diff options
author | 2009-05-27 11:59:09 +0200 | |
---|---|---|
committer | 2009-05-27 11:59:09 +0200 | |
commit | ee975859c093eeed06a6289c282d0b8606738d9d (patch) | |
tree | d9d4e52e167767f4bb849b1b00c80011b337411e /TODO | |
parent | Code cosmetic changes #4 (diff) | |
download | kernel-check-ee975859c093eeed06a6289c282d0b8606738d9d.tar.gz kernel-check-ee975859c093eeed06a6289c282d0b8606738d9d.tar.bz2 kernel-check-ee975859c093eeed06a6289c282d0b8606738d9d.zip |
Code cosmetic changes #5
Diffstat (limited to 'TODO')
-rw-r--r-- | TODO | 53 |
1 files changed, 27 insertions, 26 deletions
@@ -14,41 +14,41 @@ kernel-check.py output ====================== *kernel-check ->>> Checking kernel +>>> Checking kernel * Kernel version: 2.6.27-gentoo-r7 [ ok ] * Architecture: x86 [ ok ] * Package: kernel-sources [ ok ] * Genpatches: 2.6.27-9 base extras [ ok ] ->>> Reading all kernel bugs - * 346 xml files read [ ok ] - * 284 bugs apply to this system [ ok ] +>>> Reading all kernel bugs + * 346 xml files read [ ok ] + * 284 bugs apply to this system [ ok ] * 274 bugs have been fixed [ ok ] * 6 bugs could be fixed by upgrading [ !! ] - * 4 bugs have not been fixed yet [ ok ] + * 4 bugs have not been fixed yet [ ok ] * These bugs could be fixed by upgrading: - * + * * 200000 - This is a insidious kernel bug... - critical * 200001 - This is a malicious kernel bug... - high * 200002 - This is a malicious kernel bug... - high * 200003 - This is a sneaky kernel bug ... - low * 200004 - This is a malicious kernel bug... - high * 200005 - This is a insidious kernel bug... - critical - * + * * To print additional information about a bug try - * # kernel-seek -s [ bugid ] - * + * # kernel-seek -s [ bugid ] + * * Upgrading to the latest version [ 2.6.27-gentoo-r13 ] is recommended! - - + + Intervall documentation ======================= - -name: String, the name of the vulnerable release. This can either be "linux" to + +name: String, the name of the vulnerable release. This can either be "linux" to specify the upstream release was vulnerable, "genpatches" (or abbreviated "gp") or a specifc ebuild name such as "hppa-sources" (or abbreviated "hppa"). - + lower: String, the lower boundary. upper: String, the upper boundary. @@ -57,15 +57,16 @@ lower_inclusive: Boolean, whether or not the lower boundary is inclusive. upper_inclusive: Boolean, whether or not the upper boundary is inclusive. -expand: Boolean, defines whether the entry is shadowing less specific entries - of the same version range: - linux is less specific than genpatches which is less specific than the name. - Example: - (1) [linux >= 2.6.18 < 2.6.24.3] [gp+ >2.6.16-1 < 2.6.23-8] - (expand=True) - (2) [linux >= 2.6.18 < 2.6.24.3] [gp < 2.6.23-8] - (expand=False) - In (1), a vulnerability seemingly has been backported to genpatches-2.1.16-1 - and was fixed in 2.6.23-8. A genpatched Kernel 2.6.17 is vulnerable. In (2), - a patch fixing the vulnerability has been backported to the genpatches. - Kernels 2.6.17 and earlier are not affected. +expand: Boolean, defines whether the entry is shadowing less specific entries of the same version range: + linux is less specific than genpatches which is less specific than the name. + Example: + (1) [linux >= 2.6.18 < 2.6.24.3] [gp+ >2.6.16-1 < 2.6.23-8] + (expand=True) + + (2) [linux >= 2.6.18 < 2.6.24.3] [gp < 2.6.23-8] + (expand=False) + + In (1), a vulnerability seemingly has been backported to genpatches-2.1.16-1 + and was fixed in 2.6.23-8. A genpatched Kernel 2.6.17 is vulnerable. In (2), + a patch fixing the vulnerability has been backported to the genpatches. + Kernels 2.6.17 and earlier are not affected. |