From 64d2f868485c32b459df80c5aafdff14cce70f26 Mon Sep 17 00:00:00 2001 From: Peter Marko Date: Sun, 23 Jul 2023 19:15:01 +0200 Subject: [PATCH] cve-extra-exclusions: fix syntax error CVE_STATUS conversion for CVE-2020-18974 dad a syntax error by not adding continuation backslash. Signed-off-by: Peter Marko Signed-off-by: Alexandre Belloni --- meta/conf/distro/include/cve-extra-exclusions.inc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/meta/conf/distro/include/cve-extra-exclusions.inc b/meta/conf/distro/include/cve-extra-exclusions.inc index 61fb08dbebf..9d4422bc0f9 100644 --- a/meta/conf/distro/include/cve-extra-exclusions.inc +++ b/meta/conf/distro/include/cve-extra-exclusions.inc @@ -122,6 +122,6 @@ We'll pick up any fix when upstream accepts one." # nasm:nasm-native https://nvd.nist.gov/vuln/detail/CVE-2020-18974 CVE_STATUS[CVE-2020-18974] = "upstream-wontfix: \ -It is a fuzzing related buffer overflow. It is of low impact since most devices -wouldn't expose an assembler. The upstream is inactive and there is little to be +It is a fuzzing related buffer overflow. It is of low impact since most devices \ +wouldn't expose an assembler. The upstream is inactive and there is little to be \ done about the bug, ignore from an OE perspective." -- 2.47.3