Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package sca-patterns-sle11 for openSUSE:Factory checked in at 2021-05-05 20:40:40 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/sca-patterns-sle11 (Old) and /work/SRC/openSUSE:Factory/.sca-patterns-sle11.new.2988 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "sca-patterns-sle11" Wed May 5 20:40:40 2021 rev:11 rq:890773 version:1.3.2 Changes: -------- --- /work/SRC/openSUSE:Factory/sca-patterns-sle11/sca-patterns-sle11.changes 2021-04-22 18:04:40.594571985 +0200 +++ /work/SRC/openSUSE:Factory/.sca-patterns-sle11.new.2988/sca-patterns-sle11.changes 2021-05-05 20:41:05.818628758 +0200 @@ -1,0 +2,14 @@ +Wed May 5 15:37:01 UTC 2021 - Jason Record <jason.rec...@suse.com> + +- New security announcement patterns (10) for version 1.3.2 + + Apr 2021 (10) for SUSE-SU-2021:14690-1 SUSE-SU-2021:14702-1 SUSE-SU-2021:14705-1 SUSE-SU-2021:14709-1 SUSE-SU-2021:14700-1 SUSE-SU-2021:14708-1 SUSE-SU-2021:14684-1 SUSE-SU-2021:14704-1 SUSE-SU-2021:14712-1 SUSE-SU-2021:14692-1 + +------------------------------------------------------------------- +Tue May 4 20:27:12 UTC 2021 - Jason Record <jason.rec...@suse.com> + +- New regular patterns (3) for version 1.3.2 + + sle11all/softlock-000018705.py: soft lockup messages about? (TID000018705) + + sle11sp3/ghostcat_113-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) + + sle11sp4/ghostcat_114-000019606.py: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability (bsc#1164692) + +------------------------------------------------------------------- Old: ---- sca-patterns-sle11-1.3.1.tar.gz New: ---- sca-patterns-sle11-1.3.2.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ sca-patterns-sle11.spec ++++++ --- /var/tmp/diff_new_pack.rmc0su/_old 2021-05-05 20:41:06.402626186 +0200 +++ /var/tmp/diff_new_pack.rmc0su/_new 2021-05-05 20:41:06.406626169 +0200 @@ -25,7 +25,7 @@ %define category SLE Name: sca-patterns-sle11 -Version: 1.3.1 +Version: 1.3.2 Release: 0 Summary: Supportconfig Analysis Patterns for SLE11 License: GPL-2.0-only ++++++ sca-patterns-sle11-1.3.1.tar.gz -> sca-patterns-sle11-1.3.2.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11all/softlock-000018705.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11all/softlock-000018705.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11all/softlock-000018705.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11all/softlock-000018705.py 2021-04-30 16:04:32.121601257 +0200 @@ -0,0 +1,86 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000018705 (7017652) +# Description: What are all these Bug: soft lockup messages about? +# Source: Basic Python Pattern Template v0.3.4 +# Options: SLE,Kernel,SoftLockups,softlock,000018705,0,1,0,0 +# Modified: 2021 Apr 30 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import re +import os +import Core + +META_CLASS = "SLE" +META_CATEGORY = "Kernel" +META_COMPONENT = "SoftLockups" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000018705" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Local Function Definitions +############################################################################## + +def softLockFound(): + CONFIRMED = re.compile("kernel:.*BUG: soft lockup ", re.IGNORECASE) + fileOpen = "messages.txt" + + section = "/var/log/warn" + content = [] + if Core.getRegExSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(line): + return True + + section = "/var/log/messages" + content = [] + if Core.getRegExSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(line): + return True + + fileOpen = "boot.txt" + section = "journalctl.*--boot" + content = [] + if Core.getRegExSection(fileOpen, section, content): + for line in content: + if CONFIRMED.search(line): + return True + + return False + +############################################################################## +# Main Program Execution +############################################################################## + +if( softLockFound() ): + Core.updateStatus(Core.WARN, "Detected soft lockup messages, evaluate watchdog threshold") +else: + Core.updateStatus(Core.IGNORE, "No soft lockup messages found") + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp3/ghostcat_113-000019606.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp3/ghostcat_113-000019606.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp3/ghostcat_113-000019606.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp3/ghostcat_113-000019606.py 2021-04-22 23:22:11.994951403 +0200 @@ -0,0 +1,70 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019606 +# Description: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability +# Source: Package Version Pattern Template v0.3.8 +# Options: SLE,Security,Ghostcat,ghostcat_151,000019606,1164692,tomcat,9.0.31-4.22.1,0,0 +# Distro: SLES11 SP3 +# Modified: 2021 Apr 22 +# +############################################################################## +# Copyright (C) 2021, SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Security" +META_COMPONENT = "Ghostcat" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019606|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1164692" + +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_TOMCAT = 'tomcat6' +RPM_APACHE = 'apache2' +RPM_TOMCAT_FIXED = '6.0.53-0.57.13.1' +RPM_APACHE_FIXED = '2.2.34-70.27.1' + +if( SUSE.packageInstalled(RPM_TOMCAT) ): + if( SUSE.packageInstalled(RPM_APACHE) ): + INSTALLED_VERSION_TOMCAT = SUSE.compareRPM(RPM_TOMCAT, RPM_TOMCAT_FIXED) + INSTALLED_VERSION_APACHE = SUSE.compareRPM(RPM_APACHE, RPM_APACHE_FIXED) + if( INSTALLED_VERSION_TOMCAT >= 0 and INSTALLED_VERSION_APACHE >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_TOMCAT + " and " + RPM_APACHE) + else: + Core.updateStatus(Core.WARN, "Possible Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_APACHE + " not installed") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_TOMCAT + " not installed") + + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/clamav_SUSE-SU-2021_14692-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/clamav_SUSE-SU-2021_14692-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/clamav_SUSE-SU-2021_14692-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/clamav_SUSE-SU-2021_14692-1_11.4.ltss.py 2021-05-04 22:35:17.012802083 +0200 @@ -0,0 +1,62 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for clamav SUSE-SU-2021:14692-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "clamav" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008635.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'clamav' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14692-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'clamav': '0.103.2-0.20.35.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/cups_SUSE-SU-2021_14712-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/cups_SUSE-SU-2021_14712-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/cups_SUSE-SU-2021_14712-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/cups_SUSE-SU-2021_14712-1_11.4.ltss.py 2021-05-04 22:37:06.857885473 +0200 @@ -0,0 +1,65 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for cups SUSE-SU-2021:14712-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "cups" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008714.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'cups' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14712-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'cups': '1.3.9-8.46.56.18.1', + 'cups-client': '1.3.9-8.46.56.18.1', + 'cups-libs': '1.3.9-8.46.56.18.1', + 'cups-libs-32bit': '1.3.9-8.46.56.18.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/ghostcat_114-000019606.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/ghostcat_114-000019606.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/ghostcat_114-000019606.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/ghostcat_114-000019606.py 2021-04-22 23:21:04.304349363 +0200 @@ -0,0 +1,70 @@ +#!/usr/bin/python +# +# Title: Pattern for TID000019606 +# Description: Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability +# Source: Package Version Pattern Template v0.3.8 +# Options: SLE,Security,Ghostcat,ghostcat_151,000019606,1164692,tomcat,9.0.31-4.22.1,0,0 +# Distro: SLES11 SP4 +# Modified: 2021 Apr 22 +# +############################################################################## +# Copyright (C) 2021, SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "SLE" +META_CATEGORY = "Security" +META_COMPONENT = "Ghostcat" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_TID" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_TID=https://www.suse.com/support/kb/doc/?id=000019606|META_LINK_BUG=https://bugzilla.suse.com/show_bug.cgi?id=1164692" + +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +############################################################################## +# Main Program Execution +############################################################################## + +RPM_TOMCAT = 'tomcat6' +RPM_APACHE = 'apache2' +RPM_TOMCAT_FIXED = '6.0.53-0.57.13.1' +RPM_APACHE_FIXED = '2.2.34-70.27.1' + +if( SUSE.packageInstalled(RPM_TOMCAT) ): + if( SUSE.packageInstalled(RPM_APACHE) ): + INSTALLED_VERSION_TOMCAT = SUSE.compareRPM(RPM_TOMCAT, RPM_TOMCAT_FIXED) + INSTALLED_VERSION_APACHE = SUSE.compareRPM(RPM_APACHE, RPM_APACHE_FIXED) + if( INSTALLED_VERSION_TOMCAT >= 0 and INSTALLED_VERSION_APACHE >= 0 ): + Core.updateStatus(Core.IGNORE, "Bug fixes applied for " + RPM_TOMCAT + " and " + RPM_APACHE) + else: + Core.updateStatus(Core.WARN, "Possible Ghostcat - Apache Tomcat AJP File Read/Inclusion Vulnerability") + else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_APACHE + " not installed") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + RPM_TOMCAT + " not installed") + + +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/kvm_SUSE-SU-2021_14704-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/kvm_SUSE-SU-2021_14704-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/kvm_SUSE-SU-2021_14704-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/kvm_SUSE-SU-2021_14704-1_11.4.ltss.py 2021-05-04 22:35:58.511697132 +0200 @@ -0,0 +1,62 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for kvm SUSE-SU-2021:14704-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "kvm" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008660.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'kvm' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14704-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'kvm': '1.4.2-60.34.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14684-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14684-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14684-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14684-1_11.4.ltss.py 2021-05-04 22:34:04.862723877 +0200 @@ -0,0 +1,64 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for MozillaFirefox SUSE-SU-2021:14684-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "MozillaFirefox" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008575.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'MozillaFirefox' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14684-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'MozillaFirefox': '78.9.0-78.123.1', + 'MozillaFirefox-translations-common': '78.9.0-78.123.1', + 'MozillaFirefox-translations-other': '78.9.0-78.123.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14708-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14708-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14708-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/mozillafirefox_SUSE-SU-2021_14708-1_11.4.ltss.py 2021-05-04 22:36:40.118593112 +0200 @@ -0,0 +1,64 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for MozillaFirefox SUSE-SU-2021:14708-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "MozillaFirefox" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008691.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'MozillaFirefox' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14708-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'MozillaFirefox': '78.10.0-78.126.1', + 'MozillaFirefox-translations-common': '78.10.0-78.126.1', + 'MozillaFirefox-translations-other': '78.10.0-78.126.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/openldap2_SUSE-SU-2021_14700-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/openldap2_SUSE-SU-2021_14700-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/openldap2_SUSE-SU-2021_14700-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/openldap2_SUSE-SU-2021_14700-1_11.4.ltss.py 2021-05-04 22:35:30.988429524 +0200 @@ -0,0 +1,67 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for openldap2 SUSE-SU-2021:14700-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "openldap2" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008644.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'openldap2' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14700-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'compat-libldap-2_3-0': '2.3.37-2.74.26.1', + 'libldap-2_4-2': '2.4.26-0.74.26.1', + 'libldap-2_4-2-32bit': '2.4.26-0.74.26.1', + 'openldap2': '2.4.26-0.74.26.1', + 'openldap2-back-meta': '2.4.26-0.74.26.1', + 'openldap2-client': '2.4.26-0.74.26.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/samba_SUSE-SU-2021_14709-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/samba_SUSE-SU-2021_14709-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/samba_SUSE-SU-2021_14709-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/samba_SUSE-SU-2021_14709-1_11.4.ltss.py 2021-05-04 22:36:54.126222232 +0200 @@ -0,0 +1,81 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for samba SUSE-SU-2021:14709-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "samba" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008704.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'samba' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14709-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'ldapsmb': '1.34b-94.34.1', + 'libldb1': '3.6.3-94.34.1', + 'libsmbclient0': '3.6.3-94.34.1', + 'libsmbclient0-32bit': '3.6.3-94.34.1', + 'libtalloc2': '3.6.3-94.34.1', + 'libtalloc2-32bit': '3.6.3-94.34.1', + 'libtdb1': '3.6.3-94.34.1', + 'libtdb1-32bit': '3.6.3-94.34.1', + 'libtevent0': '3.6.3-94.34.1', + 'libtevent0-32bit': '3.6.3-94.34.1', + 'libwbclient0': '3.6.3-94.34.1', + 'libwbclient0-32bit': '3.6.3-94.34.1', + 'samba': '3.6.3-94.34.1', + 'samba-32bit': '3.6.3-94.34.1', + 'samba-client': '3.6.3-94.34.1', + 'samba-client-32bit': '3.6.3-94.34.1', + 'samba-doc': '3.6.3-94.34.1', + 'samba-krb-printing': '3.6.3-94.34.1', + 'samba-winbind': '3.6.3-94.34.1', + 'samba-winbind-32bit': '3.6.3-94.34.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/tomcat6_SUSE-SU-2021_14705-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/tomcat6_SUSE-SU-2021_14705-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/tomcat6_SUSE-SU-2021_14705-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/tomcat6_SUSE-SU-2021_14705-1_11.4.ltss.py 2021-05-04 22:36:11.923340859 +0200 @@ -0,0 +1,69 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for tomcat6 SUSE-SU-2021:14705-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "tomcat6" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008669.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'tomcat6' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14705-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'tomcat6': '6.0.53-0.57.19.1', + 'tomcat6-admin-webapps': '6.0.53-0.57.19.1', + 'tomcat6-docs-webapp': '6.0.53-0.57.19.1', + 'tomcat6-javadoc': '6.0.53-0.57.19.1', + 'tomcat6-jsp-2_1-api': '6.0.53-0.57.19.1', + 'tomcat6-lib': '6.0.53-0.57.19.1', + 'tomcat6-servlet-2_5-api': '6.0.53-0.57.19.1', + 'tomcat6-webapps': '6.0.53-0.57.19.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/xen_SUSE-SU-2021_14702-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/xen_SUSE-SU-2021_14702-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/xen_SUSE-SU-2021_14702-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/xen_SUSE-SU-2021_14702-1_11.4.ltss.py 2021-05-04 22:35:52.015869832 +0200 @@ -0,0 +1,69 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for xen SUSE-SU-2021:14702-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "xen" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008656.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'xen' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14702-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'xen': '4.4.4_48-61.64.1', + 'xen-doc-html': '4.4.4_48-61.64.1', + 'xen-kmp-default': '4.4.4_48_3.0.101_108.123-61.64.1', + 'xen-kmp-pae': '4.4.4_48_3.0.101_108.123-61.64.1', + 'xen-libs': '4.4.4_48-61.64.1', + 'xen-libs-32bit': '4.4.4_48-61.64.1', + 'xen-tools': '4.4.4_48-61.64.1', + 'xen-tools-domU': '4.4.4_48-61.64.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/xorg-x11-server_SUSE-SU-2021_14690-1_11.4.ltss.py new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/xorg-x11-server_SUSE-SU-2021_14690-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.1/patterns/SLE/sle11sp4/xorg-x11-server_SUSE-SU-2021_14690-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.2/patterns/SLE/sle11sp4/xorg-x11-server_SUSE-SU-2021_14690-1_11.4.ltss.py 2021-05-04 22:35:04.537134200 +0200 @@ -0,0 +1,64 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for xorg-x11-server SUSE-SU-2021:14690-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 May 04 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <jason.rec...@suse.com> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "xorg-x11-server" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-April/008626.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'xorg-x11-server' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14690-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'xorg-x11-Xvnc': '7.4-27.122.40.1', + 'xorg-x11-server': '7.4-27.122.40.1', + 'xorg-x11-server-extra': '7.4-27.122.40.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() +