Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package sca-patterns-sle11 for 
openSUSE:Factory checked in at 2021-05-05 20:40:40
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/sca-patterns-sle11 (Old)
 and      /work/SRC/openSUSE:Factory/.sca-patterns-sle11.new.2988 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "sca-patterns-sle11"

Wed May  5 20:40:40 2021 rev:11 rq:890773 version:1.3.2

Changes:
--------
--- /work/SRC/openSUSE:Factory/sca-patterns-sle11/sca-patterns-sle11.changes    
2021-04-22 18:04:40.594571985 +0200
+++ 
/work/SRC/openSUSE:Factory/.sca-patterns-sle11.new.2988/sca-patterns-sle11.changes
  2021-05-05 20:41:05.818628758 +0200
@@ -1,0 +2,14 @@
+Wed May  5 15:37:01 UTC 2021 - Jason Record <jason.rec...@suse.com>
+
+- New security announcement patterns (10) for version 1.3.2
+  + Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 
SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1 SUSE-SU-2021:14700-1 
SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 
SUSE-SU-2021:14712-1 SUSE-SU-2021:14692-1
+
+-------------------------------------------------------------------
+Tue May  4 20:27:12 UTC 2021 - Jason Record <jason.rec...@suse.com>
+
+- New regular patterns (3) for version 1.3.2
+  + sle11all/softlock-000018705.py: soft lockup messages about? (TID000018705)
+  + sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File 
Read/Inclusion Vulnerability (bsc#1164692)
+  + sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File 
Read/Inclusion Vulnerability (bsc#1164692)
+
+-------------------------------------------------------------------

Old:
----
  sca-patterns-sle11-1.3.1.tar.gz

New:
----
  sca-patterns-sle11-1.3.2.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ sca-patterns-sle11.spec ++++++
--- /var/tmp/diff_new_pack.rmc0su/_old  2021-05-05 20:41:06.402626186 +0200
+++ /var/tmp/diff_new_pack.rmc0su/_new  2021-05-05 20:41:06.406626169 +0200
@@ -25,7 +25,7 @@
 %define category SLE
 
 Name:           sca-patterns-sle11
-Version:        1.3.1
+Version:        1.3.2
 Release:        0
 Summary:        Supportconfig Analysis Patterns for SLE11
 License:        GPL-2.0-only

++++++ sca-patterns-sle11-1.3.1.tar.gz -> sca-patterns-sle11-1.3.2.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11all/softlock-000018705.py 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11all/softlock-000018705.py
--- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11all/softlock-000018705.py    
1970-01-01 01:00:00.000000000 +0100
+++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11all/softlock-000018705.py    
2021-04-30 16:04:32.121601257 +0200
@@ -0,0 +1,86 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000018705 (7017652)
+# Description: What are all these Bug: soft lockup messages about?
+# Source:      Basic Python Pattern Template v0.3.4
+# Options:     SLE,Kernel,SoftLockups,softlock,000018705,0,1,0,0
+# Modified:    2021 Apr 30
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import re
+import os
+import Core
+
+META_CLASS = "SLE"
+META_CATEGORY = "Kernel"
+META_COMPONENT = "SoftLockups"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000018705";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Local Function Definitions
+##############################################################################
+
+def softLockFound():
+       CONFIRMED = re.compile("kernel:.*BUG: soft lockup ", re.IGNORECASE)
+       fileOpen = "messages.txt"
+
+       section = "/var/log/warn"
+       content = []
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+
+       section = "/var/log/messages"
+       content = []
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+
+       fileOpen = "boot.txt"
+       section = "journalctl.*--boot"
+       content = []
+       if Core.getRegExSection(fileOpen, section, content):
+               for line in content:
+                       if CONFIRMED.search(line):
+                               return True
+
+       return False
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+if( softLockFound() ):
+       Core.updateStatus(Core.WARN, "Detected soft lockup messages, evaluate  
watchdog threshold")
+else:
+       Core.updateStatus(Core.IGNORE, "No soft lockup messages found")
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp3/ghostcat_113-000019606.py 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp3/ghostcat_113-000019606.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp3/ghostcat_113-000019606.py    
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp3/ghostcat_113-000019606.py    
    2021-04-22 23:22:11.994951403 +0200
@@ -0,0 +1,70 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019606
+# Description: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability
+# Source:      Package Version Pattern Template v0.3.8
+# Options:     
SLE,Security,Ghostcat,ghostcat_151,000019606,1164692,tomcat,9.0.31-4.22.1,0,0
+# Distro:      SLES11 SP3
+# Modified:    2021 Apr 22
+#
+##############################################################################
+# Copyright (C) 2021, SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "Ghostcat"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019606|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1164692";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_TOMCAT = 'tomcat6'
+RPM_APACHE = 'apache2'
+RPM_TOMCAT_FIXED = '6.0.53-0.57.13.1'
+RPM_APACHE_FIXED = '2.2.34-70.27.1'
+
+if( SUSE.packageInstalled(RPM_TOMCAT) ):
+       if( SUSE.packageInstalled(RPM_APACHE) ):
+               INSTALLED_VERSION_TOMCAT = SUSE.compareRPM(RPM_TOMCAT, 
RPM_TOMCAT_FIXED)
+               INSTALLED_VERSION_APACHE = SUSE.compareRPM(RPM_APACHE, 
RPM_APACHE_FIXED)
+               if( INSTALLED_VERSION_TOMCAT >= 0 and INSTALLED_VERSION_APACHE 
>= 0 ):
+                       Core.updateStatus(Core.IGNORE, "Bug fixes applied for " 
+ RPM_TOMCAT + " and " + RPM_APACHE)
+               else:
+                       Core.updateStatus(Core.WARN, "Possible Ghostcat - 
Apache Tomcat AJP File Read/Inclusion Vulnerability")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + RPM_APACHE + " not 
installed")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_TOMCAT + " not installed")
+
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/clamav_SUSE-SU-2021_14692-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/clamav_SUSE-SU-2021_14692-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/clamav_SUSE-SU-2021_14692-1_11.4.ltss.py
 1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/clamav_SUSE-SU-2021_14692-1_11.4.ltss.py
 2021-05-04 22:35:17.012802083 +0200
@@ -0,0 +1,62 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for clamav SUSE-SU-2021:14692-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "clamav"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'clamav'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14692-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'clamav': '0.103.2-0.20.35.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/cups_SUSE-SU-2021_14712-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/cups_SUSE-SU-2021_14712-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/cups_SUSE-SU-2021_14712-1_11.4.ltss.py
   1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/cups_SUSE-SU-2021_14712-1_11.4.ltss.py
   2021-05-04 22:37:06.857885473 +0200
@@ -0,0 +1,65 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for cups SUSE-SU-2021:14712-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "cups"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008714.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'cups'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14712-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'cups': '1.3.9-8.46.56.18.1',
+                       'cups-client': '1.3.9-8.46.56.18.1',
+                       'cups-libs': '1.3.9-8.46.56.18.1',
+                       'cups-libs-32bit': '1.3.9-8.46.56.18.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/ghostcat_114-000019606.py 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/ghostcat_114-000019606.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/ghostcat_114-000019606.py    
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/ghostcat_114-000019606.py    
    2021-04-22 23:21:04.304349363 +0200
@@ -0,0 +1,70 @@
+#!/usr/bin/python
+#
+# Title:       Pattern for TID000019606
+# Description: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability
+# Source:      Package Version Pattern Template v0.3.8
+# Options:     
SLE,Security,Ghostcat,ghostcat_151,000019606,1164692,tomcat,9.0.31-4.22.1,0,0
+# Distro:      SLES11 SP4
+# Modified:    2021 Apr 22
+#
+##############################################################################
+# Copyright (C) 2021, SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "SLE"
+META_CATEGORY = "Security"
+META_COMPONENT = "Ghostcat"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_TID"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019606|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1164692";
+
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+##############################################################################
+# Main Program Execution
+##############################################################################
+
+RPM_TOMCAT = 'tomcat6'
+RPM_APACHE = 'apache2'
+RPM_TOMCAT_FIXED = '6.0.53-0.57.13.1'
+RPM_APACHE_FIXED = '2.2.34-70.27.1'
+
+if( SUSE.packageInstalled(RPM_TOMCAT) ):
+       if( SUSE.packageInstalled(RPM_APACHE) ):
+               INSTALLED_VERSION_TOMCAT = SUSE.compareRPM(RPM_TOMCAT, 
RPM_TOMCAT_FIXED)
+               INSTALLED_VERSION_APACHE = SUSE.compareRPM(RPM_APACHE, 
RPM_APACHE_FIXED)
+               if( INSTALLED_VERSION_TOMCAT >= 0 and INSTALLED_VERSION_APACHE 
>= 0 ):
+                       Core.updateStatus(Core.IGNORE, "Bug fixes applied for " 
+ RPM_TOMCAT + " and " + RPM_APACHE)
+               else:
+                       Core.updateStatus(Core.WARN, "Possible Ghostcat - 
Apache Tomcat AJP File Read/Inclusion Vulnerability")
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + RPM_APACHE + " not 
installed")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + RPM_TOMCAT + " not installed")
+
+
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/kvm_SUSE-SU-2021_14704-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/kvm_SUSE-SU-2021_14704-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/kvm_SUSE-SU-2021_14704-1_11.4.ltss.py
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/kvm_SUSE-SU-2021_14704-1_11.4.ltss.py
    2021-05-04 22:35:58.511697132 +0200
@@ -0,0 +1,62 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for kvm SUSE-SU-2021:14704-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "kvm"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'kvm'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14704-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'kvm': '1.4.2-60.34.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14684-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14684-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14684-1_11.4.ltss.py
 1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14684-1_11.4.ltss.py
 2021-05-04 22:34:04.862723877 +0200
@@ -0,0 +1,64 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for MozillaFirefox 
SUSE-SU-2021:14684-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "MozillaFirefox"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'MozillaFirefox'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14684-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'MozillaFirefox': '78.9.0-78.123.1',
+                       'MozillaFirefox-translations-common': '78.9.0-78.123.1',
+                       'MozillaFirefox-translations-other': '78.9.0-78.123.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14708-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14708-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14708-1_11.4.ltss.py
 1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14708-1_11.4.ltss.py
 2021-05-04 22:36:40.118593112 +0200
@@ -0,0 +1,64 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for MozillaFirefox 
SUSE-SU-2021:14708-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "MozillaFirefox"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'MozillaFirefox'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14708-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'MozillaFirefox': '78.10.0-78.126.1',
+                       'MozillaFirefox-translations-common': 
'78.10.0-78.126.1',
+                       'MozillaFirefox-translations-other': '78.10.0-78.126.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/openldap2_SUSE-SU-2021_14700-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/openldap2_SUSE-SU-2021_14700-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/openldap2_SUSE-SU-2021_14700-1_11.4.ltss.py
      1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/openldap2_SUSE-SU-2021_14700-1_11.4.ltss.py
      2021-05-04 22:35:30.988429524 +0200
@@ -0,0 +1,67 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for openldap2 
SUSE-SU-2021:14700-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "openldap2"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'openldap2'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14700-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'compat-libldap-2_3-0': '2.3.37-2.74.26.1',
+                       'libldap-2_4-2': '2.4.26-0.74.26.1',
+                       'libldap-2_4-2-32bit': '2.4.26-0.74.26.1',
+                       'openldap2': '2.4.26-0.74.26.1',
+                       'openldap2-back-meta': '2.4.26-0.74.26.1',
+                       'openldap2-client': '2.4.26-0.74.26.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/samba_SUSE-SU-2021_14709-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/samba_SUSE-SU-2021_14709-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/samba_SUSE-SU-2021_14709-1_11.4.ltss.py
  1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/samba_SUSE-SU-2021_14709-1_11.4.ltss.py
  2021-05-04 22:36:54.126222232 +0200
@@ -0,0 +1,81 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for samba SUSE-SU-2021:14709-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "samba"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008704.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'samba'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14709-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'ldapsmb': '1.34b-94.34.1',
+                       'libldb1': '3.6.3-94.34.1',
+                       'libsmbclient0': '3.6.3-94.34.1',
+                       'libsmbclient0-32bit': '3.6.3-94.34.1',
+                       'libtalloc2': '3.6.3-94.34.1',
+                       'libtalloc2-32bit': '3.6.3-94.34.1',
+                       'libtdb1': '3.6.3-94.34.1',
+                       'libtdb1-32bit': '3.6.3-94.34.1',
+                       'libtevent0': '3.6.3-94.34.1',
+                       'libtevent0-32bit': '3.6.3-94.34.1',
+                       'libwbclient0': '3.6.3-94.34.1',
+                       'libwbclient0-32bit': '3.6.3-94.34.1',
+                       'samba': '3.6.3-94.34.1',
+                       'samba-32bit': '3.6.3-94.34.1',
+                       'samba-client': '3.6.3-94.34.1',
+                       'samba-client-32bit': '3.6.3-94.34.1',
+                       'samba-doc': '3.6.3-94.34.1',
+                       'samba-krb-printing': '3.6.3-94.34.1',
+                       'samba-winbind': '3.6.3-94.34.1',
+                       'samba-winbind-32bit': '3.6.3-94.34.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/tomcat6_SUSE-SU-2021_14705-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/tomcat6_SUSE-SU-2021_14705-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/tomcat6_SUSE-SU-2021_14705-1_11.4.ltss.py
        1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/tomcat6_SUSE-SU-2021_14705-1_11.4.ltss.py
        2021-05-04 22:36:11.923340859 +0200
@@ -0,0 +1,69 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for tomcat6 SUSE-SU-2021:14705-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "tomcat6"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'tomcat6'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14705-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'tomcat6': '6.0.53-0.57.19.1',
+                       'tomcat6-admin-webapps': '6.0.53-0.57.19.1',
+                       'tomcat6-docs-webapp': '6.0.53-0.57.19.1',
+                       'tomcat6-javadoc': '6.0.53-0.57.19.1',
+                       'tomcat6-jsp-2_1-api': '6.0.53-0.57.19.1',
+                       'tomcat6-lib': '6.0.53-0.57.19.1',
+                       'tomcat6-servlet-2_5-api': '6.0.53-0.57.19.1',
+                       'tomcat6-webapps': '6.0.53-0.57.19.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/xen_SUSE-SU-2021_14702-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/xen_SUSE-SU-2021_14702-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/xen_SUSE-SU-2021_14702-1_11.4.ltss.py
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/xen_SUSE-SU-2021_14702-1_11.4.ltss.py
    2021-05-04 22:35:52.015869832 +0200
@@ -0,0 +1,69 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for xen SUSE-SU-2021:14702-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "xen"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'xen'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14702-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'xen': '4.4.4_48-61.64.1',
+                       'xen-doc-html': '4.4.4_48-61.64.1',
+                       'xen-kmp-default': '4.4.4_48_3.0.101_108.123-61.64.1',
+                       'xen-kmp-pae': '4.4.4_48_3.0.101_108.123-61.64.1',
+                       'xen-libs': '4.4.4_48-61.64.1',
+                       'xen-libs-32bit': '4.4.4_48-61.64.1',
+                       'xen-tools': '4.4.4_48-61.64.1',
+                       'xen-tools-domU': '4.4.4_48-61.64.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/xorg-x11-server_SUSE-SU-2021_14690-1_11.4.ltss.py
 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/xorg-x11-server_SUSE-SU-2021_14690-1_11.4.ltss.py
--- 
old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/xorg-x11-server_SUSE-SU-2021_14690-1_11.4.ltss.py
        1970-01-01 01:00:00.000000000 +0100
+++ 
new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/xorg-x11-server_SUSE-SU-2021_14690-1_11.4.ltss.py
        2021-05-04 22:35:04.537134200 +0200
@@ -0,0 +1,64 @@
+#!/usr/bin/python
+#
+# Title:       Important Security Announcement for xorg-x11-server 
SUSE-SU-2021:14690-1
+# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS
+# Source:      Security Announcement Parser v1.6.1
+# Modified:    2021 May 04
+#
+##############################################################################
+# Copyright (C) 2021 SUSE LLC
+##############################################################################
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License as published by
+# the Free Software Foundation; version 2 of the License.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License
+# along with this program; if not, see <http://www.gnu.org/licenses/>.
+#
+#  Authors/Contributors:
+#   Jason Record <jason.rec...@suse.com>
+#
+##############################################################################
+
+import os
+import Core
+import SUSE
+
+META_CLASS = "Security"
+META_CATEGORY = "SLE"
+META_COMPONENT = "xorg-x11-server"
+PATTERN_ID = os.path.basename(__file__)
+PRIMARY_LINK = "META_LINK_Security"
+OVERALL = Core.TEMP
+OVERALL_INFO = "NOT SET"
+OTHER_LINKS = 
"META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008626.html";
+Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, 
OVERALL, OVERALL_INFO, OTHER_LINKS)
+
+LTSS = True
+NAME = 'xorg-x11-server'
+MAIN = ''
+SEVERITY = 'Important'
+TAG = 'SUSE-SU-2021:14690-1'
+PACKAGES = {}
+SERVER = SUSE.getHostInfo()
+
+if ( SERVER['DistroVersion'] == 11):
+       if ( SERVER['DistroPatchLevel'] == 4 ):
+               PACKAGES = {
+                       'xorg-x11-Xvnc': '7.4-27.122.40.1',
+                       'xorg-x11-server': '7.4-27.122.40.1',
+                       'xorg-x11-server-extra': '7.4-27.122.40.1',
+               }
+               SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, 
SEVERITY, TAG, PACKAGES)
+       else:
+               Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the service pack scope")
+else:
+       Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security 
Announcement: Outside the distribution scope")
+Core.printPatternResults()
+

Reply via email to