From: Alexandre Belloni <[email protected]> Since the CVE repository is no longer being updated, drop the warning comparision since it is no longer valid.
Signed-off-by: Richard Purdie <[email protected]> Signed-off-by: Alexandre Belloni <[email protected]> --- meta/recipes-kernel/linux/cve-exclusion_5.10.inc | 14 +++++++------- meta/recipes-kernel/linux/cve-exclusion_5.15.inc | 14 +++++++------- 2 files changed, 14 insertions(+), 14 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.10.inc b/meta/recipes-kernel/linux/cve-exclusion_5.10.inc index 4d959c90b129..4ce0664c0d56 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_5.10.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_5.10.inc @@ -2,13 +2,13 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. # Generated at 2024-02-21 03:55:27.305577 for version 5.10.209 -python check_kernel_cve_status_version() { - this_version = "5.10.209" - kernel_version = d.getVar("LINUX_VERSION") - if kernel_version != this_version: - bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) -} -do_cve_check[prefuncs] += "check_kernel_cve_status_version" +#python check_kernel_cve_status_version() { +# this_version = "5.10.209" +# kernel_version = d.getVar("LINUX_VERSION") +# if kernel_version != this_version: +# bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +#} +#do_cve_check[prefuncs] += "check_kernel_cve_status_version" # fixed-version: Fixed after version 2.6.12rc2 CVE_CHECK_IGNORE += "CVE-2003-1604" diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc index f5ccf2bc22ad..1f5c783db471 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc @@ -2,13 +2,13 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. # Generated at 2024-05-02 12:18:54.390781 for version 5.15.157 -python check_kernel_cve_status_version() { - this_version = "5.15.157" - kernel_version = d.getVar("LINUX_VERSION") - if kernel_version != this_version: - bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) -} -do_cve_check[prefuncs] += "check_kernel_cve_status_version" +#python check_kernel_cve_status_version() { +# this_version = "5.15.157" +# kernel_version = d.getVar("LINUX_VERSION") +# if kernel_version != this_version: +# bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +#} +#do_cve_check[prefuncs] += "check_kernel_cve_status_version" # fixed-version: Fixed after version 2.6.12rc2 CVE_CHECK_IGNORE += "CVE-2003-1604" -- 2.46.0
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#204294): https://lists.openembedded.org/g/openembedded-core/message/204294 Mute This Topic: https://lists.openembedded.org/mt/108328890/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
