Home
last modified time | relevance | path

Searched refs:unpatched (Results 1 – 13 of 13) sorted by relevance

/openbmc/openbmc/poky/meta/classes/
H A Dcve-check.bbclass13 # cve_check task will print a warning for every unpatched
180 Check recipe for patched and unpatched CVEs
190 ignored, patched, unpatched, status = check_cves(d, patched_cves)
192 cve_data = get_cve_info(d, patched + unpatched + ignored)
193 cve_write_data(d, patched, unpatched, ignored, cve_data, status)
297 Connect to the NVD database and find unpatched cves.
455 def cve_write_data_text(d, patched, unpatched, ignored, cve_data):
479 if not patched+unpatched+ignored:
653 def cve_write_data(d, patched, unpatched, ignored, cve_data, status):
659 cve_write_data_text(d, patched, unpatched, ignored, cve_data)
[all …]
/openbmc/openbmc/poky/meta/conf/
H A Dcve-check-map.conf13 CVE_CHECK_STATUSMAP[unpatched] = "Unpatched"
/openbmc/linux/Documentation/ABI/testing/
H A Dsysfs-kernel-livepatch44 the patched or unpatched state. Administrator should not
/openbmc/openbmc/poky/documentation/dev-manual/
H A Dvulnerabilities.rst17 unpatched CVEs and the status of patches. Such information is available for
94 …WARNING: flex-2.6.4-r0 do_cve_check: Found unpatched CVE (CVE-2019-6293), for more information che…
95 …WARNING: libarchive-3.5.1-r0 do_cve_check: Found unpatched CVE (CVE-2021-36976), for more informat…
247 Here's what the :ref:`ref-classes-cve-check` class does to find unpatched CVE IDs.
/openbmc/linux/Documentation/livepatch/
H A Dlivepatch.rst88 the patched state to the unpatched state.
145 unpatched and 1 to indicate it's patched. Otherwise, if no patch is in
370 to the unpatched state. The system starts using either the code from
376 Second, once all tasks have been unpatched, the 'transition' value changes
391 to a new patch state (patched/unpatched) without being forced it is
H A Dcallbacks.rst47 - before a klp_object is unpatched (ie, patched code is
/openbmc/qemu/hw/acpi/
H A Dnvdimm.c936 Aml *elsectx, *unsupport, *unpatched, *expected_uuid, *uuid_invalid; in nvdimm_build_common_dsm() local
1023 unpatched = aml_equal(dsm_mem, aml_int(0x0)); in nvdimm_build_common_dsm()
1045 unsupport = aml_if(aml_lor(unpatched, uuid_invalid)); in nvdimm_build_common_dsm()
/openbmc/openbmc/poky/documentation/migration-guides/
H A Drelease-notes-4.1.rst54 - New :term:`CVE_CHECK_SHOW_WARNINGS` variable to disable unpatched CVE warning messages
/openbmc/linux/Documentation/process/
H A Dmaintainer-netdev.rst313 unpatched tree to confirm infrastructure didn't mangle it.
/openbmc/openbmc/poky/meta/classes-recipe/
H A Dkernel-yocto.bbclass161 … bbdebug 1 "detected SRC_URI or unpatched defconfig in WORKDIR. ${KBUILD_DEFCONFIG} copied over it"
/openbmc/linux/Documentation/filesystems/
H A Dproc.rst2120 unpatched. If the patch is being enabled, then the task hasn't been
2122 been unpatched.
2127 unpatched yet.
/openbmc/openbmc/poky/meta/recipes-devtools/gcc/gcc/
H A DCVE-2023-4039.patch18 on the CVE. In unpatched sources, the stack-clash problem would only
/openbmc/openbmc/poky/documentation/ref-manual/
H A Dvariables.rst1686 class should generate warning messages on the console when unpatched