diff options
author | Ralph Siemsen <ralph.siemsen@linaro.org> | 2020-07-09 00:07:50 +0300 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2020-08-04 23:17:37 +0100 |
commit | 6d936d8d3d49cca5ac3724efd2aa76ef4403789b (patch) | |
tree | 8157246d29cc8423a2e90e117652a2adeb27a7d8 | |
parent | ea0d41cdfb46b683b3421fec3733e83dbd05a6ab (diff) | |
download | poky-6d936d8d3d49cca5ac3724efd2aa76ef4403789b.tar.gz |
cve-check: include epoch in product version output
In the generated cve.log files, include the epoch in the product
version. This better matches how versions are displayed elsewhere,
in particular the bb.warn("Found unpatched CVE...") that appears
on the terminal when CVEs are found.
(From OE-Core rev: 99f6de1c74b581054c74c6b4598a5d47facc9964)
(From OE-Core rev: a8b69927485acbe504fcd75dc2cafc4c550cb66a)
Signed-off-by: Ralph Siemsen <ralph.siemsen@linaro.org>
(cherry picked from commit e1c3c0b6e5b01304e2127f5058986697e82adf93)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Signed-off-by: Adrian Bunk <bunk@stusta.de>
Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r-- | meta/classes/cve-check.bbclass | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 556ac6e67f..514897e8b8 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass | |||
@@ -301,7 +301,7 @@ def cve_write_data(d, patched, unpatched, whitelisted, cve_data): | |||
301 | 301 | ||
302 | for cve in sorted(cve_data): | 302 | for cve in sorted(cve_data): |
303 | write_string += "PACKAGE NAME: %s\n" % d.getVar("PN") | 303 | write_string += "PACKAGE NAME: %s\n" % d.getVar("PN") |
304 | write_string += "PACKAGE VERSION: %s\n" % d.getVar("PV") | 304 | write_string += "PACKAGE VERSION: %s%s\n" % (d.getVar("EXTENDPE"), d.getVar("PV")) |
305 | write_string += "CVE: %s\n" % cve | 305 | write_string += "CVE: %s\n" % cve |
306 | if cve in whitelisted: | 306 | if cve in whitelisted: |
307 | write_string += "CVE STATUS: Whitelisted\n" | 307 | write_string += "CVE STATUS: Whitelisted\n" |