summaryrefslogtreecommitdiff
path: root/TODO
blob: 45772996348de4e07243c7ea57cf73a58db5b4d3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
collector
=========
- Stability testing / fuzzing (Valgrind (?))
- Add more logging messages
- Check file integrity (?)
- Use more telling variables
- Clean up code
- Rework interval.py
- Implement DTD
- Function documentation / manpages
- Remove overhead from interval.py (?)

kernel-check.py output
======================

*kernel-check
>>> Checking kernel
 * Kernel version: 2.6.27-gentoo-r7         [ ok ]
 * Architecture: x86                        [ ok ]
 * Package: kernel-sources                  [ ok ]
 * Genpatches: 2.6.27-9 base extras         [ ok ]

>>> Reading all kernel bugs
 * 346 xml files read                       [ ok ]
 * 284 bugs apply to this system            [ ok ]
 * 274 bugs have been fixed                 [ ok ]
 * 6   bugs could be fixed by upgrading     [ !! ]
 * 4   bugs have not been fixed yet         [ ok ]

 * These bugs could be fixed by upgrading:
 *
 * 200000 - This is a insidious kernel bug... - critical
 * 200001 - This is a malicious kernel bug... - high
 * 200002 - This is a malicious kernel bug... - high
 * 200003 - This is a sneaky kernel bug   ... - low
 * 200004 - This is a malicious kernel bug... - high
 * 200005 - This is a insidious kernel bug... - critical
 *
 * To print additional information about a bug try
 * # kernel-seek -s [ bugid ]
 *
 * Upgrading to the latest version [ 2.6.27-gentoo-r13 ] is recommended!


 Intervall documentation
 =======================

name: String, the name of the vulnerable release. This can either be "linux" to
              specify the upstream release was vulnerable, "genpatches" (or abbreviated "gp")
              or a specifc ebuild name such as "hppa-sources" (or abbreviated "hppa").

lower: String, the lower boundary.

upper: String, the upper boundary.

lower_inclusive: Boolean, whether or not the lower boundary is inclusive.

upper_inclusive: Boolean, whether or not the upper boundary is inclusive.

expand: Boolean, defines whether the entry is shadowing less specific entries of the same version range:
    linux is less specific than genpatches which is less specific than the name.
    Example:
    (1) [linux >= 2.6.18 < 2.6.24.3] [gp+ >2.6.16-1 < 2.6.23-8]
        (expand=True)

    (2) [linux >= 2.6.18 < 2.6.24.3] [gp            < 2.6.23-8]
        (expand=False)

    In (1), a vulnerability seemingly has been backported to genpatches-2.1.16-1
    and was fixed in 2.6.23-8. A genpatched Kernel 2.6.17 is vulnerable. In (2),
    a patch fixing the vulnerability has been backported to the genpatches.
    Kernels 2.6.17 and earlier are not affected.