Due to commit [cve-check: Rework patch parsing] applied, it missed to update patched_cves dictionary if cve_id not in patched_cves
Signed-off-by: Hongxu Jia <[email protected]> --- meta/lib/oe/cve_check.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/meta/lib/oe/cve_check.py b/meta/lib/oe/cve_check.py index 85a899a880..5c272ba4ff 100644 --- a/meta/lib/oe/cve_check.py +++ b/meta/lib/oe/cve_check.py @@ -170,7 +170,7 @@ def get_patched_cves(d): patch_file = bb.fetch.decodeurl(url)[2] for cve_id in parse_cves_from_patch_file(patch_file): if cve_id not in patched_cves: - { + patched_cves[cve_id] = { "abbrev-status": "Patched", "status": "fix-file-included", "resource": [patch_file], -- 2.34.1
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#209573): https://lists.openembedded.org/g/openembedded-core/message/209573 Mute This Topic: https://lists.openembedded.org/mt/110498415/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
