From: hongxu <[email protected]> Due to commit [cve-check: Rework patch parsing] applied, it missed to update patched_cves dictionary if cve_id not in patched_cves
Signed-off-by: Hongxu Jia <[email protected]> Signed-off-by: Richard Purdie <[email protected]> (cherry picked from commit 08796a8153666d93bb622c6a7497a85cef4def42) Signed-off-by: Het Patel <[email protected]> --- meta/lib/oe/cve_check.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oe/cve_check.py b/meta/lib/oe/cve_check.py index c1f36db775..8da03b6865 100644 --- a/meta/lib/oe/cve_check.py +++ b/meta/lib/oe/cve_check.py @@ -170,7 +170,7 @@ def get_patched_cves(d): patch_file = bb.fetch.decodeurl(url)[2] for cve_id in parse_cves_from_patch_file(patch_file): if cve_id not in patched_cves: - { + patched_cves[cve_id] = { "abbrev-status": "Patched", "status": "fix-file-included", "resource": [patch_file],
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#231465): https://lists.openembedded.org/g/openembedded-core/message/231465 Mute This Topic: https://lists.openembedded.org/mt/117905850/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
