cve_policy_filter.py: Failed to execute the filter with the latest vulsscan result in the StarlingX target
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
StarlingX |
Fix Released
|
Medium
|
Zhixiong Chi |
Bug Description
Brief Description
-----------------
It will be failed to execute this script with the following command:
$python3 cve_policy_
The calltrace is as follows:
Traceback (most recent call last):
File "cve_policy_
main()
File "cve_policy_
cvssv3_
File "cve_policy_
raise NVDLengthExcept
Warning: NVD length: 2, not 1, Please check again!
__main_
Severity
--------
Major
Steps to Reproduce
------------------
$git clone https:/
$cd vulsctl/
$sudo ./install.sh
$sudo ./update-all.sh
$vuls scan
$sudo vuls report -format-json -results-
$ls sudo ls results/current/
localhost.json localhost.txt
Copy localhost.json to the directory cve_support of tools repo
$python3 cve_policy_
Expected Behavior
------------------
Execute successfully without errors and warnings.
Get the CVE report
Actual Behavior
----------------
Failed to execute the script
Reproducibility
---------------
100%
System Configuration
-------
N/A
Branch/Pull Time/Commit
-------
Master
Last Pass
---------
Dec/2023
The recent times I just execute the script with the workaround to get the report.
Now I'm going to submit the code review.
Timestamp/Logs
--------------
N/A
Test Activity
-------------
Unit Test
Workaround
----------
Changed in starlingx: | |
assignee: | nobody → Zhixiong Chi (zhixiongchi) |
status: | New → In Progress |
Changed in starlingx: | |
importance: | Undecided → Medium |
tags: | added: stx.too |
tags: |
added: stx.10.0 stx.tools removed: stx.too |
tags: | added: stx.security |
Fix proposed to branch: master /review. opendev. org/c/starlingx /tools/ +/914843
Review: https:/