diff mbox series

[kirkstone,14/22] cve-exclusion: Drop the version comparision/warning

Message ID 73336ee2416b78ef8ec6c9a16d4371488233610c.1726096839.git.steve@sakoman.com
State Accepted
Delegated to: Steve Sakoman
Headers show
Series [kirkstone,01/22] python3: CVE-2024-6232 CVE-2024-7592 fixes | expand

Commit Message

Steve Sakoman Sept. 11, 2024, 11:23 p.m. UTC
From: Alexandre Belloni <alexandre.belloni@bootlin.com>

Since the CVE repository is no longer being updated, drop the warning
comparision since it is no longer valid.

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
---
 meta/recipes-kernel/linux/cve-exclusion_5.10.inc | 14 +++++++-------
 meta/recipes-kernel/linux/cve-exclusion_5.15.inc | 14 +++++++-------
 2 files changed, 14 insertions(+), 14 deletions(-)
diff mbox series

Patch

diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.10.inc b/meta/recipes-kernel/linux/cve-exclusion_5.10.inc
index 4d959c90b1..4ce0664c0d 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_5.10.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_5.10.inc
@@ -2,13 +2,13 @@ 
 # Auto-generated CVE metadata, DO NOT EDIT BY HAND.
 # Generated at 2024-02-21 03:55:27.305577 for version 5.10.209
 
-python check_kernel_cve_status_version() {
-    this_version = "5.10.209"
-    kernel_version = d.getVar("LINUX_VERSION")
-    if kernel_version != this_version:
-        bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
-}
-do_cve_check[prefuncs] += "check_kernel_cve_status_version"
+#python check_kernel_cve_status_version() {
+#    this_version = "5.10.209"
+#    kernel_version = d.getVar("LINUX_VERSION")
+#    if kernel_version != this_version:
+#        bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
+#}
+#do_cve_check[prefuncs] += "check_kernel_cve_status_version"
 
 # fixed-version: Fixed after version 2.6.12rc2
 CVE_CHECK_IGNORE += "CVE-2003-1604"
diff --git a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc
index f5ccf2bc22..1f5c783db4 100644
--- a/meta/recipes-kernel/linux/cve-exclusion_5.15.inc
+++ b/meta/recipes-kernel/linux/cve-exclusion_5.15.inc
@@ -2,13 +2,13 @@ 
 # Auto-generated CVE metadata, DO NOT EDIT BY HAND.
 # Generated at 2024-05-02 12:18:54.390781 for version 5.15.157
 
-python check_kernel_cve_status_version() {
-    this_version = "5.15.157"
-    kernel_version = d.getVar("LINUX_VERSION")
-    if kernel_version != this_version:
-        bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
-}
-do_cve_check[prefuncs] += "check_kernel_cve_status_version"
+#python check_kernel_cve_status_version() {
+#    this_version = "5.15.157"
+#    kernel_version = d.getVar("LINUX_VERSION")
+#    if kernel_version != this_version:
+#        bb.warn("Kernel CVE status needs updating: generated for %s but kernel is %s" % (this_version, kernel_version))
+#}
+#do_cve_check[prefuncs] += "check_kernel_cve_status_version"
 
 # fixed-version: Fixed after version 2.6.12rc2
 CVE_CHECK_IGNORE += "CVE-2003-1604"