diff options
author | Daniel Turull <daniel.turull@ericsson.com> | 2025-04-30 16:06:58 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2025-05-25 12:37:57 +0100 |
commit | 5ad0c3ae5b2164406b7969a92aecfde341b4a48f (patch) | |
tree | c6dcaf322781ad8eee5e384116aa61bdbf133965 | |
parent | 70dc28ac287bf35541270cae1d99130a0f6b7b5f (diff) | |
download | poky-5ad0c3ae5b2164406b7969a92aecfde341b4a48f.tar.gz |
cve-check: fix debug message
Debug level was not added as a parameter, causing a warning.
(From OE-Core rev: 182a915fc733791d4583b956df2e62aa35613f5c)
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
-rw-r--r-- | meta/classes/cve-check.bbclass | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 6e10dd915a..58abb0da1f 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass | |||
@@ -278,7 +278,7 @@ def cve_update(d, cve_data, cve, entry): | |||
278 | cve_data[cve] = entry | 278 | cve_data[cve] = entry |
279 | return | 279 | return |
280 | # If we are updating, there might be change in the status | 280 | # If we are updating, there might be change in the status |
281 | bb.debug("Trying CVE entry update for %s from %s to %s" % (cve, cve_data[cve]['abbrev-status'], entry['abbrev-status'])) | 281 | bb.debug(1, "Trying CVE entry update for %s from %s to %s" % (cve, cve_data[cve]['abbrev-status'], entry['abbrev-status'])) |
282 | if cve_data[cve]['abbrev-status'] == "Unknown": | 282 | if cve_data[cve]['abbrev-status'] == "Unknown": |
283 | cve_data[cve] = entry | 283 | cve_data[cve] = entry |
284 | return | 284 | return |
@@ -289,16 +289,16 @@ def cve_update(d, cve_data, cve, entry): | |||
289 | if entry['status'] == "version-in-range" and cve_data[cve]['status'] == "version-not-in-range": | 289 | if entry['status'] == "version-in-range" and cve_data[cve]['status'] == "version-not-in-range": |
290 | # New result from the scan, vulnerable | 290 | # New result from the scan, vulnerable |
291 | cve_data[cve] = entry | 291 | cve_data[cve] = entry |
292 | bb.debug("CVE entry %s update from Patched to Unpatched from the scan result" % cve) | 292 | bb.debug(1, "CVE entry %s update from Patched to Unpatched from the scan result" % cve) |
293 | return | 293 | return |
294 | if entry['abbrev-status'] == "Patched" and cve_data[cve]['abbrev-status'] == "Unpatched": | 294 | if entry['abbrev-status'] == "Patched" and cve_data[cve]['abbrev-status'] == "Unpatched": |
295 | if entry['status'] == "version-not-in-range" and cve_data[cve]['status'] == "version-in-range": | 295 | if entry['status'] == "version-not-in-range" and cve_data[cve]['status'] == "version-in-range": |
296 | # Range does not match the scan, but we already have a vulnerable match, ignore | 296 | # Range does not match the scan, but we already have a vulnerable match, ignore |
297 | bb.debug("CVE entry %s update from Patched to Unpatched from the scan result - not applying" % cve) | 297 | bb.debug(1, "CVE entry %s update from Patched to Unpatched from the scan result - not applying" % cve) |
298 | return | 298 | return |
299 | # If we have an "Ignored", it has a priority | 299 | # If we have an "Ignored", it has a priority |
300 | if cve_data[cve]['abbrev-status'] == "Ignored": | 300 | if cve_data[cve]['abbrev-status'] == "Ignored": |
301 | bb.debug("CVE %s not updating because Ignored" % cve) | 301 | bb.debug(1, "CVE %s not updating because Ignored" % cve) |
302 | return | 302 | return |
303 | bb.warn("Unhandled CVE entry update for %s from %s to %s" % (cve, cve_data[cve], entry)) | 303 | bb.warn("Unhandled CVE entry update for %s from %s to %s" % (cve, cve_data[cve], entry)) |
304 | 304 | ||