From 260c73ffe9ae6a1b4291d8d7234e35d833f7f5dc Mon Sep 17 00:00:00 2001 From: Richard Purdie Date: Thu, 11 Jul 2024 14:20:56 +0200 Subject: [PATCH] cve-exclusion: Drop the version comparision/warning Since the CVE repository is no longer being updated, drop the warning comparision since it is no longer valid. (From OE-Core rev: 7eef8839d131861cca04e1424f0682e81638ca0a) Signed-off-by: Richard Purdie Signed-off-by: Alexandre Belloni Signed-off-by: Steve Sakoman --- meta/recipes-kernel/linux/cve-exclusion_6.6.inc | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc index 9f1f03ac53..32a0701edf 100644 --- a/meta/recipes-kernel/linux/cve-exclusion_6.6.inc +++ b/meta/recipes-kernel/linux/cve-exclusion_6.6.inc @@ -1,14 +1,14 @@ # Auto-generated CVE metadata, DO NOT EDIT BY HAND. -# Generated at 2024-05-02 12:41:43.351358+00:00 for version 6.6.29 +# Generated at 2024-06-06 20:41:33.044442+00:00 for version 6.6.32 -python check_kernel_cve_status_version() { - this_version = "6.6.29" - kernel_version = d.getVar("LINUX_VERSION") - if kernel_version != this_version: - bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) -} -do_cve_check[prefuncs] += "check_kernel_cve_status_version" +#python check_kernel_cve_status_version() { +# this_version = "6.6.29" +# kernel_version = d.getVar("LINUX_VERSION") +# if kernel_version != this_version: +# bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version)) +#} +#do_cve_check[prefuncs] += "check_kernel_cve_status_version" CVE_STATUS[CVE-2003-1604] = "fixed-version: Fixed from version 2.6.12rc2"