Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package sca-patterns-sle15 for openSUSE:Factory checked in at 2021-03-28 11:55:06 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/sca-patterns-sle15 (Old) and /work/SRC/openSUSE:Factory/.sca-patterns-sle15.new.2401 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "sca-patterns-sle15" Sun Mar 28 11:55:06 2021 rev:6 rq:881402 version:1.0.1 Changes: -------- --- /work/SRC/openSUSE:Factory/sca-patterns-sle15/sca-patterns-sle15.changes 2021-03-05 13:50:11.419890207 +0100 +++ /work/SRC/openSUSE:Factory/.sca-patterns-sle15.new.2401/sca-patterns-sle15.changes 2021-03-28 11:57:10.800267396 +0200 @@ -2 +2,22 @@ -Thu Mar 4 03:25:51 UTC 2021 - jason.rec...@gmail.com +Thu Mar 25 21:05:17 UTC 2021 - jason.rec...@suse.com + +- New regular patterns (5) for version 1.0.1 + + sle15sp2/kernel-000019739.py: BIOS update failure when an update is performed using the Linux .bin files + + sle15sp2/bleedingtooth_152-000019735.py: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 + + sle15sp1/bleedingtooth_151-000019735.py: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 + + sle15sp0/bleedingtooth_150-000019735.py: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 + + sle15all/amavis-000019709.py: amavis.service failed to start after upgrade + +------------------------------------------------------------------- +Wed Mar 24 22:39:50 UTC 2021 - jason.rec...@suse.com + +- New regular patterns (6) for version 1.0.1 + + sle15sp2/openwsman-000019729.py: owsmangencert.sh generates error + + sle15sp2/lscpu-000019784-15.py: lscpu segfaults on IBM Power8 - Assertion failed + + sle15sp1/x710-000019639.py: Intel X710 based NIC is not detected + + sle15sp1/plymouth-000019595.py: plymouth hang - login to console not possible + + sle15sp1/lscpu-000019784-15.py: lscpu segfaults on IBM Power8 - Assertion failed + + sle15sp0/plymouth-000019595.py: plymouth hang - login to console not possible + +------------------------------------------------------------------- +Thu Mar 4 03:25:51 UTC 2021 - jason.rec...@suse.com @@ -12 +33 @@ -Mon Mar 1 21:37:07 UTC 2021 - jason.rec...@gmail.com +Mon Mar 1 21:37:07 UTC 2021 - jason.rec...@suse.com @@ -18 +39 @@ -Tue Jan 26 18:47:03 UTC 2021 - jason.rec...@gmail.com +Tue Jan 26 18:47:03 UTC 2021 - jason.rec...@suse.com ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ sca-patterns-sle15-1.0.1.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15all/amavis-000019709.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15all/amavis-000019709.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15all/amavis-000019709.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15all/amavis-000019709.py 2021-03-25 21:57:52.429684271 +0100 @@ -0,0 +1,73 @@ +#!/usr/bin/python + +# Title: Amavis Virus Scanner failed start +# Description: amavis.service failed to start after upgrade +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021, SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +############################################################################## +# Module Definition +############################################################################## + +import os +import Core +import SUSE + +############################################################################## +# Overriden (eventually or in part) from SDP::Core Module +############################################################################## + +META_CLASS = "SLE" +META_CATEGORY = "Services" +META_COMPONENT = "Amavis" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019709" + +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_NAME = 'amavisd-new' +SERVICE_NAME = 'amavis.service' +SERVICE_INFO = SUSE.getServiceDInfo(SERVICE_NAME) + +if( SUSE.packageInstalled(RPM_NAME) ): + if( SERVICE_INFO['UnitFileState'] == 'enabled' ): + if( SERVICE_INFO['SubState'] == 'failed' ): + if 'sa-update' in SERVICE_INFO['StatusText']: + Core.updateStatus(Core.CRIT, "The " + str(SERVICE_NAME) + " has failed, run sa-update") + else: + Core.updateStatus(Core.WARN, "The " + str(SERVICE_NAME) + " has failed, consider running sa-update") + else: + Core.updateStatus(Core.ERROR, "Service did not fail: " + str(SERVICE_NAME)) + else: + Core.updateStatus(Core.ERROR, "Service is disabled: " + str(SERVICE_NAME)) +else: + Core.updateStatus(Core.ERROR, "ERROR: RPM package " + RPM_NAME + " not installed") + +Core.printPatternResults() diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp0/bleedingtooth_150-000019735.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp0/bleedingtooth_150-000019735.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp0/bleedingtooth_150-000019735.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp0/bleedingtooth_150-000019735.py 2021-03-25 17:15:40.875384256 +0100 @@ -0,0 +1,65 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019735 +# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1 +# Distro: SLES15 SP0 +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "Bluetooth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_BLUE = 'bluez' +RPM_NAME = 'kernel-default' +RPM_VERSION_FIXED = '4.12.14-150.63' +if( SUSE.packageInstalled(RPM_BLUE) ): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + Core.updateStatus(Core.WARN, "Detected Security Vulnerability: BleedingTooth, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp0/plymouth-000019595.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp0/plymouth-000019595.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp0/plymouth-000019595.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp0/plymouth-000019595.py 2021-03-24 23:36:47.253367296 +0100 @@ -0,0 +1,106 @@ +#!/usr/bin/python + +# Title: Pattern for TID000019595 +# Description: plymouth hang - login to console not possible +# Modified: 2021 Mar 24 +# +############################################################################## +# Copyright (C) 2021, SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +############################################################################## +# Module Definition +############################################################################## + +import os +import re +import Core +import SUSE + +############################################################################## +# Overriden (eventually or in part) from SDP::Core Module +############################################################################## + +META_CLASS = "SLE" +META_CATEGORY = "Login" +META_COMPONENT = "Plymouth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019595|META_LINK_TID2=https://www.suse.com/support/kb/doc/?id=000019853" + + +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) +############################################################################## +# Local Function Definitions +############################################################################## + +def workAroundApplied(): + fileOpen = "boot.txt" + section = "/proc/cmdline" + content = {} + CONFIRMED = re.compile("plymouth.enable=0", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +def graphicalTarget(): + fileOpen = "systemd.txt" + section = "/bin/ls -alR /etc/systemd/" + content = {} + CONFIRMED = re.compile("default\.target.*graphical\.target", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +def plymouthRunning(): + fileOpen = "systemd.txt" + section = "/bin/systemctl.*list-units" + content = {} + CONFIRMED = re.compile("plymouth-quit-wait.service.*start.*running", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +############################################################################## +# Main Program Execution +############################################################################## + +if( workAroundApplied() ): + Core.updateStatus(Core.IGNORE, "Workaround applied") +else: + if( graphicalTarget() ): + if( plymouthRunning() ): + Core.updateStatus(Core.WARN, "Plymouth hang may cause console login failure, consider disabling plymouth") + else: + Core.updateStatus(Core.WARN, "Console login issue may occur, disable plymouth if needed") + else: + Core.updateStatus(Core.ERROR, "Not using graphical.target as default") + +Core.printPatternResults() + + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/bleedingtooth_151-000019735.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/bleedingtooth_151-000019735.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/bleedingtooth_151-000019735.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/bleedingtooth_151-000019735.py 2021-03-25 17:15:11.144175015 +0100 @@ -0,0 +1,65 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019735 +# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1 +# Distro: SLES15 SP1 +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "Bluetooth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_BLUE = 'bluez' +RPM_NAME = 'kernel-default' +RPM_VERSION_FIXED = '4.12.14-197.64' +if( SUSE.packageInstalled(RPM_BLUE) ): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + Core.updateStatus(Core.WARN, "Detected Security Vulnerability: BleedingTooth, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/lscpu-000019784-15.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/lscpu-000019784-15.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/lscpu-000019784-15.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/lscpu-000019784-15.py 2021-03-23 22:02:45.436879855 +0100 @@ -0,0 +1,87 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019784 +# Description: lscpu segfaults on IBM Power8 - Assertion failed +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Utils,lscpu,000019784,1175623,lscpu,util-linux,2.33.2-4.6.1,0,1 +# Distro: SLES15 SP[1,2] +# Modified: 2021 Mar 23 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import re +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Utils" +META_COMPONENT = "lscpu" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019784|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1175623" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Local Function Definitions +############################################################################## + +def conditionConfirmed(): + fileOpen = "crash.txt" + section = "coredumpctl list" + content = {} + CONFIRMED = re.compile("/usr/bin/lscpu", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_NAME = 'util-linux' +RPM_VERSION_FIXED = '2.33.1-4.13.1' +SERVER = SUSE.getHostInfo() +POWER = re.compile("ppc64|s390", re.IGNORECASE) + +if POWER.search(SERVER['Architecture']): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + if( conditionConfirmed() ): + Core.updateStatus(Core.CRIT, "Detected lscpu application crash, update server to apply fixes") + else: + Core.updateStatus(Core.WARN, "lscpu may crash, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "Invalid Architecture for Test Case - " + SERVER['Architecture']) + + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/plymouth-000019595.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/plymouth-000019595.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/plymouth-000019595.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/plymouth-000019595.py 2021-03-24 23:37:01.292998466 +0100 @@ -0,0 +1,106 @@ +#!/usr/bin/python + +# Title: Pattern for TID000019595 +# Description: plymouth hang - login to console not possible +# Modified: 2021 Mar 24 +# +############################################################################## +# Copyright (C) 2021, SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +############################################################################## +# Module Definition +############################################################################## + +import os +import re +import Core +import SUSE + +############################################################################## +# Overriden (eventually or in part) from SDP::Core Module +############################################################################## + +META_CLASS = "SLE" +META_CATEGORY = "Login" +META_COMPONENT = "Plymouth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019595|META_LINK_TID2=https://www.suse.com/support/kb/doc/?id=000019853" + + +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) +############################################################################## +# Local Function Definitions +############################################################################## + +def workAroundApplied(): + fileOpen = "boot.txt" + section = "/proc/cmdline" + content = {} + CONFIRMED = re.compile("plymouth.enable=0", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +def graphicalTarget(): + fileOpen = "systemd.txt" + section = "/bin/ls -alR /etc/systemd/" + content = {} + CONFIRMED = re.compile("default\.target.*graphical\.target", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +def plymouthRunning(): + fileOpen = "systemd.txt" + section = "/bin/systemctl.*list-units" + content = {} + CONFIRMED = re.compile("plymouth-quit-wait.service.*start.*running", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +############################################################################## +# Main Program Execution +############################################################################## + +if( workAroundApplied() ): + Core.updateStatus(Core.IGNORE, "Workaround applied") +else: + if( graphicalTarget() ): + if( plymouthRunning() ): + Core.updateStatus(Core.WARN, "Plymouth hang may cause console login failure, consider disabling plymouth") + else: + Core.updateStatus(Core.WARN, "Console login issue may occur, disable plymouth if needed") + else: + Core.updateStatus(Core.ERROR, "Not using graphical.target as default") + +Core.printPatternResults() + + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/x710-000019639.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/x710-000019639.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/x710-000019639.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp1/x710-000019639.py 2021-03-24 17:54:21.407659547 +0100 @@ -0,0 +1,93 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019639 +# Description: Intel X710 based NIC is not detected +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Kernel,Drivers,000019639,1151067,x710,kernel-default,4.12.14-197.29,0,1 +# Modified: 2021 Mar 24 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import re +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "Drivers" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019639|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1151067" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Local Function Definitions +############################################################################## + +def x710Controller(): + fileOpen = "hardware.txt" + section = "lspci" + content = {} + CONFIRMED = re.compile("Intel Corporation Ethernet Controller x710", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +def conditionConfirmed(): + fileOpen = "boot.txt" + section = "/dmesg" + content = {} + CONFIRMED = re.compile("i40e.*probe of.*failed with error -11", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_NAME = 'kernel-default' +RPM_VERSION_FIXED = '4.12.14-197.29' +if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + if( x710Controller() ): + if( conditionConfirmed() ): + Core.updateStatus(Core.CRIT, "The x710 network controller cannot be recognized, update system for fixes") + else: + Core.updateStatus(Core.WARN, "The x710 network controller may not be recognized, update system for fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: Missing Intel x710 controller") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/bleedingtooth_152-000019735.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/bleedingtooth_152-000019735.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/bleedingtooth_152-000019735.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/bleedingtooth_152-000019735.py 2021-03-25 17:14:42.392938728 +0100 @@ -0,0 +1,65 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019735 +# Description: Security Vulnerability: BleedingTooth aka CVE-2020-12351, CVE-2020-12352, and CVE-2020-24490 +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Kernel,Bluetooth,000019735,0,bleedingtooth,kernel-default,4.4.121-92.146,0,1 +# Distro: SLES15 SP2 +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "Bluetooth" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019735|META_LINK_CVE1=https://www.suse.com/security/cve/CVE-2020-12351|META_LINK_CVE2=https://www.suse.com/security/cve/CVE-2020-12352|META_LINK_CVE3=https://www.suse.com/security/cve/CVE-2020-24490" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_BLUE = 'bluez' +RPM_NAME = 'kernel-default' +RPM_VERSION_FIXED = '5.3.18-24.29' +if( SUSE.packageInstalled(RPM_BLUE) ): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + Core.updateStatus(Core.WARN, "Detected Security Vulnerability: BleedingTooth, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_BLUE + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/kernel-000019739.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/kernel-000019739.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/kernel-000019739.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/kernel-000019739.py 2021-03-25 16:24:03.910857319 +0100 @@ -0,0 +1,80 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019739 +# Description: BIOS update failure when an update is performed using the Linux .bin files +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Kernel,Update,000019739,1175952,kernel,kernel-default,5.3.18-24.24,0,1 +# Distro: SLES15 SP2 +# Modified: 2021 Mar 25 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import re +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "Update" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019739|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1175952" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Local Function Definitions +############################################################################## + +def conditionConfirmed(): + fileOpen = "basic-environment.txt" + section = "Virtualization" + content = {} + CONFIRMED = re.compile("PowerEdge.*R240|PowerEdge.*R340|PowerEdge.*T140|PowerEdge.*T340", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_NAME = 'kernel-default' +RPM_VERSION_FIXED = '5.3.18-24.24' +if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + if( conditionConfirmed() ): + Core.updateStatus(Core.WARN, "BIOS update with .bin files may fail, install updated kernel first") + else: + Core.updateStatus(Core.ERROR, "Issue does not apply to this hardware") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/lscpu-000019784-15.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/lscpu-000019784-15.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/lscpu-000019784-15.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/lscpu-000019784-15.py 2021-03-23 22:02:38.353065113 +0100 @@ -0,0 +1,87 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019784 +# Description: lscpu segfaults on IBM Power8 - Assertion failed +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Utils,lscpu,000019784,1175623,lscpu,util-linux,2.33.2-4.6.1,0,1 +# Distro: SLES15 SP[1,2] +# Modified: 2021 Mar 23 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import re +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Utils" +META_COMPONENT = "lscpu" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019784|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1175623" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Local Function Definitions +############################################################################## + +def conditionConfirmed(): + fileOpen = "crash.txt" + section = "coredumpctl list" + content = {} + CONFIRMED = re.compile("/usr/bin/lscpu", re.IGNORECASE) + if Core.getSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(content[line]): + return True + return False + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_NAME = 'util-linux' +RPM_VERSION_FIXED = '2.33.1-4.13.1' +SERVER = SUSE.getHostInfo() +POWER = re.compile("ppc64|s390", re.IGNORECASE) + +if POWER.search(SERVER['Architecture']): + if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + if( conditionConfirmed() ): + Core.updateStatus(Core.CRIT, "Detected lscpu application crash, update server to apply fixes") + else: + Core.updateStatus(Core.WARN, "lscpu may crash, update server to apply fixes") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") +else: + Core.updateStatus(Core.ERROR, "Invalid Architecture for Test Case - " + SERVER['Architecture']) + + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/openwsman-000019729.py new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/openwsman-000019729.py --- old/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/openwsman-000019729.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle15-1.0.1/patterns/SLE/sle15sp2/openwsman-000019729.py 2021-03-24 15:22:11.191517563 +0100 @@ -0,0 +1,60 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019729 +# Description: openwsman: owsmangencert.sh generates error +# Source: Package Version Pattern Template v0.3.5 +# Options: SLE,Certificates,openwsman,000019729,1174541,openwsman,openwsman-server,2.6.7-3.9.1,0,0 +# Modified: 2021 Mar 24 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Certificates" +META_COMPONENT = "openwsman" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019729|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1174541" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_NAME = 'openwsman-server' +RPM_VERSION_FIXED = '2.6.7-3.9.1' +if( SUSE.packageInstalled(RPM_NAME) ): + INSTALLED_VERSION = SUSE.compareRPM(RPM_NAME, RPM_VERSION_FIXED) + if( INSTALLED_VERSION >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_NAME + "") + else: + Core.updateStatus(Core.WARN, "Creating self-signed certs for openwsman may fail without a workaround or update") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_NAME + " not installed") + +Core.printPatternResults() +