From: Daniel Turull <[email protected]>

Check if the cve information has the details field to avoid crashing

Signed-off-by: Daniel Turull <[email protected]>
---
 scripts/contrib/improve_kernel_cve_report.py | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/scripts/contrib/improve_kernel_cve_report.py 
b/scripts/contrib/improve_kernel_cve_report.py
index 903de0000c..b386c9383a 100755
--- a/scripts/contrib/improve_kernel_cve_report.py
+++ b/scripts/contrib/improve_kernel_cve_report.py
@@ -363,7 +363,7 @@ def cve_update(cve_data, cve, entry):
     if entry['status'] == "Unpatched" and cve_data[cve]['status'] == "Patched":
         # Backported-patch (e.g. vendor kernel repo with cherry-picked CVE 
patch)
         # has priority over unpatch from CNA
-        if cve_data[cve]['detail'] == "backported-patch":
+        if "detail" in cve_data and cve_data[cve]['detail'] == 
"backported-patch":
             return
         logging.warning("CVE entry %s update from Patched to Unpatched from 
the scan result", cve)
         cve_data[cve] = copy_data(cve_data[cve], entry)
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#230524): 
https://lists.openembedded.org/g/openembedded-core/message/230524
Mute This Topic: https://lists.openembedded.org/mt/117633907/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to