[OE-core] ✗ patchtest: failure for bzip2: Fix CVE-2019-12900 (rev4)

Patchwork patchwork at patchwork.openembedded.org
Wed Jan 15 16:02:38 UTC 2020


== Series Details ==

Series: bzip2: Fix CVE-2019-12900 (rev4)
Revision: 4
URL   : https://patchwork.openembedded.org/series/18434/
State : failure

== Summary ==


Thank you for submitting this patch series to OpenEmbedded Core. This is
an automated response. Several tests have been executed on the proposed
series by patchtest resulting in the following failures:



* Patch            [poky,master] bzip2: Fix CVE-2019-12900
 Issue             Missing or incorrectly formatted CVE tag in included patch file [test_cve_tag_format] 
  Suggested fix    Correct or include the CVE tag on cve patch with format: "CVE: CVE-YYYY-XXXX"

* Issue             A patch file has been added, but does not have a Signed-off-by tag [test_signed_off_by_presence] 
  Suggested fix    Sign off the added patch file (meta/recipes-extended/bzip2/bzip2-1.0.6/CVE-2019-12900.patch)



If you believe any of these test results are incorrect, please reply to the
mailing list (openembedded-core at lists.openembedded.org) raising your concerns.
Otherwise we would appreciate you correcting the issues and submitting a new
version of the patchset if applicable. Please ensure you add/increment the
version number when sending the new version (i.e. [PATCH] -> [PATCH v2] ->
[PATCH v3] -> ...).

---
Guidelines:     https://www.openembedded.org/wiki/Commit_Patch_Message_Guidelines
Test framework: http://git.yoctoproject.org/cgit/cgit.cgi/patchtest
Test suite:     http://git.yoctoproject.org/cgit/cgit.cgi/patchtest-oe



More information about the Openembedded-core mailing list