blob: 45772996348de4e07243c7ea57cf73a58db5b4d3 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
|
collector
=========
- Stability testing / fuzzing (Valgrind (?))
- Add more logging messages
- Check file integrity (?)
- Use more telling variables
- Clean up code
- Rework interval.py
- Implement DTD
- Function documentation / manpages
- Remove overhead from interval.py (?)
kernel-check.py output
======================
*kernel-check
>>> Checking kernel
* Kernel version: 2.6.27-gentoo-r7 [ ok ]
* Architecture: x86 [ ok ]
* Package: kernel-sources [ ok ]
* Genpatches: 2.6.27-9 base extras [ ok ]
>>> Reading all kernel bugs
* 346 xml files read [ ok ]
* 284 bugs apply to this system [ ok ]
* 274 bugs have been fixed [ ok ]
* 6 bugs could be fixed by upgrading [ !! ]
* 4 bugs have not been fixed yet [ ok ]
* These bugs could be fixed by upgrading:
*
* 200000 - This is a insidious kernel bug... - critical
* 200001 - This is a malicious kernel bug... - high
* 200002 - This is a malicious kernel bug... - high
* 200003 - This is a sneaky kernel bug ... - low
* 200004 - This is a malicious kernel bug... - high
* 200005 - This is a insidious kernel bug... - critical
*
* To print additional information about a bug try
* # kernel-seek -s [ bugid ]
*
* Upgrading to the latest version [ 2.6.27-gentoo-r13 ] is recommended!
Intervall documentation
=======================
name: String, the name of the vulnerable release. This can either be "linux" to
specify the upstream release was vulnerable, "genpatches" (or abbreviated "gp")
or a specifc ebuild name such as "hppa-sources" (or abbreviated "hppa").
lower: String, the lower boundary.
upper: String, the upper boundary.
lower_inclusive: Boolean, whether or not the lower boundary is inclusive.
upper_inclusive: Boolean, whether or not the upper boundary is inclusive.
expand: Boolean, defines whether the entry is shadowing less specific entries of the same version range:
linux is less specific than genpatches which is less specific than the name.
Example:
(1) [linux >= 2.6.18 < 2.6.24.3] [gp+ >2.6.16-1 < 2.6.23-8]
(expand=True)
(2) [linux >= 2.6.18 < 2.6.24.3] [gp < 2.6.23-8]
(expand=False)
In (1), a vulnerability seemingly has been backported to genpatches-2.1.16-1
and was fixed in 2.6.23-8. A genpatched Kernel 2.6.17 is vulnerable. In (2),
a patch fixing the vulnerability has been backported to the genpatches.
Kernels 2.6.17 and earlier are not affected.
|