On Tue, Mar 01, 2016 at 09:15:37AM -0600, Mariano Lopez wrote:
>
>
> On 02/29/2016 08:19 AM, mikko.rap...@bmw.de wrote:
> >On Mon, Feb 29, 2016 at 02:17:26PM +, Burton, Ross wrote:
> >>On 26 February 2016 at 08:14, wrote:
> >>
> >>>17:45:37 *** 0013:with open(patch_file, "r") as f:
On 02/29/2016 08:19 AM, mikko.rap...@bmw.de wrote:
On Mon, Feb 29, 2016 at 02:17:26PM +, Burton, Ross wrote:
On 26 February 2016 at 08:14, wrote:
17:45:37 *** 0013:with open(patch_file, "r") as f:
17:45:37 0014:patch_text = f.read()
17:45:37 0015:
17:45:37
On Mon, Feb 29, 2016 at 02:17:26PM +, Burton, Ross wrote:
> On 26 February 2016 at 08:14, wrote:
>
> > 17:45:37 *** 0013:with open(patch_file, "r") as f:
> > 17:45:37 0014:patch_text = f.read()
> > 17:45:37 0015:
> > 17:45:37 0016:# Search for the "
On 26 February 2016 at 08:14, wrote:
> 17:45:37 *** 0013:with open(patch_file, "r") as f:
> 17:45:37 0014:patch_text = f.read()
> 17:45:37 0015:
> 17:45:37 0016:# Search for the "CVE: " line
> 17:45:37 0017:match = cve_match.search(patch_te
On 02/26/2016 08:57 AM, mikko.rap...@bmw.de wrote:
On Fri, Feb 26, 2016 at 03:56:24PM +0100, Mikko Rapeli wrote:
On Fri, Feb 26, 2016 at 08:48:47AM -0600, Mariano Lopez wrote:
On 02/26/2016 02:14 AM, mikko.rap...@bmw.de wrote:
Hi,
On my developer machine the cve-check ran ok for dizzy but on
On Fri, Feb 26, 2016 at 03:56:24PM +0100, Mikko Rapeli wrote:
> On Fri, Feb 26, 2016 at 08:48:47AM -0600, Mariano Lopez wrote:
> > On 02/26/2016 02:14 AM, mikko.rap...@bmw.de wrote:
> > >Hi,
> > >
> > >On my developer machine the cve-check ran ok for dizzy but on build server
> > >with sstate-cache
On Fri, Feb 26, 2016 at 08:48:47AM -0600, Mariano Lopez wrote:
> On 02/26/2016 02:14 AM, mikko.rap...@bmw.de wrote:
> >Hi,
> >
> >On my developer machine the cve-check ran ok for dizzy but on build server
> >with sstate-cache and rmwork enabled it failed with what looks like a race
> >condition whe
On 02/26/2016 02:14 AM, mikko.rap...@bmw.de wrote:
Hi,
On my developer machine the cve-check ran ok for dizzy but on build server
with sstate-cache and rmwork enabled it failed with what looks like a race
condition when scanning the patch files:
17:45:36 ERROR: Error executing a python function
Hi,
On my developer machine the cve-check ran ok for dizzy but on build server
with sstate-cache and rmwork enabled it failed with what looks like a race
condition when scanning the patch files:
17:45:36 ERROR: Error executing a python function in
/home/builder/src/base/poky/meta/recipes-extende
On 02/25/2016 10:27 AM, akuster wrote:
So my questions in the bugs go unanswered. If you don't ever intend on
responding just say so, I do appreciate honestly. I then know where I stand.
- armin
Sorry, for not answered the bug earlier, to be honest I hadn't seen your
comment earlier.
I
For openssh there must be some bugs or tunings needed to match the version
numbers used in CVE to ones in yocto. openssh-6.6p1 has zero matches
with the check but I think there are several:
downloads/CVE_CHECK$ grep openssh *xml| grep 6\.6\:p1
nvdcve-2.0-2016.xml:
nvdcve-2.0-2016.xml:
On Thu, Feb 25, 2016 at 01:29:13PM +0100, Mikko Rapeli wrote:
> On Thu, Feb 25, 2016 at 01:14:21PM +0100, Mikko Rapeli wrote:
> > On Wed, Feb 24, 2016 at 03:27:05PM +, mariano.lo...@linux.intel.com
> > wrote:
> > > From: Mariano Lopez
> > >
> > > This series add the cve-check-tool recipe, a
On Thu, Feb 25, 2016 at 01:14:21PM +0100, Mikko Rapeli wrote:
> On Wed, Feb 24, 2016 at 03:27:05PM +, mariano.lo...@linux.intel.com wrote:
> > From: Mariano Lopez
> >
> > This series add the cve-check-tool recipe, a tool used to identify
> > potentially vulnerable software through version mat
On Wed, Feb 24, 2016 at 03:27:05PM +, mariano.lo...@linux.intel.com wrote:
> From: Mariano Lopez
>
> This series add the cve-check-tool recipe, a tool used to identify
> potentially vulnerable software through version matching. It will
> check if a vulnerability has been addressed by a patch.
From: Mariano Lopez
This series add the cve-check-tool recipe, a tool used to identify
potentially vulnerable software through version matching. It will
check if a vulnerability has been addressed by a patch.
Also add the new cve-check class that will add a task for all recipes
to check for CVEs
15 matches
Mail list logo