cve-exclusion: Drop the version comparision/warning

Since the CVE repository is no longer being updated, drop the warning
comparision since it is no longer valid.

(From OE-Core rev: 73336ee2416b78ef8ec6c9a16d4371488233610c)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
Alexandre Belloni
2024-09-07 23:42:15 +02:00
committed by Steve Sakoman
parent df56ba7ec8
commit 974b2c3871
2 changed files with 14 additions and 14 deletions

View File

@@ -2,13 +2,13 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
# Generated at 2024-02-21 03:55:27.305577 for version 5.10.209
python check_kernel_cve_status_version() {
this_version = "5.10.209"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
}
do_cve_check[prefuncs] += "check_kernel_cve_status_version"
#python check_kernel_cve_status_version() {
# this_version = "5.10.209"
# kernel_version = d.getVar("LINUX_VERSION")
# if kernel_version != this_version:
# bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
#}
#do_cve_check[prefuncs] += "check_kernel_cve_status_version"
# fixed-version: Fixed after version 2.6.12rc2
CVE_CHECK_IGNORE += "CVE-2003-1604"

View File

@@ -2,13 +2,13 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
# Generated at 2024-05-02 12:18:54.390781 for version 5.15.157
python check_kernel_cve_status_version() {
this_version = "5.15.157"
kernel_version = d.getVar("LINUX_VERSION")
if kernel_version != this_version:
bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
}
do_cve_check[prefuncs] += "check_kernel_cve_status_version"
#python check_kernel_cve_status_version() {
# this_version = "5.15.157"
# kernel_version = d.getVar("LINUX_VERSION")
# if kernel_version != this_version:
# bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
#}
#do_cve_check[prefuncs] += "check_kernel_cve_status_version"
# fixed-version: Fixed after version 2.6.12rc2
CVE_CHECK_IGNORE += "CVE-2003-1604"