diff options
author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-16 20:33:47 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-21 23:37:27 +0000 |
commit | 71ef3191938da772b07274165dd3a85c2ed011f1 (patch) | |
tree | fd830ada451fec669352cb0dfc1bb316ea9cefd8 /meta/recipes-extended | |
parent | 5a3d6c7bda0f158473c82d1c38ae2df26192dccb (diff) | |
download | poky-71ef3191938da772b07274165dd3a85c2ed011f1.tar.gz |
meta/scripts: Automated conversion of OE renamed variables
(From OE-Core rev: aa52af4518604b5bf13f3c5e885113bf868d6c81)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-extended')
-rw-r--r-- | meta/recipes-extended/cpio/cpio_2.13.bb | 2 | ||||
-rw-r--r-- | meta/recipes-extended/cups/cups.inc | 8 | ||||
-rw-r--r-- | meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb | 2 | ||||
-rw-r--r-- | meta/recipes-extended/iputils/iputils_20211215.bb | 2 | ||||
-rw-r--r-- | meta/recipes-extended/logrotate/logrotate_3.19.0.bb | 2 | ||||
-rw-r--r-- | meta/recipes-extended/procps/procps_3.3.17.bb | 2 | ||||
-rw-r--r-- | meta/recipes-extended/shadow/shadow_4.11.1.bb | 2 | ||||
-rw-r--r-- | meta/recipes-extended/unzip/unzip_6.0.bb | 2 | ||||
-rw-r--r-- | meta/recipes-extended/xinetd/xinetd_2.3.15.4.bb | 2 | ||||
-rw-r--r-- | meta/recipes-extended/zip/zip_3.0.bb | 4 |
10 files changed, 14 insertions, 14 deletions
diff --git a/meta/recipes-extended/cpio/cpio_2.13.bb b/meta/recipes-extended/cpio/cpio_2.13.bb index b4dbff1157..e72a114de9 100644 --- a/meta/recipes-extended/cpio/cpio_2.13.bb +++ b/meta/recipes-extended/cpio/cpio_2.13.bb | |||
@@ -18,7 +18,7 @@ SRC_URI[sha256sum] = "e87470d9c984317f658567c03bfefb6b0c829ff17dbf6b0de48d71a4c8 | |||
18 | inherit autotools gettext texinfo | 18 | inherit autotools gettext texinfo |
19 | 19 | ||
20 | # Issue applies to use of cpio in SUSE/OBS, doesn't apply to us | 20 | # Issue applies to use of cpio in SUSE/OBS, doesn't apply to us |
21 | CVE_CHECK_WHITELIST += "CVE-2010-4226" | 21 | CVE_CHECK_IGNORE += "CVE-2010-4226" |
22 | 22 | ||
23 | EXTRA_OECONF += "DEFAULT_RMT_DIR=${sbindir}" | 23 | EXTRA_OECONF += "DEFAULT_RMT_DIR=${sbindir}" |
24 | 24 | ||
diff --git a/meta/recipes-extended/cups/cups.inc b/meta/recipes-extended/cups/cups.inc index 05c1e34a77..6f28dc30d0 100644 --- a/meta/recipes-extended/cups/cups.inc +++ b/meta/recipes-extended/cups/cups.inc | |||
@@ -21,11 +21,11 @@ UPSTREAM_CHECK_URI = "https://github.com/OpenPrinting/cups/releases" | |||
21 | UPSTREAM_CHECK_REGEX = "cups-(?P<pver>(?!.+\d(b|rc)\d.+).+)-source.tar" | 21 | UPSTREAM_CHECK_REGEX = "cups-(?P<pver>(?!.+\d(b|rc)\d.+).+)-source.tar" |
22 | 22 | ||
23 | # Issue only applies to MacOS | 23 | # Issue only applies to MacOS |
24 | CVE_CHECK_WHITELIST += "CVE-2008-1033" | 24 | CVE_CHECK_IGNORE += "CVE-2008-1033" |
25 | # Issue affects pdfdistiller plugin used with but not part of cups | 25 | # Issue affects pdfdistiller plugin used with but not part of cups |
26 | CVE_CHECK_WHITELIST += "CVE-2009-0032" | 26 | CVE_CHECK_IGNORE += "CVE-2009-0032" |
27 | # This is an Ubuntu only issue. | 27 | # This is an Ubuntu only issue. |
28 | CVE_CHECK_WHITELIST += "CVE-2018-6553" | 28 | CVE_CHECK_IGNORE += "CVE-2018-6553" |
29 | 29 | ||
30 | LEAD_SONAME = "libcupsdriver.so" | 30 | LEAD_SONAME = "libcupsdriver.so" |
31 | 31 | ||
@@ -117,4 +117,4 @@ cups_sysroot_preprocess () { | |||
117 | 117 | ||
118 | # -25317 concerns /var/log/cups having lp ownership. Our /var/log/cups is | 118 | # -25317 concerns /var/log/cups having lp ownership. Our /var/log/cups is |
119 | # root:root, so this doesn't apply. | 119 | # root:root, so this doesn't apply. |
120 | CVE_CHECK_WHITELIST += "CVE-2021-25317" | 120 | CVE_CHECK_IGNORE += "CVE-2021-25317" |
diff --git a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb index 5f0fa67aa7..c28e62f089 100644 --- a/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb +++ b/meta/recipes-extended/ghostscript/ghostscript_9.55.0.bb | |||
@@ -21,7 +21,7 @@ UPSTREAM_CHECK_REGEX = "(?P<pver>\d+(\.\d+)+)\.tar" | |||
21 | 21 | ||
22 | # As of ghostscript 9.54.0 the jpeg issue in the CVE is present in the gs jpeg sources | 22 | # As of ghostscript 9.54.0 the jpeg issue in the CVE is present in the gs jpeg sources |
23 | # however we use an external jpeg which doesn't have the issue. | 23 | # however we use an external jpeg which doesn't have the issue. |
24 | CVE_CHECK_WHITELIST += "CVE-2013-6629" | 24 | CVE_CHECK_IGNORE += "CVE-2013-6629" |
25 | 25 | ||
26 | def gs_verdir(v): | 26 | def gs_verdir(v): |
27 | return "".join(v.split(".")) | 27 | return "".join(v.split(".")) |
diff --git a/meta/recipes-extended/iputils/iputils_20211215.bb b/meta/recipes-extended/iputils/iputils_20211215.bb index 29eec163b7..3ddce0be54 100644 --- a/meta/recipes-extended/iputils/iputils_20211215.bb +++ b/meta/recipes-extended/iputils/iputils_20211215.bb | |||
@@ -21,7 +21,7 @@ UPSTREAM_CHECK_GITTAGREGEX = "(?P<pver>20\d+)" | |||
21 | 21 | ||
22 | # Fixed in 2000-10-10, but the versioning of iputils | 22 | # Fixed in 2000-10-10, but the versioning of iputils |
23 | # breaks the version order. | 23 | # breaks the version order. |
24 | CVE_CHECK_WHITELIST += "CVE-2000-1213 CVE-2000-1214" | 24 | CVE_CHECK_IGNORE += "CVE-2000-1213 CVE-2000-1214" |
25 | 25 | ||
26 | PACKAGECONFIG ??= "libcap rarpd \ | 26 | PACKAGECONFIG ??= "libcap rarpd \ |
27 | ${@bb.utils.contains('DISTRO_FEATURES', 'ipv6', 'ninfod', '', d)} \ | 27 | ${@bb.utils.contains('DISTRO_FEATURES', 'ipv6', 'ninfod', '', d)} \ |
diff --git a/meta/recipes-extended/logrotate/logrotate_3.19.0.bb b/meta/recipes-extended/logrotate/logrotate_3.19.0.bb index 929350dcfb..2a60d9b31f 100644 --- a/meta/recipes-extended/logrotate/logrotate_3.19.0.bb +++ b/meta/recipes-extended/logrotate/logrotate_3.19.0.bb | |||
@@ -18,7 +18,7 @@ SRC_URI = "https://github.com/${BPN}/${BPN}/releases/download/${PV}/${BP}.tar.xz | |||
18 | SRC_URI[sha256sum] = "ddd5274d684c5c99ca724e8069329f343ebe376e07493d537d9effdc501214ba" | 18 | SRC_URI[sha256sum] = "ddd5274d684c5c99ca724e8069329f343ebe376e07493d537d9effdc501214ba" |
19 | 19 | ||
20 | # These CVEs are debian, gentoo or SUSE specific on the way logrotate was installed/used | 20 | # These CVEs are debian, gentoo or SUSE specific on the way logrotate was installed/used |
21 | CVE_CHECK_WHITELIST += "CVE-2011-1548 CVE-2011-1549 CVE-2011-1550" | 21 | CVE_CHECK_IGNORE += "CVE-2011-1548 CVE-2011-1549 CVE-2011-1550" |
22 | 22 | ||
23 | PACKAGECONFIG ?= "${@bb.utils.filter('DISTRO_FEATURES', 'acl selinux', d)}" | 23 | PACKAGECONFIG ?= "${@bb.utils.filter('DISTRO_FEATURES', 'acl selinux', d)}" |
24 | 24 | ||
diff --git a/meta/recipes-extended/procps/procps_3.3.17.bb b/meta/recipes-extended/procps/procps_3.3.17.bb index 97f341488a..0f5575c9ab 100644 --- a/meta/recipes-extended/procps/procps_3.3.17.bb +++ b/meta/recipes-extended/procps/procps_3.3.17.bb | |||
@@ -75,7 +75,7 @@ python __anonymous() { | |||
75 | 75 | ||
76 | # 'ps' isn't suitable for use as a security tool so whitelist this CVE. | 76 | # 'ps' isn't suitable for use as a security tool so whitelist this CVE. |
77 | # https://bugzilla.redhat.com/show_bug.cgi?id=1575473#c3 | 77 | # https://bugzilla.redhat.com/show_bug.cgi?id=1575473#c3 |
78 | CVE_CHECK_WHITELIST += "CVE-2018-1121" | 78 | CVE_CHECK_IGNORE += "CVE-2018-1121" |
79 | 79 | ||
80 | PROCPS_PACKAGES = "${PN}-lib \ | 80 | PROCPS_PACKAGES = "${PN}-lib \ |
81 | ${PN}-ps \ | 81 | ${PN}-ps \ |
diff --git a/meta/recipes-extended/shadow/shadow_4.11.1.bb b/meta/recipes-extended/shadow/shadow_4.11.1.bb index 2fbd81bf72..40b11345c9 100644 --- a/meta/recipes-extended/shadow/shadow_4.11.1.bb +++ b/meta/recipes-extended/shadow/shadow_4.11.1.bb | |||
@@ -8,4 +8,4 @@ BBCLASSEXTEND = "native nativesdk" | |||
8 | 8 | ||
9 | # Severity is low and marked as closed and won't fix. | 9 | # Severity is low and marked as closed and won't fix. |
10 | # https://bugzilla.redhat.com/show_bug.cgi?id=884658 | 10 | # https://bugzilla.redhat.com/show_bug.cgi?id=884658 |
11 | CVE_CHECK_WHITELIST += "CVE-2013-4235" | 11 | CVE_CHECK_IGNORE += "CVE-2013-4235" |
diff --git a/meta/recipes-extended/unzip/unzip_6.0.bb b/meta/recipes-extended/unzip/unzip_6.0.bb index 0bc6abcd4b..4720fddf48 100644 --- a/meta/recipes-extended/unzip/unzip_6.0.bb +++ b/meta/recipes-extended/unzip/unzip_6.0.bb | |||
@@ -34,7 +34,7 @@ SRC_URI[md5sum] = "62b490407489521db863b523a7f86375" | |||
34 | SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" | 34 | SRC_URI[sha256sum] = "036d96991646d0449ed0aa952e4fbe21b476ce994abc276e49d30e686708bd37" |
35 | 35 | ||
36 | # Patch from https://bugzilla.redhat.com/attachment.cgi?id=293893&action=diff applied to 6.0 source | 36 | # Patch from https://bugzilla.redhat.com/attachment.cgi?id=293893&action=diff applied to 6.0 source |
37 | CVE_CHECK_WHITELIST += "CVE-2008-0888" | 37 | CVE_CHECK_IGNORE += "CVE-2008-0888" |
38 | 38 | ||
39 | # exclude version 5.5.2 which triggers a false positive | 39 | # exclude version 5.5.2 which triggers a false positive |
40 | UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz" | 40 | UPSTREAM_CHECK_REGEX = "unzip(?P<pver>(?!552).+)\.tgz" |
diff --git a/meta/recipes-extended/xinetd/xinetd_2.3.15.4.bb b/meta/recipes-extended/xinetd/xinetd_2.3.15.4.bb index e64494e54e..62ee70d244 100644 --- a/meta/recipes-extended/xinetd/xinetd_2.3.15.4.bb +++ b/meta/recipes-extended/xinetd/xinetd_2.3.15.4.bb | |||
@@ -18,7 +18,7 @@ SRCREV = "6a4af7786630ce48747d9687e2f18f45ea6684c4" | |||
18 | S = "${WORKDIR}/git" | 18 | S = "${WORKDIR}/git" |
19 | 19 | ||
20 | # https://github.com/xinetd-org/xinetd/pull/10 is merged into this git tree revision | 20 | # https://github.com/xinetd-org/xinetd/pull/10 is merged into this git tree revision |
21 | CVE_CHECK_WHITELIST += "CVE-2013-4342" | 21 | CVE_CHECK_IGNORE += "CVE-2013-4342" |
22 | 22 | ||
23 | inherit autotools update-rc.d systemd pkgconfig | 23 | inherit autotools update-rc.d systemd pkgconfig |
24 | 24 | ||
diff --git a/meta/recipes-extended/zip/zip_3.0.bb b/meta/recipes-extended/zip/zip_3.0.bb index 18b5d8648e..3fea75125e 100644 --- a/meta/recipes-extended/zip/zip_3.0.bb +++ b/meta/recipes-extended/zip/zip_3.0.bb | |||
@@ -21,10 +21,10 @@ SRC_URI[md5sum] = "7b74551e63f8ee6aab6fbc86676c0d37" | |||
21 | SRC_URI[sha256sum] = "f0e8bb1f9b7eb0b01285495a2699df3a4b766784c1765a8f1aeedf63c0806369" | 21 | SRC_URI[sha256sum] = "f0e8bb1f9b7eb0b01285495a2699df3a4b766784c1765a8f1aeedf63c0806369" |
22 | 22 | ||
23 | # Disputed and also Debian doesn't consider a vulnerability | 23 | # Disputed and also Debian doesn't consider a vulnerability |
24 | CVE_CHECK_WHITELIST += "CVE-2018-13410" | 24 | CVE_CHECK_IGNORE += "CVE-2018-13410" |
25 | 25 | ||
26 | # Not for zip but for smart contract implementation for it | 26 | # Not for zip but for smart contract implementation for it |
27 | CVE_CHECK_WHITELIST += "CVE-2018-13684" | 27 | CVE_CHECK_IGNORE += "CVE-2018-13684" |
28 | 28 | ||
29 | # zip.inc sets CFLAGS, but what Makefile actually uses is | 29 | # zip.inc sets CFLAGS, but what Makefile actually uses is |
30 | # CFLAGS_NOOPT. It will also force -O3 optimization, overriding | 30 | # CFLAGS_NOOPT. It will also force -O3 optimization, overriding |