* bug#47941: guix lint -c cve stacktrace
@ 2021-04-21 20:29 Jack Hill
2021-04-21 22:04 ` Ludovic Courtès
0 siblings, 1 reply; 2+ messages in thread
From: Jack Hill @ 2021-04-21 20:29 UTC (permalink / raw)
To: 47941
[-- Attachment #1: Type: text/plain, Size: 1346 bytes --]
Hi Guix,
Using guix ae5128e21eb7afa66bd7cfd7fd1bc5764d00663e, the cve lint check
fails when fetching the CVE database as follows:
$ guix lint -c cve hello
fetching CVE database for 2021...
Backtrace:
15 (primitive-load "/home/jackhill/.config/guix/current/bi…")
In guix/ui.scm:
2164:12 14 (run-guix-command _ . _)
In ice-9/boot-9.scm:
1736:10 13 (with-exception-handler _ _ #:unwind? _ # _)
1731:15 12 (with-exception-handler #<procedure 7f895ab7d000 at ic…> …)
In srfi/srfi-1.scm:
634:9 11 (for-each #<procedure 7f895ab84d80 at guix/scripts/lin…> …)
In guix/scripts/lint.scm:
65:4 10 (run-checkers _ _ #:store _)
In srfi/srfi-1.scm:
634:9 9 (for-each #<procedure 7f895420bc00 at guix/scripts/lin…> …)
In guix/scripts/lint.scm:
74:21 8 (_ _)
In guix/lint.scm:
1178:4 7 (check-vulnerabilities _ _)
1170:9 6 (_ _)
In unknown file:
5 (force #<promise #<procedure 7f895af13a88 at guix/lint.…>)
In guix/lint.scm:
1153:2 4 (_)
1112:2 3 (call-with-networking-fail-safe _ _ _)
In ice-9/boot-9.scm:
1736:10 2 (with-exception-handler _ _ #:unwind? _ # _)
1669:16 1 (raise-exception _ #:continuable? _)
1667:16 0 (raise-exception _ #:continuable? _)
ice-9/boot-9.scm:1667:16: In procedure raise-exception:
Wrong type (expecting array): #f
Best,
Jack
^ permalink raw reply [flat|nested] 2+ messages in thread
* bug#47941: guix lint -c cve stacktrace
2021-04-21 20:29 bug#47941: guix lint -c cve stacktrace Jack Hill
@ 2021-04-21 22:04 ` Ludovic Courtès
0 siblings, 0 replies; 2+ messages in thread
From: Ludovic Courtès @ 2021-04-21 22:04 UTC (permalink / raw)
To: Jack Hill; +Cc: 47941-done
Hi,
Jack Hill <jackhill@jackhill.us> skribis:
> Using guix ae5128e21eb7afa66bd7cfd7fd1bc5764d00663e, the cve lint
> check fails when fetching the CVE database as follows:
>
> $ guix lint -c cve hello
> fetching CVE database for 2021...
> Backtrace:
> 15 (primitive-load "/home/jackhill/.config/guix/current/bi…")
> In guix/ui.scm:
> 2164:12 14 (run-guix-command _ . _)
> In ice-9/boot-9.scm:
> 1736:10 13 (with-exception-handler _ _ #:unwind? _ # _)
> 1731:15 12 (with-exception-handler #<procedure 7f895ab7d000 at ic…> …)
> In srfi/srfi-1.scm:
> 634:9 11 (for-each #<procedure 7f895ab84d80 at guix/scripts/lin…> …)
> In guix/scripts/lint.scm:
> 65:4 10 (run-checkers _ _ #:store _)
> In srfi/srfi-1.scm:
> 634:9 9 (for-each #<procedure 7f895420bc00 at guix/scripts/lin…> …)
> In guix/scripts/lint.scm:
> 74:21 8 (_ _)
> In guix/lint.scm:
> 1178:4 7 (check-vulnerabilities _ _)
> 1170:9 6 (_ _)
> In unknown file:
> 5 (force #<promise #<procedure 7f895af13a88 at guix/lint.…>)
> In guix/lint.scm:
> 1153:2 4 (_)
> 1112:2 3 (call-with-networking-fail-safe _ _ _)
> In ice-9/boot-9.scm:
> 1736:10 2 (with-exception-handler _ _ #:unwind? _ # _)
> 1669:16 1 (raise-exception _ #:continuable? _)
> 1667:16 0 (raise-exception _ #:continuable? _)
>
> ice-9/boot-9.scm:1667:16: In procedure raise-exception:
> Wrong type (expecting array): #f
Fixed:
https://git.savannah.gnu.org/cgit/guix.git/commit/?id=7dbc2fcb45fac4a0b64fef8efa8c858a047d0498
It looks like a couple of bogus CVE entries crept in. It’s surprising
because we never encountered such issues before, so I wonder if MITRE
changed something on their side.
Thanks,
Ludo’.
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2021-04-21 22:05 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2021-04-21 20:29 bug#47941: guix lint -c cve stacktrace Jack Hill
2021-04-21 22:04 ` Ludovic Courtès
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/guix.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).