Sorry that I missed that during my review.
I have sent a patch for this now.

Peter

> -----Original Message-----
> From: openembedded-core@lists.openembedded.org 
> <openembedded-core@lists.openembedded.org> On Behalf Of Steve Sakoman via 
> lists.openembedded.org
> Sent: Sunday, July 23, 2023 16:29
> To: Patches and discussions about the oe-core layer 
> <openembedded-core@lists.openembedded.org>; 
> yocto-secur...@lists.yoctoproject.org
> Subject: [OE-core] OE-core CVE metrics for master on Sun 23 Jul 2023
>
> CVE check script failed this week with the following error:
>
> ERROR: Unable to parse
> /home/steve/builds/cve/poky/bitbake/lib/bb/parse/parse_py/ConfHandler.py
> Traceback (most recent call last):
>   File 
> "/home/steve/builds/cve/poky/bitbake/lib/bb/parse/parse_py/ConfHandler.py",
> line 200, in feeder(lineno=125, s='CVE_STATUS[CVE-2020-18974] =
> "upstream-wontfix: It is a fuzzing related buffer overflow. It is of low 
> impact since most devices', 
> fn='conf/distro/include/cve-extra-exclusions.inc', statements=[<bb.pa>
>
>     >    raise ParseError("unparsed line: '%s'" % s, fn, lineno);
>
> bb.parse.ParseError: ParseError at
> conf/distro/include/cve-extra-exclusions.inc:125: unparsed line:
> 'CVE_STATUS[CVE-2020-18974] = "upstream-wontfix: It is a fuzzing related 
> buffer overflow. It is of low impact since most devices'
>
> This seems to be due to the lack of terminating "\" characters on the 
> multiline entry for this CVE in the following commit:
>
> https://git.openembedded.org/openembedded-core/commit/?id=1634ed4048cf56788cd5c2c1bdc979b70afcdcd7
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#184764): 
https://lists.openembedded.org/g/openembedded-core/message/184764
Mute This Topic: https://lists.openembedded.org/mt/100311685/21656
Group Owner: openembedded-core+ow...@lists.openembedded.org
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to