[OE-core] ✗ patchtest: failure for "[v2] openssl10: Upgrade 1.0.2l..." and 3 more

Leonardo Sandoval leonardo.sandoval.gonzalez at linux.intel.com
Tue Nov 21 19:41:54 UTC 2017


On Mon, 20 Nov 2017 14:36:16 +0200
Alexander Kanavin <alexander.kanavin at linux.intel.com> wrote:

> On 11/18/2017 11:03 AM, Stefan Agner wrote:
> 
> >> * Patch            [v2,1/4] openssl10: Upgrade 1.0.2l -> 1.0.2m
> >>   Issue             Missing or incorrectly formatted CVE tag in
> >> included patch file [test_cve_tag_format]
> >>    Suggested fix    Correct or include the CVE tag on cve patch with
> >> format: "CVE: CVE-YYYY-XXXX"  
> > 
> > I did not add any new patches which address CVE, hence I think this is a
> > false positive/not applicable.  
> 
> You mentioned CVEs in the commit message, I think it wants you to format 
> them in a standard way there.

Right. Currently test is kind of simple, in the sense that it parse the subject/description for a CVE and if found it, it then looks for the standard tag (CVE: ...). CC Daniela who is working on making this test a bit smarter.


> 
> Alex
> -- 
> _______________________________________________
> Openembedded-core mailing list
> Openembedded-core at lists.openembedded.org
> http://lists.openembedded.org/mailman/listinfo/openembedded-core



More information about the Openembedded-core mailing list