summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDaniel Turull <daniel.turull@ericsson.com>2025-04-30 16:06:58 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2025-05-25 12:37:57 +0100
commit5ad0c3ae5b2164406b7969a92aecfde341b4a48f (patch)
treec6dcaf322781ad8eee5e384116aa61bdbf133965
parent70dc28ac287bf35541270cae1d99130a0f6b7b5f (diff)
downloadpoky-5ad0c3ae5b2164406b7969a92aecfde341b4a48f.tar.gz
cve-check: fix debug message
Debug level was not added as a parameter, causing a warning. (From OE-Core rev: 182a915fc733791d4583b956df2e62aa35613f5c) Signed-off-by: Daniel Turull <daniel.turull@ericsson.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r--meta/classes/cve-check.bbclass8
1 files changed, 4 insertions, 4 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass
index 6e10dd915a..58abb0da1f 100644
--- a/meta/classes/cve-check.bbclass
+++ b/meta/classes/cve-check.bbclass
@@ -278,7 +278,7 @@ def cve_update(d, cve_data, cve, entry):
278 cve_data[cve] = entry 278 cve_data[cve] = entry
279 return 279 return
280 # If we are updating, there might be change in the status 280 # If we are updating, there might be change in the status
281 bb.debug("Trying CVE entry update for %s from %s to %s" % (cve, cve_data[cve]['abbrev-status'], entry['abbrev-status'])) 281 bb.debug(1, "Trying CVE entry update for %s from %s to %s" % (cve, cve_data[cve]['abbrev-status'], entry['abbrev-status']))
282 if cve_data[cve]['abbrev-status'] == "Unknown": 282 if cve_data[cve]['abbrev-status'] == "Unknown":
283 cve_data[cve] = entry 283 cve_data[cve] = entry
284 return 284 return
@@ -289,16 +289,16 @@ def cve_update(d, cve_data, cve, entry):
289 if entry['status'] == "version-in-range" and cve_data[cve]['status'] == "version-not-in-range": 289 if entry['status'] == "version-in-range" and cve_data[cve]['status'] == "version-not-in-range":
290 # New result from the scan, vulnerable 290 # New result from the scan, vulnerable
291 cve_data[cve] = entry 291 cve_data[cve] = entry
292 bb.debug("CVE entry %s update from Patched to Unpatched from the scan result" % cve) 292 bb.debug(1, "CVE entry %s update from Patched to Unpatched from the scan result" % cve)
293 return 293 return
294 if entry['abbrev-status'] == "Patched" and cve_data[cve]['abbrev-status'] == "Unpatched": 294 if entry['abbrev-status'] == "Patched" and cve_data[cve]['abbrev-status'] == "Unpatched":
295 if entry['status'] == "version-not-in-range" and cve_data[cve]['status'] == "version-in-range": 295 if entry['status'] == "version-not-in-range" and cve_data[cve]['status'] == "version-in-range":
296 # Range does not match the scan, but we already have a vulnerable match, ignore 296 # Range does not match the scan, but we already have a vulnerable match, ignore
297 bb.debug("CVE entry %s update from Patched to Unpatched from the scan result - not applying" % cve) 297 bb.debug(1, "CVE entry %s update from Patched to Unpatched from the scan result - not applying" % cve)
298 return 298 return
299 # If we have an "Ignored", it has a priority 299 # If we have an "Ignored", it has a priority
300 if cve_data[cve]['abbrev-status'] == "Ignored": 300 if cve_data[cve]['abbrev-status'] == "Ignored":
301 bb.debug("CVE %s not updating because Ignored" % cve) 301 bb.debug(1, "CVE %s not updating because Ignored" % cve)
302 return 302 return
303 bb.warn("Unhandled CVE entry update for %s from %s to %s" % (cve, cve_data[cve], entry)) 303 bb.warn("Unhandled CVE entry update for %s from %s to %s" % (cve, cve_data[cve], entry))
304 304