summaryrefslogtreecommitdiff
path: root/TODO
diff options
context:
space:
mode:
authorBjoern Tropf <asymmail@googlemail.com>2009-05-27 11:59:09 +0200
committerBjoern Tropf <asymmail@googlemail.com>2009-05-27 11:59:09 +0200
commitee975859c093eeed06a6289c282d0b8606738d9d (patch)
treed9d4e52e167767f4bb849b1b00c80011b337411e /TODO
parentCode cosmetic changes #4 (diff)
downloadkernel-check-ee975859c093eeed06a6289c282d0b8606738d9d.tar.gz
kernel-check-ee975859c093eeed06a6289c282d0b8606738d9d.tar.bz2
kernel-check-ee975859c093eeed06a6289c282d0b8606738d9d.zip
Code cosmetic changes #5
Diffstat (limited to 'TODO')
-rw-r--r--TODO53
1 files changed, 27 insertions, 26 deletions
diff --git a/TODO b/TODO
index 5b82190..01c789d 100644
--- a/TODO
+++ b/TODO
@@ -14,41 +14,41 @@ kernel-check.py output
======================
*kernel-check
->>> Checking kernel
+>>> Checking kernel
* Kernel version: 2.6.27-gentoo-r7 [ ok ]
* Architecture: x86 [ ok ]
* Package: kernel-sources [ ok ]
* Genpatches: 2.6.27-9 base extras [ ok ]
->>> Reading all kernel bugs
- * 346 xml files read [ ok ]
- * 284 bugs apply to this system [ ok ]
+>>> Reading all kernel bugs
+ * 346 xml files read [ ok ]
+ * 284 bugs apply to this system [ ok ]
* 274 bugs have been fixed [ ok ]
* 6 bugs could be fixed by upgrading [ !! ]
- * 4 bugs have not been fixed yet [ ok ]
+ * 4 bugs have not been fixed yet [ ok ]
* These bugs could be fixed by upgrading:
- *
+ *
* 200000 - This is a insidious kernel bug... - critical
* 200001 - This is a malicious kernel bug... - high
* 200002 - This is a malicious kernel bug... - high
* 200003 - This is a sneaky kernel bug ... - low
* 200004 - This is a malicious kernel bug... - high
* 200005 - This is a insidious kernel bug... - critical
- *
+ *
* To print additional information about a bug try
- * # kernel-seek -s [ bugid ]
- *
+ * # kernel-seek -s [ bugid ]
+ *
* Upgrading to the latest version [ 2.6.27-gentoo-r13 ] is recommended!
-
-
+
+
Intervall documentation
=======================
-
-name: String, the name of the vulnerable release. This can either be "linux" to
+
+name: String, the name of the vulnerable release. This can either be "linux" to
specify the upstream release was vulnerable, "genpatches" (or abbreviated "gp")
or a specifc ebuild name such as "hppa-sources" (or abbreviated "hppa").
-
+
lower: String, the lower boundary.
upper: String, the upper boundary.
@@ -57,15 +57,16 @@ lower_inclusive: Boolean, whether or not the lower boundary is inclusive.
upper_inclusive: Boolean, whether or not the upper boundary is inclusive.
-expand: Boolean, defines whether the entry is shadowing less specific entries
- of the same version range:
- linux is less specific than genpatches which is less specific than the name.
- Example:
- (1) [linux >= 2.6.18 < 2.6.24.3] [gp+ >2.6.16-1 < 2.6.23-8]
- (expand=True)
- (2) [linux >= 2.6.18 < 2.6.24.3] [gp < 2.6.23-8]
- (expand=False)
- In (1), a vulnerability seemingly has been backported to genpatches-2.1.16-1
- and was fixed in 2.6.23-8. A genpatched Kernel 2.6.17 is vulnerable. In (2),
- a patch fixing the vulnerability has been backported to the genpatches.
- Kernels 2.6.17 and earlier are not affected.
+expand: Boolean, defines whether the entry is shadowing less specific entries of the same version range:
+ linux is less specific than genpatches which is less specific than the name.
+ Example:
+ (1) [linux >= 2.6.18 < 2.6.24.3] [gp+ >2.6.16-1 < 2.6.23-8]
+ (expand=True)
+
+ (2) [linux >= 2.6.18 < 2.6.24.3] [gp < 2.6.23-8]
+ (expand=False)
+
+ In (1), a vulnerability seemingly has been backported to genpatches-2.1.16-1
+ and was fixed in 2.6.23-8. A genpatched Kernel 2.6.17 is vulnerable. In (2),
+ a patch fixing the vulnerability has been backported to the genpatches.
+ Kernels 2.6.17 and earlier are not affected.