On Sat Dec 28, 2024 at 7:27 PM CET, Colin McAllister via lists.openembedded.org 
wrote:
> The cve_check functionality to parse CVE IDs from the patch filename and
> patch contents have been reworked to improve parsing and also add tests.
> This ensures that the parsing works as intended.
>
> Signed-off-by: Colin McAllister <[email protected]>
> ---

Hi Colin,

It looks like this patch is causing a break on the autobuilder, with the
following error:

ERROR: libidn2-2.3.7-r0 do_cve_check: Error executing a python function in 
exec_func_python() autogenerated:
The stack trace of python calls that resulted in this exception/failure was:
File: 'exec_func_python() autogenerated', lineno: 2, function: <module>
     0001:
 *** 0002:do_cve_check(d)
     0003:
File: 
'/srv/pokybuild/yocto-worker/oe-selftest-debian/build/meta/classes/cve-check.bbclass',
 lineno: 184, function: do_cve_check
     0180:            try:
     0181:                patched_cves = get_patched_cves(d)
     0182:            except FileNotFoundError:
     0183:                bb.fatal("Failure in searching patches")
 *** 0184:            cve_data, status = check_cves(d, patched_cves)
     0185:            if len(cve_data) or (d.getVar("CVE_CHECK_COVERAGE") == 
"1" and status):
     0186:                get_cve_info(d, cve_data)
     0187:                cve_write_data(d, cve_data, status)
     0188:        else:
File: 
'/srv/pokybuild/yocto-worker/oe-selftest-debian/build/meta/classes/cve-check.bbclass',
 lineno: 423, function: check_cves
     0419:            product_cursor.close()
     0420:
     0421:            if not vulnerable:
     0422:                bb.note("%s-%s is not vulnerable to %s" % (pn, 
real_pv, cve))
 *** 0423:                cve_update(d, cve_data, cve, {"abbrev-status": 
"Patched", "status": "version-not-in-range"})
     0424:        cve_cursor.close()
     0425:
     0426:        if not cves_in_product:
     0427:            bb.note("No CVE records found for product %s, pn %s" % 
(product, pn))
File: 
'/srv/pokybuild/yocto-worker/oe-selftest-debian/build/meta/classes/cve-check.bbclass',
 lineno: 287, function: cve_update
     0283:
     0284:def cve_update(d, cve_data, cve, entry):
     0285:    # If no entry, just add it
     0286:    if cve not in cve_data:
 *** 0287:        cve_data[cve] = entry
     0288:        return
     0289:    # If we are updating, there might be change in the status
     0290:    bb.debug("Trying CVE entry update for %s from %s to %s" % (cve, 
cve_data[cve]['abbrev-status'], entry['abbrev-status']))
     0291:    if cve_data[cve]['abbrev-status'] == "Unknown":
Exception: TypeError: 'set' object does not support item assignment

https://valkyrie.yoctoproject.org/#/builders/35/builds/683/steps/14/logs/stdio

On first read, it looks like get_patched_cves() was previously returning
a dictionary and is now returning a set().

Can you fix this please ?

-- 
Mathieu Dubois-Briand, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#209154): 
https://lists.openembedded.org/g/openembedded-core/message/209154
Mute This Topic: https://lists.openembedded.org/mt/110320291/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

  • [OE-core] [PATCH] cve-che... Colin McAllister via lists.openembedded.org
    • Re: [OE-core] [PATCH... Mathieu Dubois-Briand via lists.openembedded.org

Reply via email to