DEBUG: Executing python function do_cve_check
DEBUG: Searching for 0001-Makefile-fix-typo-in-soname-argument.patch in paths:
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib-5.2.2/poky
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/poky
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/files/poky
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib-5.2.2/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/files/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib-5.2.2/x86-64
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/x86-64
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/files/x86-64
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib-5.2.2/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/files/
DEBUG: Using /srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/0001-Makefile-fix-typo-in-soname-argument.patch for 0001-Makefile-fix-typo-in-soname-argument.patch
DEBUG: Scanning 1 patches for CVEs
DEBUG: Patch /srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/0001-Makefile-fix-typo-in-soname-argument.patch doesn't solve CVEs
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2015-7555
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2016-3177
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2016-3977
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2018-11489
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2018-11490
ERROR: Error executing a python function in exec_func_python() autogenerated:
The stack trace of python calls that resulted in this exception/failure was:
File: 'exec_func_python() autogenerated', lineno: 2, function: <module>
0001:
*** 0002:do_cve_check(d)
0003:
File: '/srv/pokybuild/yocto-worker/metrics/build/meta/classes/cve-check.bbclass', lineno: 175, function: do_cve_check
0171: try:
0172: patched_cves = get_patched_cves(d)
0173: except FileNotFoundError:
0174: bb.fatal("Failure in searching patches")
*** 0175: cve_data, status = check_cves(d, patched_cves)
0176: if len(cve_data) or (d.getVar("CVE_CHECK_COVERAGE") == "1" and status):
0177: get_cve_info(d, cve_data)
0178: cve_write_data(d, cve_data, status)
0179: else:
File: '/srv/pokybuild/yocto-worker/metrics/build/meta/classes/cve-check.bbclass', lineno: 343, function: check_cves
0339: vendor = "%"
0340:
0341: # Find all relevant CVE IDs.
0342: cve_cursor = conn.execute("SELECT DISTINCT ID FROM PRODUCTS WHERE PRODUCT IS ? AND VENDOR LIKE ?", (product, vendor))
*** 0343: for cverow in cve_cursor:
0344: cve = cverow[0]
0345:
0346: # Write status once only for each product
0347: if not cves_in_product:
Exception: sqlite3.DatabaseError: database disk image is malformed
DEBUG: Python function do_cve_check finished