diff options
Diffstat (limited to 'tools/cron.py')
-rwxr-xr-x | tools/cron.py | 22 |
1 files changed, 11 insertions, 11 deletions
diff --git a/tools/cron.py b/tools/cron.py index 770e9aa..85228e4 100755 --- a/tools/cron.py +++ b/tools/cron.py @@ -1,6 +1,6 @@ #!/usr/bin/env python # kernel-check -- Gentoo Kernel Security -# Copyright 2009-2009 Gentoo Foundation +# Copyright 2009-2010 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 from contextlib import closing @@ -41,9 +41,9 @@ CONST = { PENDING = { 'published' : '0000-00-00', - 'desc' : 'This PENDING identifier specifies all vulnerabilities ' \ + 'desc' : 'This PENDING identifier specifies all vulnerabilities ' \ 'which are not approved yet. PENDING is used by products, ' \ - 'databases, and services to specify when a particular ' \ + 'databases, and services to specify when a particular ' \ 'vulnerability element has been proposed as CVE entry.', 'severity' : 'Low', 'vector' : '()', @@ -54,10 +54,10 @@ PENDING = { NOMATCH = { 'cve' : 'GENERIC-MAP-NOMATCH', 'published' : '0000-00-00', - 'desc' : 'This GENERIC identifier is not specific to any ' \ - 'vulnerability. GENERIC-MAP-NOMATCH is used by products, ' \ - 'databases, and services to specify when a particular ' \ - 'vulnerability element does not map to a corresponding ' \ + 'desc' : 'This GENERIC identifier is not specific to any ' \ + 'vulnerability. GENERIC-MAP-NOMATCH is used by products, ' \ + 'databases, and services to specify when a particular ' \ + 'vulnerability element does not map to a corresponding ' \ 'CVE entry.', 'severity' : 'Low', 'vector' : '()', @@ -80,10 +80,10 @@ REGEX = { 'grp_all' : re.compile(r'(?<=\()[ (]*CVE-(\d{4})([-,(){}|, \d]+)(?=\))'), 'grp_split' : re.compile(r'(?<=\D)(\d{4})(?=\D|$)'), 'm_nomatch' : re.compile(r'.*GENERIC-MAP-NOMATCH.*'), - 'wb_match' : re.compile(r'\s*\[\s*([^ +<=>]+)\s*([<=>]{1,2})' \ - r'\s*([^ <=>\]]+)\s*(?:([<=>]{1,2})' \ + 'wb_match' : re.compile(r'\s*\[\s*([^ +<=>]+)\s*([<=>]{1,2})' \ + r'\s*([^ <=>\]]+)\s*(?:([<=>]{1,2})' \ r'\s*([^ \]]+))?\s*\]\s*(.*)'), - 'wb_vers' : re.compile(r'^(?:\d{1,2}\.){0,3}\d{1,2}' \ + 'wb_vers' : re.compile(r'^(?:\d{1,2}\.){0,3}\d{1,2}' \ r'(?:[-_](?:r|rc)?\d{1,2})*$') } @@ -137,7 +137,7 @@ def main(argv): logging.info('Receiving the kernel vulnerability list from bugzilla') - url = [CONST['bzurl'], 'buglist.cgi?query_format=advanced' \ + url = [CONST['bzurl'], 'buglist.cgi?query_format=advanced' \ '&component=Kernel'] for item in CONST['state']: |