diff options
| author | Daniel Turull <daniel.turull@ericsson.com> | 2025-04-30 16:06:58 +0200 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2025-05-25 12:37:57 +0100 |
| commit | 5ad0c3ae5b2164406b7969a92aecfde341b4a48f (patch) | |
| tree | c6dcaf322781ad8eee5e384116aa61bdbf133965 /meta/classes | |
| parent | 70dc28ac287bf35541270cae1d99130a0f6b7b5f (diff) | |
| download | poky-5ad0c3ae5b2164406b7969a92aecfde341b4a48f.tar.gz | |
cve-check: fix debug message
Debug level was not added as a parameter, causing a warning.
(From OE-Core rev: 182a915fc733791d4583b956df2e62aa35613f5c)
Signed-off-by: Daniel Turull <daniel.turull@ericsson.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes')
| -rw-r--r-- | meta/classes/cve-check.bbclass | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/meta/classes/cve-check.bbclass b/meta/classes/cve-check.bbclass index 6e10dd915a..58abb0da1f 100644 --- a/meta/classes/cve-check.bbclass +++ b/meta/classes/cve-check.bbclass | |||
| @@ -278,7 +278,7 @@ def cve_update(d, cve_data, cve, entry): | |||
| 278 | cve_data[cve] = entry | 278 | cve_data[cve] = entry |
| 279 | return | 279 | return |
| 280 | # If we are updating, there might be change in the status | 280 | # If we are updating, there might be change in the status |
| 281 | bb.debug("Trying CVE entry update for %s from %s to %s" % (cve, cve_data[cve]['abbrev-status'], entry['abbrev-status'])) | 281 | bb.debug(1, "Trying CVE entry update for %s from %s to %s" % (cve, cve_data[cve]['abbrev-status'], entry['abbrev-status'])) |
| 282 | if cve_data[cve]['abbrev-status'] == "Unknown": | 282 | if cve_data[cve]['abbrev-status'] == "Unknown": |
| 283 | cve_data[cve] = entry | 283 | cve_data[cve] = entry |
| 284 | return | 284 | return |
| @@ -289,16 +289,16 @@ def cve_update(d, cve_data, cve, entry): | |||
| 289 | if entry['status'] == "version-in-range" and cve_data[cve]['status'] == "version-not-in-range": | 289 | if entry['status'] == "version-in-range" and cve_data[cve]['status'] == "version-not-in-range": |
| 290 | # New result from the scan, vulnerable | 290 | # New result from the scan, vulnerable |
| 291 | cve_data[cve] = entry | 291 | cve_data[cve] = entry |
| 292 | bb.debug("CVE entry %s update from Patched to Unpatched from the scan result" % cve) | 292 | bb.debug(1, "CVE entry %s update from Patched to Unpatched from the scan result" % cve) |
| 293 | return | 293 | return |
| 294 | if entry['abbrev-status'] == "Patched" and cve_data[cve]['abbrev-status'] == "Unpatched": | 294 | if entry['abbrev-status'] == "Patched" and cve_data[cve]['abbrev-status'] == "Unpatched": |
| 295 | if entry['status'] == "version-not-in-range" and cve_data[cve]['status'] == "version-in-range": | 295 | if entry['status'] == "version-not-in-range" and cve_data[cve]['status'] == "version-in-range": |
| 296 | # Range does not match the scan, but we already have a vulnerable match, ignore | 296 | # Range does not match the scan, but we already have a vulnerable match, ignore |
| 297 | bb.debug("CVE entry %s update from Patched to Unpatched from the scan result - not applying" % cve) | 297 | bb.debug(1, "CVE entry %s update from Patched to Unpatched from the scan result - not applying" % cve) |
| 298 | return | 298 | return |
| 299 | # If we have an "Ignored", it has a priority | 299 | # If we have an "Ignored", it has a priority |
| 300 | if cve_data[cve]['abbrev-status'] == "Ignored": | 300 | if cve_data[cve]['abbrev-status'] == "Ignored": |
| 301 | bb.debug("CVE %s not updating because Ignored" % cve) | 301 | bb.debug(1, "CVE %s not updating because Ignored" % cve) |
| 302 | return | 302 | return |
| 303 | bb.warn("Unhandled CVE entry update for %s from %s to %s" % (cve, cve_data[cve], entry)) | 303 | bb.warn("Unhandled CVE entry update for %s from %s to %s" % (cve, cve_data[cve], entry)) |
| 304 | 304 | ||
