Script 'mail_helper' called by obssrc Hello community, here is the log from the commit of package sca-patterns-sle11 for openSUSE:Factory checked in at 2021-08-18 08:56:19 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Comparing /work/SRC/openSUSE:Factory/sca-patterns-sle11 (Old) and /work/SRC/openSUSE:Factory/.sca-patterns-sle11.new.1899 (New) ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Package is "sca-patterns-sle11" Wed Aug 18 08:56:19 2021 rev:16 rq:912704 version:1.3.5 Changes: -------- --- /work/SRC/openSUSE:Factory/sca-patterns-sle11/sca-patterns-sle11.changes 2021-07-03 20:51:07.204643564 +0200 +++ /work/SRC/openSUSE:Factory/.sca-patterns-sle11.new.1899/sca-patterns-sle11.changes 2021-08-18 08:57:11.042885158 +0200 @@ -1,0 +2,7 @@ +Tue Aug 17 14:40:39 UTC 2021 - Jason Record <[email protected]> + +- Changes in version 1.3.5 + - New security announcement patterns (5) + + Jul 2021 (5) for SUSE-SU-2021:14769-1 SUSE-SU-2021:14771-1 SUSE-SU-2021:14766-1 SUSE-SU-2021:14764-1 SUSE-SU-2021:14761-1 + +------------------------------------------------------------------- Old: ---- sca-patterns-sle11-1.3.4.tar.gz New: ---- sca-patterns-sle11-1.3.5.tar.gz ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ Other differences: ------------------ ++++++ sca-patterns-sle11.spec ++++++ --- /var/tmp/diff_new_pack.mdKeCZ/_old 2021-08-18 08:57:11.414884720 +0200 +++ /var/tmp/diff_new_pack.mdKeCZ/_new 2021-08-18 08:57:11.418884716 +0200 @@ -25,7 +25,7 @@ %define category SLE Name: sca-patterns-sle11 -Version: 1.3.4 +Version: 1.3.5 Release: 0 Summary: Supportconfig Analysis Patterns for SLE11 License: GPL-2.0-only ++++++ sca-patterns-sle11-1.3.4.tar.gz -> sca-patterns-sle11-1.3.5.tar.gz ++++++ diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/djvulibre_SUSE-SU-2021_14761-1_11.4.ltss.py new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/djvulibre_SUSE-SU-2021_14761-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/djvulibre_SUSE-SU-2021_14761-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/djvulibre_SUSE-SU-2021_14761-1_11.4.ltss.py 2021-08-05 19:24:23.785247120 +0200 @@ -0,0 +1,62 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for djvulibre SUSE-SU-2021:14761-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 Aug 05 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <[email protected]> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "djvulibre" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-July/009112.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'djvulibre' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14761-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'libdjvulibre21': '3.5.21-3.15.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/kernel_SUSE-SU-2021_14764-1_11.4.ltss.py new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/kernel_SUSE-SU-2021_14764-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/kernel_SUSE-SU-2021_14764-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/kernel_SUSE-SU-2021_14764-1_11.4.ltss.py 2021-08-05 19:24:39.712839510 +0200 @@ -0,0 +1,85 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for Kernel SUSE-SU-2021:14764-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 Aug 05 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <[email protected]> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "Kernel" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-July/009128.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'Kernel' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14764-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'kernel-bigmem': '3.0.101-108.129.1', + 'kernel-bigmem-base': '3.0.101-108.129.1', + 'kernel-bigmem-devel': '3.0.101-108.129.1', + 'kernel-default': '3.0.101-108.129.1', + 'kernel-default-base': '3.0.101-108.129.1', + 'kernel-default-devel': '3.0.101-108.129.1', + 'kernel-default-man': '3.0.101-108.129.1', + 'kernel-ec2': '3.0.101-108.129.1', + 'kernel-ec2-base': '3.0.101-108.129.1', + 'kernel-ec2-devel': '3.0.101-108.129.1', + 'kernel-pae': '3.0.101-108.129.1', + 'kernel-pae-base': '3.0.101-108.129.1', + 'kernel-pae-devel': '3.0.101-108.129.1', + 'kernel-ppc64': '3.0.101-108.129.1', + 'kernel-ppc64-base': '3.0.101-108.129.1', + 'kernel-ppc64-devel': '3.0.101-108.129.1', + 'kernel-source': '3.0.101-108.129.1', + 'kernel-syms': '3.0.101-108.129.1', + 'kernel-trace': '3.0.101-108.129.1', + 'kernel-trace-base': '3.0.101-108.129.1', + 'kernel-trace-devel': '3.0.101-108.129.1', + 'kernel-xen': '3.0.101-108.129.1', + 'kernel-xen-base': '3.0.101-108.129.1', + 'kernel-xen-devel': '3.0.101-108.129.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/kgraft-patch_SUSE-SU-2021_14766-1_11.4.ltss.py new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/kgraft-patch_SUSE-SU-2021_14766-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/kgraft-patch_SUSE-SU-2021_14766-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/kgraft-patch_SUSE-SU-2021_14766-1_11.4.ltss.py 2021-08-05 19:25:05.588177478 +0200 @@ -0,0 +1,64 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for kgraft-patch SUSE-SU-2021:14766-1 +# Description: Security fixes for SUSE Linux Kernel Live Patch 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 Aug 05 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <[email protected]> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "kgraft-patch" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-July/009151.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'kgraft-patch' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14766-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'MozillaFirefox': '78.12.0-78.134.1', + 'MozillaFirefox-translations-common': '78.12.0-78.134.1', + 'MozillaFirefox-translations-other': '78.12.0-78.134.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/kgraft-patch_SUSE-SU-2021_14771-1_11.4.ltss.py new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/kgraft-patch_SUSE-SU-2021_14771-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/kgraft-patch_SUSE-SU-2021_14771-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/kgraft-patch_SUSE-SU-2021_14771-1_11.4.ltss.py 2021-08-05 19:26:27.810074956 +0200 @@ -0,0 +1,64 @@ +#!/usr/bin/python +# +# Title: Important Security Announcement for kgraft-patch SUSE-SU-2021:14771-1 +# Description: Security fixes for SUSE Linux Kernel Live Patch 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 Aug 05 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <[email protected]> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "kgraft-patch" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-July/009231.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'kgraft-patch' +MAIN = '' +SEVERITY = 'Important' +TAG = 'SUSE-SU-2021:14771-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'libsqlite3-0': '3.7.6.3-1.4.7.15.1', + 'libsqlite3-0-32bit': '3.7.6.3-1.4.7.15.1', + 'sqlite3': '3.7.6.3-1.4.7.15.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() + diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' '--exclude=.svnignore' old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/libsndfile_SUSE-SU-2021_14769-1_11.4.ltss.py new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/libsndfile_SUSE-SU-2021_14769-1_11.4.ltss.py --- old/sca-patterns-sle11-1.3.4/patterns/SLE/sle11sp4/libsndfile_SUSE-SU-2021_14769-1_11.4.ltss.py 1970-01-01 01:00:00.000000000 +0100 +++ new/sca-patterns-sle11-1.3.5/patterns/SLE/sle11sp4/libsndfile_SUSE-SU-2021_14769-1_11.4.ltss.py 2021-08-05 19:26:12.442467799 +0200 @@ -0,0 +1,63 @@ +#!/usr/bin/python +# +# Title: Critical Security Announcement for libsndfile SUSE-SU-2021:14769-1 +# Description: Security fixes for SUSE Linux Enterprise 11 SP4 LTSS +# Source: Security Announcement Parser v1.6.1 +# Modified: 2021 Aug 05 +# +############################################################################## +# Copyright (C) 2021 SUSE LLC +############################################################################## +# +# This program is free software; you can redistribute it and/or modify +# it under the terms of the GNU General Public License as published by +# the Free Software Foundation; version 2 of the License. +# +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. +# +# You should have received a copy of the GNU General Public License +# along with this program; if not, see <http://www.gnu.org/licenses/>. +# +# Authors/Contributors: +# Jason Record <[email protected]> +# +############################################################################## + +import os +import Core +import SUSE + +META_CLASS = "Security" +META_CATEGORY = "SLE" +META_COMPONENT = "libsndfile" +PATTERN_ID = os.path.basename(__file__) +PRIMARY_LINK = "META_LINK_Security" +OVERALL = Core.TEMP +OVERALL_INFO = "NOT SET" +OTHER_LINKS = "META_LINK_Security=https://lists.suse.com/pipermail/sle-security-updates/2021-July/009219.html" +Core.init(META_CLASS, META_CATEGORY, META_COMPONENT, PATTERN_ID, PRIMARY_LINK, OVERALL, OVERALL_INFO, OTHER_LINKS) + +LTSS = True +NAME = 'libsndfile' +MAIN = '' +SEVERITY = 'Critical' +TAG = 'SUSE-SU-2021:14769-1' +PACKAGES = {} +SERVER = SUSE.getHostInfo() + +if ( SERVER['DistroVersion'] == 11): + if ( SERVER['DistroPatchLevel'] == 4 ): + PACKAGES = { + 'libsndfile': '1.0.20-2.19.15.1', + 'libsndfile-32bit': '1.0.20-2.19.15.1', + } + SUSE.securityAnnouncementPackageCheck(NAME, MAIN, LTSS, SEVERITY, TAG, PACKAGES) + else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the service pack scope") +else: + Core.updateStatus(Core.ERROR, "ERROR: " + NAME + " Security Announcement: Outside the distribution scope") +Core.printPatternResults() +
