intel / cve-bin-tool

The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnerable components (openssl, libpng, libxml2, expat and others), or if you know the components used, you can get a list of known vulnerabilities associated with an SBOM or a list of components and versions.
https://cve-bin-tool.readthedocs.io/en/latest/
GNU General Public License v3.0
1.21k stars 460 forks source link

ci: change cve-scan workflow to use python 3.11 #3487

Closed terriko closed 12 months ago

terriko commented 12 months ago

https://github.com/intel/cve-bin-tool/blob/775a8b3b2db4f3a7acd4633f769d4da71eec3899/.github/workflows/cve_scan.yml#L25C30-L25C30

We're getting errors from the cve-scan job that look suspiciously like the errors we saw when trying out python 3.12. I'd like to switch that workflow to use python 3.11 explicitly (or 3.10, or 3.9) so it's on something we know works.

This should be a one-line change (change 3.x in .github/workflows/cve_scan.yml to be 3.11) so I'm going to mark this as a good first issue and suitable for hacktoberfest folk who are still looking to get their last commits in.

Short tips for new contributors:

Claiming issues:

terriko commented 12 months ago

We probably need to change the format checkers job to use an explicit version of python too:

https://github.com/intel/cve-bin-tool/blob/main/.github/workflows/formatting.yml

CrypticRevenger commented 12 months ago

@terriko can you please assign me, I want to work on it.

terriko commented 12 months ago

@CrypticRevenger have fun! If you get a chance, check and see if anything else in our workflows uses 3.x, but the cve-scan one is the most urgent one to get fixed.

CrypticRevenger commented 12 months ago

@terriko mam , Please review the PR. Thank you.