]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commit
linux/generate-cve-exclusions: fix mishandling of boundary values
authorYuta Hayama <hayama@lineo.co.jp>
Tue, 5 Sep 2023 07:29:06 +0000 (16:29 +0900)
committerSteve Sakoman <steve@sakoman.com>
Tue, 10 Oct 2023 15:14:28 +0000 (05:14 -1000)
commita0cafa6587acf2b41f0e832d06de884ffe62fd4b
tree2a3e3b10abd39c05df071a43dcf4677c4ff9355d
parent3f3be3181f78355cfd2c2626f3188c5c1b8c7bc2
linux/generate-cve-exclusions: fix mishandling of boundary values

affected_versions in kernel_cves.json does not mean "first affected version
to last affected version" but actually "first affected version to fixed
version". Therefore, the variable names, conditional expressions, and
CVE_STATUS descriptions should be fixed.

For example, when the script was run against v6.1, if affected_versions was
"xxx to 6.1", the output was "cpe-stable-backport: Backported in 6.1", but
this should be "fixed-version: Fixed from version 6.1".

Signed-off-by: Yuta Hayama <hayama@lineo.co.jp>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
(cherry picked from commit 2064b2f9b92e2dff45dab633598b5ed37145d0b6)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
meta/recipes-kernel/linux/generate-cve-exclusions.py