@@ -1,14 +1,14 @@
# Auto-generated CVE metadata, DO NOT EDIT BY HAND.
-# Generated at 2024-05-02 12:41:43.351358+00:00 for version 6.6.29
-
-python check_kernel_cve_status_version() {
- this_version = "6.6.29"
- kernel_version = d.getVar("LINUX_VERSION")
- if kernel_version != this_version:
- bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
-}
-do_cve_check[prefuncs] += "check_kernel_cve_status_version"
+# Generated at 2024-06-06 20:41:33.044442+00:00 for version 6.6.32
+
+#python check_kernel_cve_status_version() {
+# this_version = "6.6.29"
+# kernel_version = d.getVar("LINUX_VERSION")
+# if kernel_version != this_version:
+# bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
+#}
+#do_cve_check[prefuncs] += "check_kernel_cve_status_version"
CVE_STATUS[CVE-2003-1604] = "fixed-version: Fixed from version 2.6.12rc2"
Since the CVE repository is no longer being updated, drop the warning comparision since it is no longer valid. Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> --- .../recipes-kernel/linux/cve-exclusion_6.6.inc | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-)