summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'tools/cron.py')
-rwxr-xr-xtools/cron.py22
1 files changed, 11 insertions, 11 deletions
diff --git a/tools/cron.py b/tools/cron.py
index 770e9aa..85228e4 100755
--- a/tools/cron.py
+++ b/tools/cron.py
@@ -1,6 +1,6 @@
#!/usr/bin/env python
# kernel-check -- Gentoo Kernel Security
-# Copyright 2009-2009 Gentoo Foundation
+# Copyright 2009-2010 Gentoo Foundation
# Distributed under the terms of the GNU General Public License v2
from contextlib import closing
@@ -41,9 +41,9 @@ CONST = {
PENDING = {
'published' : '0000-00-00',
- 'desc' : 'This PENDING identifier specifies all vulnerabilities ' \
+ 'desc' : 'This PENDING identifier specifies all vulnerabilities ' \
'which are not approved yet. PENDING is used by products, ' \
- 'databases, and services to specify when a particular ' \
+ 'databases, and services to specify when a particular ' \
'vulnerability element has been proposed as CVE entry.',
'severity' : 'Low',
'vector' : '()',
@@ -54,10 +54,10 @@ PENDING = {
NOMATCH = {
'cve' : 'GENERIC-MAP-NOMATCH',
'published' : '0000-00-00',
- 'desc' : 'This GENERIC identifier is not specific to any ' \
- 'vulnerability. GENERIC-MAP-NOMATCH is used by products, ' \
- 'databases, and services to specify when a particular ' \
- 'vulnerability element does not map to a corresponding ' \
+ 'desc' : 'This GENERIC identifier is not specific to any ' \
+ 'vulnerability. GENERIC-MAP-NOMATCH is used by products, ' \
+ 'databases, and services to specify when a particular ' \
+ 'vulnerability element does not map to a corresponding ' \
'CVE entry.',
'severity' : 'Low',
'vector' : '()',
@@ -80,10 +80,10 @@ REGEX = {
'grp_all' : re.compile(r'(?<=\()[ (]*CVE-(\d{4})([-,(){}|, \d]+)(?=\))'),
'grp_split' : re.compile(r'(?<=\D)(\d{4})(?=\D|$)'),
'm_nomatch' : re.compile(r'.*GENERIC-MAP-NOMATCH.*'),
- 'wb_match' : re.compile(r'\s*\[\s*([^ +<=>]+)\s*([<=>]{1,2})' \
- r'\s*([^ <=>\]]+)\s*(?:([<=>]{1,2})' \
+ 'wb_match' : re.compile(r'\s*\[\s*([^ +<=>]+)\s*([<=>]{1,2})' \
+ r'\s*([^ <=>\]]+)\s*(?:([<=>]{1,2})' \
r'\s*([^ \]]+))?\s*\]\s*(.*)'),
- 'wb_vers' : re.compile(r'^(?:\d{1,2}\.){0,3}\d{1,2}' \
+ 'wb_vers' : re.compile(r'^(?:\d{1,2}\.){0,3}\d{1,2}' \
r'(?:[-_](?:r|rc)?\d{1,2})*$')
}
@@ -137,7 +137,7 @@ def main(argv):
logging.info('Receiving the kernel vulnerability list from bugzilla')
- url = [CONST['bzurl'], 'buglist.cgi?query_format=advanced' \
+ url = [CONST['bzurl'], 'buglist.cgi?query_format=advanced' \
'&component=Kernel']
for item in CONST['state']: