Searched refs:unpatched (Results 1 – 13 of 13) sorted by relevance
/openbmc/openbmc/poky/meta/classes/ |
H A D | cve-check.bbclass | 13 # cve_check task will print a warning for every unpatched 180 Check recipe for patched and unpatched CVEs 190 ignored, patched, unpatched, status = check_cves(d, patched_cves) 192 cve_data = get_cve_info(d, patched + unpatched + ignored) 193 cve_write_data(d, patched, unpatched, ignored, cve_data, status) 297 Connect to the NVD database and find unpatched cves. 455 def cve_write_data_text(d, patched, unpatched, ignored, cve_data): 479 if not patched+unpatched+ignored: 653 def cve_write_data(d, patched, unpatched, ignored, cve_data, status): 659 cve_write_data_text(d, patched, unpatched, ignored, cve_data) [all …]
|
/openbmc/openbmc/poky/meta/conf/ |
H A D | cve-check-map.conf | 13 CVE_CHECK_STATUSMAP[unpatched] = "Unpatched"
|
/openbmc/linux/Documentation/ABI/testing/ |
H A D | sysfs-kernel-livepatch | 44 the patched or unpatched state. Administrator should not
|
/openbmc/openbmc/poky/documentation/dev-manual/ |
H A D | vulnerabilities.rst | 17 unpatched CVEs and the status of patches. Such information is available for 94 …WARNING: flex-2.6.4-r0 do_cve_check: Found unpatched CVE (CVE-2019-6293), for more information che… 95 …WARNING: libarchive-3.5.1-r0 do_cve_check: Found unpatched CVE (CVE-2021-36976), for more informat… 247 Here's what the :ref:`ref-classes-cve-check` class does to find unpatched CVE IDs.
|
/openbmc/linux/Documentation/livepatch/ |
H A D | livepatch.rst | 88 the patched state to the unpatched state. 145 unpatched and 1 to indicate it's patched. Otherwise, if no patch is in 370 to the unpatched state. The system starts using either the code from 376 Second, once all tasks have been unpatched, the 'transition' value changes 391 to a new patch state (patched/unpatched) without being forced it is
|
H A D | callbacks.rst | 47 - before a klp_object is unpatched (ie, patched code is
|
/openbmc/qemu/hw/acpi/ |
H A D | nvdimm.c | 936 Aml *elsectx, *unsupport, *unpatched, *expected_uuid, *uuid_invalid; in nvdimm_build_common_dsm() local 1023 unpatched = aml_equal(dsm_mem, aml_int(0x0)); in nvdimm_build_common_dsm() 1045 unsupport = aml_if(aml_lor(unpatched, uuid_invalid)); in nvdimm_build_common_dsm()
|
/openbmc/openbmc/poky/documentation/migration-guides/ |
H A D | release-notes-4.1.rst | 54 - New :term:`CVE_CHECK_SHOW_WARNINGS` variable to disable unpatched CVE warning messages
|
/openbmc/linux/Documentation/process/ |
H A D | maintainer-netdev.rst | 313 unpatched tree to confirm infrastructure didn't mangle it.
|
/openbmc/openbmc/poky/meta/classes-recipe/ |
H A D | kernel-yocto.bbclass | 161 … bbdebug 1 "detected SRC_URI or unpatched defconfig in WORKDIR. ${KBUILD_DEFCONFIG} copied over it"
|
/openbmc/linux/Documentation/filesystems/ |
H A D | proc.rst | 2120 unpatched. If the patch is being enabled, then the task hasn't been 2122 been unpatched. 2127 unpatched yet.
|
/openbmc/openbmc/poky/meta/recipes-devtools/gcc/gcc/ |
H A D | CVE-2023-4039.patch | 18 on the CVE. In unpatched sources, the stack-clash problem would only
|
/openbmc/openbmc/poky/documentation/ref-manual/ |
H A D | variables.rst | 1686 class should generate warning messages on the console when unpatched
|