1.1
+# Options:     
SLE,Security,Crosstalk,crosstalk_151,000019643,1154824,4.12.14-197.45,0,1
+# Distro:      SLES12 SP2 LTSS
+# Modified:    2021 Apr 21
+#
+##############################################################################
+# Copyright (C) 2021, SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "Crosstalk"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019643|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1154824|META_LINK_CVE-2020-0543=https://www.suse.com/security/cve/CVE-2020-0543/";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def intelCPU():
+       fileOpen = "hardware.txt"
+       section = "/proc/cpuinfo"
+       content = []
+       CONFIRMED = re.compile("vendor_id.*GenuineIntel", re.IGNORECASE)
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'ucode-intel'
+RPM_VERSION_FIXED = '20200602-13.68.1'
+KERNEL_VERSION_FIXED = '4.4.121-92.135'
+
+if( SUSE.packageInstalled(RPM_NAME) ):
+       if( intelCPU() ):
+               INSTALLED_VERSION_RPM = SUSE.compareRPM(RPM_NAME, 
RPM_VERSION_FIXED)
+               INSTALLED_VERSION_KERN = 
SUSE.compareKernel(KERNEL_VERSION_FIXED)
+               if( INSTALLED_VERSION_RPM >= 0 ):
+                       if( INSTALLED_VERSION_KERN >= 0 ):
+                               Core.updateStatus(Core.IGNORE, "Bug fixes 
applied for " + RPM_NAME + " and kernel version")
+                       else:
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update kernel to avoid")
+               else:
+                       if( INSTALLED_VERSION_KERN >= 0 ):
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update " + RPM_NAME + " to avoid")
+                       else:
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update system to avoid")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: Intel CPU not found")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/ucodeintel_122-000019635.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/ucodeintel_122-000019635.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/ucodeintel_122-000019635.py  
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp2/ucodeintel_122-000019635.py  
    2021-04-07 16:32:31.169535763 +0200
@@ -0,0 +1,81 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019635
+# Description: Security vulnerability: L1D data cache eviction and Vector 
Register sampling - CVE-2020-0548, CVE-2020-0549
+# Source:      Package Version Pattern Template v0.3.7
+# Options:     
SLE,Security,CPU,000019635,1156353,ucodeintel_151,ucode-intel,20200602-3.25.1,0,1
+# Distro:      SLES12 SP2-SP4
+# Modified:    2021 Apr 07
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "CPU"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019635|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1156353|META_LINK_CVE-2020-0548=https://www.suse.com/security/cve/CVE-2020-0548/|META_LINK_CVE-2020-0549=https://www.suse.com/security/cve/CVE-2020-0549/|META_LINK_Intel=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def intelCPU():
+       fileOpen = "hardware.txt"
+       section = "/proc/cpuinfo"
+       content = []
+       CONFIRMED = re.compile("vendor_id.*GenuineIntel", re.IGNORECASE)
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'ucode-intel'
+RPM_VERSION_FIXED = '20200602-13.68.1'
+if( SUSE.packageInstalled(RPM_NAME) ):
+       INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+       if( INSTALLED_VERSION >= 0 ):
+               Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + 
RPM_NAME + "")
+       else:
+               if( intelCPU() ):
+                       Core.updateStatus(Core.WARN, "Risk of L1D data cache 
eviction and vector register sampling, update system to avoid")
+               else:
+                       Core.updateStatus(Core.IGNORE, "No Genuine Intel CPUs 
found")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/crosstalk_123-000019643.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/crosstalk_123-000019643.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/crosstalk_123-000019643.py   
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/crosstalk_123-000019643.py   
    2021-04-21 19:24:36.278485965 +0200
@@ -0,0 +1,90 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019643
+# Description: Security Vulnerability: Special Register Buffer Data Sampling 
aka CrossTalk (CVE-2020-0543)
+# Source:      Kernel Package Version Pattern Template v0.1.1
+# Options:     
SLE,Security,Crosstalk,crosstalk_151,000019643,1154824,4.12.14-197.45,0,1
+# Distro:      SLES12 SP3 LTSS
+# Modified:    2021 Apr 21
+#
+##############################################################################
+# Copyright (C) 2021, SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "Crosstalk"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019643|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1154824|META_LINK_CVE-2020-0543=https://www.suse.com/security/cve/CVE-2020-0543/";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def intelCPU():
+       fileOpen = "hardware.txt"
+       section = "/proc/cpuinfo"
+       content = []
+       CONFIRMED = re.compile("vendor_id.*GenuineIntel", re.IGNORECASE)
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'ucode-intel'
+RPM_VERSION_FIXED = '20200602-13.68.1'
+KERNEL_VERSION_FIXED = '4.4.180-94.121'
+
+if( SUSE.packageInstalled(RPM_NAME) ):
+       if( intelCPU() ):
+               INSTALLED_VERSION_RPM = SUSE.compareRPM(RPM_NAME, 
RPM_VERSION_FIXED)
+               INSTALLED_VERSION_KERN = 
SUSE.compareKernel(KERNEL_VERSION_FIXED)
+               if( INSTALLED_VERSION_RPM >= 0 ):
+                       if( INSTALLED_VERSION_KERN >= 0 ):
+                               Core.updateStatus(Core.IGNORE, "Bug fixes 
applied for " + RPM_NAME + " and kernel version")
+                       else:
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update kernel to avoid")
+               else:
+                       if( INSTALLED_VERSION_KERN >= 0 ):
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update " + RPM_NAME + " to avoid")
+                       else:
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update system to avoid")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: Intel CPU not found")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/ucodeintel_123-000019635.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/ucodeintel_123-000019635.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/ucodeintel_123-000019635.py  
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp3/ucodeintel_123-000019635.py  
    2021-04-07 16:33:23.800094662 +0200
@@ -0,0 +1,81 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019635
+# Description: Security vulnerability: L1D data cache eviction and Vector 
Register sampling - CVE-2020-0548, CVE-2020-0549
+# Source:      Package Version Pattern Template v0.3.7
+# Options:     
SLE,Security,CPU,000019635,1156353,ucodeintel_151,ucode-intel,20200602-3.25.1,0,1
+# Distro:      SLES12 SP2-SP4
+# Modified:    2021 Apr 07
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "CPU"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019635|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1156353|META_LINK_CVE-2020-0548=https://www.suse.com/security/cve/CVE-2020-0548/|META_LINK_CVE-2020-0549=https://www.suse.com/security/cve/CVE-2020-0549/|META_LINK_Intel=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def intelCPU():
+       fileOpen = "hardware.txt"
+       section = "/proc/cpuinfo"
+       content = []
+       CONFIRMED = re.compile("vendor_id.*GenuineIntel", re.IGNORECASE)
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'ucode-intel'
+RPM_VERSION_FIXED = '20200602-13.68.1'
+if( SUSE.packageInstalled(RPM_NAME) ):
+       INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+       if( INSTALLED_VERSION >= 0 ):
+               Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + 
RPM_NAME + "")
+       else:
+               if( intelCPU() ):
+                       Core.updateStatus(Core.WARN, "Risk of L1D data cache 
eviction and vector register sampling, update system to avoid")
+               else:
+                       Core.updateStatus(Core.IGNORE, "No Genuine Intel CPUs 
found")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/crosstalk_124-000019643.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/crosstalk_124-000019643.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/crosstalk_124-000019643.py   
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/crosstalk_124-000019643.py   
    2021-04-21 19:23:10.524574350 +0200
@@ -0,0 +1,90 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019643
+# Description: Security Vulnerability: Special Register Buffer Data Sampling 
aka CrossTalk (CVE-2020-0543)
+# Source:      Kernel Package Version Pattern Template v0.1.1
+# Options:     
SLE,Security,Crosstalk,crosstalk_151,000019643,1154824,4.12.14-197.45,0,1
+# Distro:      SLES12 SP4
+# Modified:    2021 Apr 21
+#
+##############################################################################
+# Copyright (C) 2021, SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "Crosstalk"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019643|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1154824|META_LINK_CVE-2020-0543=https://www.suse.com/security/cve/CVE-2020-0543/";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def intelCPU():
+       fileOpen = "hardware.txt"
+       section = "/proc/cpuinfo"
+       content = []
+       CONFIRMED = re.compile("vendor_id.*GenuineIntel", re.IGNORECASE)
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'ucode-intel'
+RPM_VERSION_FIXED = '20200602-13.68.1'
+KERNEL_VERSION_FIXED = '4.12.14-95.54'
+
+if( SUSE.packageInstalled(RPM_NAME) ):
+       if( intelCPU() ):
+               INSTALLED_VERSION_RPM = SUSE.compareRPM(RPM_NAME, 
RPM_VERSION_FIXED)
+               INSTALLED_VERSION_KERN = 
SUSE.compareKernel(KERNEL_VERSION_FIXED)
+               if( INSTALLED_VERSION_RPM >= 0 ):
+                       if( INSTALLED_VERSION_KERN >= 0 ):
+                               Core.updateStatus(Core.IGNORE, "Bug fixes 
applied for " + RPM_NAME + " and kernel version")
+                       else:
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update kernel to avoid")
+               else:
+                       if( INSTALLED_VERSION_KERN >= 0 ):
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update " + RPM_NAME + " to avoid")
+                       else:
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update system to avoid")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: Intel CPU not found")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/ucodeintel_124-000019635.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/ucodeintel_124-000019635.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/ucodeintel_124-000019635.py  
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp4/ucodeintel_124-000019635.py  
    2021-04-07 16:33:30.219918868 +0200
@@ -0,0 +1,81 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019635
+# Description: Security vulnerability: L1D data cache eviction and Vector 
Register sampling - CVE-2020-0548, CVE-2020-0549
+# Source:      Package Version Pattern Template v0.3.7
+# Options:     
SLE,Security,CPU,000019635,1156353,ucodeintel_151,ucode-intel,20200602-3.25.1,0,1
+# Distro:      SLES12 SP2-SP4
+# Modified:    2021 Apr 07
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "CPU"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019635|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1156353|META_LINK_CVE-2020-0548=https://www.suse.com/security/cve/CVE-2020-0548/|META_LINK_CVE-2020-0549=https://www.suse.com/security/cve/CVE-2020-0549/|META_LINK_Intel=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def intelCPU():
+       fileOpen = "hardware.txt"
+       section = "/proc/cpuinfo"
+       content = []
+       CONFIRMED = re.compile("vendor_id.*GenuineIntel", re.IGNORECASE)
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'ucode-intel'
+RPM_VERSION_FIXED = '20200602-13.68.1'
+if( SUSE.packageInstalled(RPM_NAME) ):
+       INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+       if( INSTALLED_VERSION >= 0 ):
+               Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + 
RPM_NAME + "")
+       else:
+               if( intelCPU() ):
+                       Core.updateStatus(Core.WARN, "Risk of L1D data cache 
eviction and vector register sampling, update system to avoid")
+               else:
+                       Core.updateStatus(Core.IGNORE, "No Genuine Intel CPUs 
found")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/crosstalk_125-000019643.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/crosstalk_125-000019643.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/crosstalk_125-000019643.py   
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/crosstalk_125-000019643.py   
    2021-04-21 19:21:33.790955211 +0200
@@ -0,0 +1,90 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019643
+# Description: Security Vulnerability: Special Register Buffer Data Sampling 
aka CrossTalk (CVE-2020-0543)
+# Source:      Kernel Package Version Pattern Template v0.1.1
+# Options:     
SLE,Security,Crosstalk,crosstalk_151,000019643,1154824,4.12.14-197.45,0,1
+# Distro:      SLES12 SP5
+# Modified:    2021 Apr 21
+#
+##############################################################################
+# Copyright (C) 2021, SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "Crosstalk"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019643|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1154824|META_LINK_CVE-2020-0543=https://www.suse.com/security/cve/CVE-2020-0543/";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def intelCPU():
+       fileOpen = "hardware.txt"
+       section = "/proc/cpuinfo"
+       content = []
+       CONFIRMED = re.compile("vendor_id.*GenuineIntel", re.IGNORECASE)
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'ucode-intel'
+RPM_VERSION_FIXED = '20200602-3.12.1'
+KERNEL_VERSION_FIXED = '4.12.14-122.23'
+
+if( SUSE.packageInstalled(RPM_NAME) ):
+       if( intelCPU() ):
+               INSTALLED_VERSION_RPM = SUSE.compareRPM(RPM_NAME, 
RPM_VERSION_FIXED)
+               INSTALLED_VERSION_KERN = 
SUSE.compareKernel(KERNEL_VERSION_FIXED)
+               if( INSTALLED_VERSION_RPM >= 0 ):
+                       if( INSTALLED_VERSION_KERN >= 0 ):
+                               Core.updateStatus(Core.IGNORE, "Bug fixes 
applied for " + RPM_NAME + " and kernel version")
+                       else:
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update kernel to avoid")
+               else:
+                       if( INSTALLED_VERSION_KERN >= 0 ):
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update " + RPM_NAME + " to avoid")
+                       else:
+                               Core.updateStatus(Core.WARN, "Risk of L1D data 
cache eviction and vector register sampling, update system to avoid")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: Intel CPU not found")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/ucodeintel_125-000019635.py 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/ucodeintel_125-000019635.py
--- 
old/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/ucodeintel_125-000019635.py  
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle12-1.0.2/patterns/SLE/sle12sp5/ucodeintel_125-000019635.py  
    2021-04-07 16:33:56.571197273 +0200
@@ -0,0 +1,81 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019635
+# Description: Security vulnerability: L1D data cache eviction and Vector 
Register sampling - CVE-2020-0548, CVE-2020-0549
+# Source:      Package Version Pattern Template v0.3.7
+# Options:     
SLE,Security,CPU,000019635,1156353,ucodeintel_151,ucode-intel,20200602-3.25.1,0,1
+# Distro:      SLES12 SP5
+# Modified:    2021 Apr 07
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "CPU"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019635|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1156353|META_LINK_CVE-2020-0548=https://www.suse.com/security/cve/CVE-2020-0548/|META_LINK_CVE-2020-0549=https://www.suse.com/security/cve/CVE-2020-0549/|META_LINK_Intel=https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00329.html";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def intelCPU():
+       fileOpen = "hardware.txt"
+       section = "/proc/cpuinfo"
+       content = []
+       CONFIRMED = re.compile("vendor_id.*GenuineIntel", re.IGNORECASE)
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_NAME = 'ucode-intel'
+RPM_VERSION_FIXED = '20200602-3.12.1'
+if( SUSE.packageInstalled(RPM_NAME) ):
+       INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED)
+       if( INSTALLED_VERSION >= 0 ):
+               Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + 
RPM_NAME + "")
+       else:
+               if( intelCPU() ):
+                       Core.updateStatus(Core.WARN, "Risk of L1D data cache 
eviction and vector register sampling, update system to avoid")
+               else:
+                       Core.updateStatus(Core.IGNORE, "No Genuine Intel CPUs 
found")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed")
+
+Core.printPatternResults()
+

Reply via email to