diff options
author | Bjoern Tropf <asymmail@googlemail.com> | 2009-05-29 12:07:20 +0200 |
---|---|---|
committer | Bjoern Tropf <asymmail@googlemail.com> | 2009-05-29 12:07:20 +0200 |
commit | a52e5d274bea1b5d3e090c45f96d3d1ab0edcae6 (patch) | |
tree | d459c18c4bf933704dc91d40bd9393fedbba5839 /TODO | |
parent | Remove logging from kernel-check.py (diff) | |
download | kernel-check-a52e5d274bea1b5d3e090c45f96d3d1ab0edcae6.tar.gz kernel-check-a52e5d274bea1b5d3e090c45f96d3d1ab0edcae6.tar.bz2 kernel-check-a52e5d274bea1b5d3e090c45f96d3d1ab0edcae6.zip |
New file structure, implement kernellib.py
Diffstat (limited to 'TODO')
-rw-r--r-- | TODO | 39 |
1 files changed, 5 insertions, 34 deletions
@@ -10,41 +10,12 @@ collector - Implement DTD - Function documentation / manpages - Remove overhead from interval.py (?) +- Check imports +- Move interval.py to kernellib.py +- Move create_xml to kernellib.py -kernel-check.py output -====================== - -*kernel-check ->>> Checking kernel - * Kernel version: 2.6.27-gentoo-r7 [ ok ] - * Architecture: x86 [ ok ] - * Package: kernel-sources [ ok ] - * Genpatches: 2.6.27-9 base extras [ ok ] - ->>> Reading all kernel bugs - * 346 xml files read [ ok ] - * 284 bugs apply to this system [ ok ] - * 274 bugs have been fixed [ ok ] - * 6 bugs could be fixed by upgrading [ !! ] - * 4 bugs have not been fixed yet [ ok ] - - * These bugs could be fixed by upgrading: - * - * 200000 - This is a insidious kernel bug... - critical - * 200001 - This is a malicious kernel bug... - high - * 200002 - This is a malicious kernel bug... - high - * 200003 - This is a sneaky kernel bug ... - low - * 200004 - This is a malicious kernel bug... - high - * 200005 - This is a insidious kernel bug... - critical - * - * To print additional information about a bug try - * # kernel-seek -s [ bugid ] - * - * Upgrading to the latest version [ 2.6.27-gentoo-r13 ] is recommended! - - - Intervall documentation - ======================= +Intervall documentation +======================= name: String, the name of the vulnerable release. This can either be "linux" to specify the upstream release was vulnerable, "genpatches" (or abbreviated "gp") |