diff options
author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-16 20:33:47 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-21 23:37:27 +0000 |
commit | 71ef3191938da772b07274165dd3a85c2ed011f1 (patch) | |
tree | fd830ada451fec669352cb0dfc1bb316ea9cefd8 /meta/recipes-graphics/xorg-xserver/xserver-xorg.inc | |
parent | 5a3d6c7bda0f158473c82d1c38ae2df26192dccb (diff) | |
download | poky-71ef3191938da772b07274165dd3a85c2ed011f1.tar.gz |
meta/scripts: Automated conversion of OE renamed variables
(From OE-Core rev: aa52af4518604b5bf13f3c5e885113bf868d6c81)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-graphics/xorg-xserver/xserver-xorg.inc')
-rw-r--r-- | meta/recipes-graphics/xorg-xserver/xserver-xorg.inc | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc index 5b7d0cd292..057a1ba6ad 100644 --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc | |||
@@ -21,13 +21,13 @@ UPSTREAM_CHECK_REGEX = "xorg-server-(?P<pver>\d+(\.(?!99)\d+)+)\.tar" | |||
21 | 21 | ||
22 | CVE_PRODUCT = "xorg-server x_server" | 22 | CVE_PRODUCT = "xorg-server x_server" |
23 | # This is specific to Debian's xserver-wrapper.c | 23 | # This is specific to Debian's xserver-wrapper.c |
24 | CVE_CHECK_WHITELIST += "CVE-2011-4613" | 24 | CVE_CHECK_IGNORE += "CVE-2011-4613" |
25 | # As per upstream, exploiting this flaw is non-trivial and it requires exact | 25 | # As per upstream, exploiting this flaw is non-trivial and it requires exact |
26 | # timing on the behalf of the attacker. Many graphical applications exit if their | 26 | # timing on the behalf of the attacker. Many graphical applications exit if their |
27 | # connection to the X server is lost, so a typical desktop session is either | 27 | # connection to the X server is lost, so a typical desktop session is either |
28 | # impossible or difficult to exploit. There is currently no upstream patch | 28 | # impossible or difficult to exploit. There is currently no upstream patch |
29 | # available for this flaw. | 29 | # available for this flaw. |
30 | CVE_CHECK_WHITELIST += "CVE-2020-25697" | 30 | CVE_CHECK_IGNORE += "CVE-2020-25697" |
31 | 31 | ||
32 | S = "${WORKDIR}/${XORG_PN}-${PV}" | 32 | S = "${WORKDIR}/${XORG_PN}-${PV}" |
33 | 33 | ||