DEBUG: Executing python function do_cve_check
DEBUG: Searching for 0001-Makefile-fix-typo-in-soname-argument.patch in paths:
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib-5.2.2/poky
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/poky
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/files/poky
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib-5.2.2/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/files/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib-5.2.2/x86-64
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/x86-64
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/files/x86-64
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib-5.2.2/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/
/srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/files/
DEBUG: Using /srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/0001-Makefile-fix-typo-in-soname-argument.patch for 0001-Makefile-fix-typo-in-soname-argument.patch
DEBUG: Scanning 1 patches for CVEs
DEBUG: Patch /srv/pokybuild/yocto-worker/metrics/build/meta-openembedded/meta-oe/recipes-devtools/giflib/giflib/0001-Makefile-fix-typo-in-soname-argument.patch doesn't solve CVEs
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2015-7555
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2016-3177
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2016-3977
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2018-11489
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2018-11490
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2019-15133
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2020-23922
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2021-40633
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2022-28506
NOTE: giflib-native-5.2.2 is not vulnerable to CVE-2023-39742
ERROR: Error executing a python function in exec_func_python() autogenerated:
The stack trace of python calls that resulted in this exception/failure was:
File: 'exec_func_python() autogenerated', lineno: 2, function: <module>
0001:
*** 0002:do_cve_check(d)
0003:
File: '/srv/pokybuild/yocto-worker/metrics/build/meta/classes/cve-check.bbclass', lineno: 185, function: do_cve_check
0181: try:
0182: patched_cves = get_patched_cves(d)
0183: except FileNotFoundError:
0184: bb.fatal("Failure in searching patches")
*** 0185: cve_data, status = check_cves(d, patched_cves)
0186: if len(cve_data) or (d.getVar("CVE_CHECK_COVERAGE") == "1" and status):
0187: get_cve_info(d, cve_data)
0188: cve_write_data(d, cve_data, status)
0189: else:
File: '/srv/pokybuild/yocto-worker/metrics/build/meta/classes/cve-check.bbclass', lineno: 355, function: check_cves
0351: vendor = "%"
0352:
0353: # Find all relevant CVE IDs.
0354: cve_cursor = conn.execute("SELECT DISTINCT ID FROM PRODUCTS WHERE PRODUCT IS ? AND VENDOR LIKE ?", (product, vendor))
*** 0355: for cverow in cve_cursor:
0356: cve = cverow[0]
0357:
0358: # Write status once only for each product
0359: if not cves_in_product:
Exception: sqlite3.DatabaseError: database disk image is malformed
DEBUG: Python function do_cve_check finished