summaryrefslogtreecommitdiffstats
path: root/meta/recipes-graphics
diff options
context:
space:
mode:
authorRichard Purdie <richard.purdie@linuxfoundation.org>2022-02-16 20:33:47 +0000
committerRichard Purdie <richard.purdie@linuxfoundation.org>2022-02-21 23:37:27 +0000
commit71ef3191938da772b07274165dd3a85c2ed011f1 (patch)
treefd830ada451fec669352cb0dfc1bb316ea9cefd8 /meta/recipes-graphics
parent5a3d6c7bda0f158473c82d1c38ae2df26192dccb (diff)
downloadpoky-71ef3191938da772b07274165dd3a85c2ed011f1.tar.gz
meta/scripts: Automated conversion of OE renamed variables
(From OE-Core rev: aa52af4518604b5bf13f3c5e885113bf868d6c81) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-graphics')
-rw-r--r--meta/recipes-graphics/builder/builder_0.1.bb2
-rw-r--r--meta/recipes-graphics/xorg-font/font-util_1.3.2.bb2
-rw-r--r--meta/recipes-graphics/xorg-lib/xorg-lib-common.inc2
-rw-r--r--meta/recipes-graphics/xorg-xserver/xserver-xorg.inc4
4 files changed, 5 insertions, 5 deletions
diff --git a/meta/recipes-graphics/builder/builder_0.1.bb b/meta/recipes-graphics/builder/builder_0.1.bb
index f448465f9a..39be3bd63f 100644
--- a/meta/recipes-graphics/builder/builder_0.1.bb
+++ b/meta/recipes-graphics/builder/builder_0.1.bb
@@ -30,4 +30,4 @@ do_install () {
30} 30}
31 31
32# -4178 is an unrelated 'builder' 32# -4178 is an unrelated 'builder'
33CVE_CHECK_WHITELIST = "CVE-2008-4178" 33CVE_CHECK_IGNORE = "CVE-2008-4178"
diff --git a/meta/recipes-graphics/xorg-font/font-util_1.3.2.bb b/meta/recipes-graphics/xorg-font/font-util_1.3.2.bb
index 84e1d377a8..b3e832756b 100644
--- a/meta/recipes-graphics/xorg-font/font-util_1.3.2.bb
+++ b/meta/recipes-graphics/xorg-font/font-util_1.3.2.bb
@@ -19,4 +19,4 @@ BBCLASSEXTEND = "native"
19SRC_URI[md5sum] = "3d6adb76fdd072db8c8fae41b40855e8" 19SRC_URI[md5sum] = "3d6adb76fdd072db8c8fae41b40855e8"
20SRC_URI[sha256sum] = "3ad880444123ac06a7238546fa38a2a6ad7f7e0cc3614de7e103863616522282" 20SRC_URI[sha256sum] = "3ad880444123ac06a7238546fa38a2a6ad7f7e0cc3614de7e103863616522282"
21 21
22SYSROOT_DIRS_BLACKLIST:remove = "${datadir}/fonts" 22SYSROOT_DIRS_IGNORE:remove = "${datadir}/fonts"
diff --git a/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc b/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc
index fad2962948..60bc8c76fa 100644
--- a/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc
+++ b/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc
@@ -18,7 +18,7 @@ EXTRA_OECONF = "--disable-specs --without-groff --without-ps2pdf --without-fop"
18PACKAGECONFIG ??= "" 18PACKAGECONFIG ??= ""
19PACKAGECONFIG[xmlto] = "--with-xmlto, --without-xmlto, xmlto-native docbook-xml-dtd4-native docbook-xsl-stylesheets-native" 19PACKAGECONFIG[xmlto] = "--with-xmlto, --without-xmlto, xmlto-native docbook-xml-dtd4-native docbook-xsl-stylesheets-native"
20 20
21UNKNOWN_CONFIGURE_WHITELIST += "--enable-malloc0returnsnull --disable-malloc0returnsnull \ 21UNKNOWN_CONFIGURE_OPT_IGNORE += "--enable-malloc0returnsnull --disable-malloc0returnsnull \
22 --disable-specs --without-groff --without-ps2pdf --without-fop \ 22 --disable-specs --without-groff --without-ps2pdf --without-fop \
23 --without-xmlto --with-xmlto \ 23 --without-xmlto --with-xmlto \
24" 24"
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
index 5b7d0cd292..057a1ba6ad 100644
--- a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
+++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
@@ -21,13 +21,13 @@ UPSTREAM_CHECK_REGEX = "xorg-server-(?P<pver>\d+(\.(?!99)\d+)+)\.tar"
21 21
22CVE_PRODUCT = "xorg-server x_server" 22CVE_PRODUCT = "xorg-server x_server"
23# This is specific to Debian's xserver-wrapper.c 23# This is specific to Debian's xserver-wrapper.c
24CVE_CHECK_WHITELIST += "CVE-2011-4613" 24CVE_CHECK_IGNORE += "CVE-2011-4613"
25# As per upstream, exploiting this flaw is non-trivial and it requires exact 25# As per upstream, exploiting this flaw is non-trivial and it requires exact
26# timing on the behalf of the attacker. Many graphical applications exit if their 26# timing on the behalf of the attacker. Many graphical applications exit if their
27# connection to the X server is lost, so a typical desktop session is either 27# connection to the X server is lost, so a typical desktop session is either
28# impossible or difficult to exploit. There is currently no upstream patch 28# impossible or difficult to exploit. There is currently no upstream patch
29# available for this flaw. 29# available for this flaw.
30CVE_CHECK_WHITELIST += "CVE-2020-25697" 30CVE_CHECK_IGNORE += "CVE-2020-25697"
31 31
32S = "${WORKDIR}/${XORG_PN}-${PV}" 32S = "${WORKDIR}/${XORG_PN}-${PV}"
33 33