[OE-core] [warrior][PATCH] ed: set CVE vendor to avoid false positives
Adrian Bunk
bunk at stusta.de
Tue Nov 5 21:44:41 UTC 2019
From: Ross Burton <ross.burton at intel.com>
Signed-off-by: Ross Burton <ross.burton at intel.com>
Signed-off-by: Richard Purdie <richard.purdie at linuxfoundation.org>
Signed-off-by: Adrian Bunk <bunk at stusta.de>
---
meta/recipes-extended/ed/ed_1.15.bb | 2 ++
1 file changed, 2 insertions(+)
diff --git a/meta/recipes-extended/ed/ed_1.15.bb b/meta/recipes-extended/ed/ed_1.15.bb
index c79310325f..886c3ddcab 100644
--- a/meta/recipes-extended/ed/ed_1.15.bb
+++ b/meta/recipes-extended/ed/ed_1.15.bb
@@ -9,6 +9,8 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=0c7051aef9219dc7237f206c5c4179a7 \
SECTION = "base"
+CVE_PRODUCT = "gnu:ed"
+
# LSB states that ed should be in /bin/
bindir = "${base_bindir}"
--
2.17.1
More information about the Openembedded-core
mailing list