diff options
author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-16 20:33:47 +0000 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-21 23:37:27 +0000 |
commit | 71ef3191938da772b07274165dd3a85c2ed011f1 (patch) | |
tree | fd830ada451fec669352cb0dfc1bb316ea9cefd8 /meta/recipes-graphics | |
parent | 5a3d6c7bda0f158473c82d1c38ae2df26192dccb (diff) | |
download | poky-71ef3191938da772b07274165dd3a85c2ed011f1.tar.gz |
meta/scripts: Automated conversion of OE renamed variables
(From OE-Core rev: aa52af4518604b5bf13f3c5e885113bf868d6c81)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-graphics')
4 files changed, 5 insertions, 5 deletions
diff --git a/meta/recipes-graphics/builder/builder_0.1.bb b/meta/recipes-graphics/builder/builder_0.1.bb index f448465f9a..39be3bd63f 100644 --- a/meta/recipes-graphics/builder/builder_0.1.bb +++ b/meta/recipes-graphics/builder/builder_0.1.bb | |||
@@ -30,4 +30,4 @@ do_install () { | |||
30 | } | 30 | } |
31 | 31 | ||
32 | # -4178 is an unrelated 'builder' | 32 | # -4178 is an unrelated 'builder' |
33 | CVE_CHECK_WHITELIST = "CVE-2008-4178" | 33 | CVE_CHECK_IGNORE = "CVE-2008-4178" |
diff --git a/meta/recipes-graphics/xorg-font/font-util_1.3.2.bb b/meta/recipes-graphics/xorg-font/font-util_1.3.2.bb index 84e1d377a8..b3e832756b 100644 --- a/meta/recipes-graphics/xorg-font/font-util_1.3.2.bb +++ b/meta/recipes-graphics/xorg-font/font-util_1.3.2.bb | |||
@@ -19,4 +19,4 @@ BBCLASSEXTEND = "native" | |||
19 | SRC_URI[md5sum] = "3d6adb76fdd072db8c8fae41b40855e8" | 19 | SRC_URI[md5sum] = "3d6adb76fdd072db8c8fae41b40855e8" |
20 | SRC_URI[sha256sum] = "3ad880444123ac06a7238546fa38a2a6ad7f7e0cc3614de7e103863616522282" | 20 | SRC_URI[sha256sum] = "3ad880444123ac06a7238546fa38a2a6ad7f7e0cc3614de7e103863616522282" |
21 | 21 | ||
22 | SYSROOT_DIRS_BLACKLIST:remove = "${datadir}/fonts" | 22 | SYSROOT_DIRS_IGNORE:remove = "${datadir}/fonts" |
diff --git a/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc b/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc index fad2962948..60bc8c76fa 100644 --- a/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc +++ b/meta/recipes-graphics/xorg-lib/xorg-lib-common.inc | |||
@@ -18,7 +18,7 @@ EXTRA_OECONF = "--disable-specs --without-groff --without-ps2pdf --without-fop" | |||
18 | PACKAGECONFIG ??= "" | 18 | PACKAGECONFIG ??= "" |
19 | PACKAGECONFIG[xmlto] = "--with-xmlto, --without-xmlto, xmlto-native docbook-xml-dtd4-native docbook-xsl-stylesheets-native" | 19 | PACKAGECONFIG[xmlto] = "--with-xmlto, --without-xmlto, xmlto-native docbook-xml-dtd4-native docbook-xsl-stylesheets-native" |
20 | 20 | ||
21 | UNKNOWN_CONFIGURE_WHITELIST += "--enable-malloc0returnsnull --disable-malloc0returnsnull \ | 21 | UNKNOWN_CONFIGURE_OPT_IGNORE += "--enable-malloc0returnsnull --disable-malloc0returnsnull \ |
22 | --disable-specs --without-groff --without-ps2pdf --without-fop \ | 22 | --disable-specs --without-groff --without-ps2pdf --without-fop \ |
23 | --without-xmlto --with-xmlto \ | 23 | --without-xmlto --with-xmlto \ |
24 | " | 24 | " |
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc index 5b7d0cd292..057a1ba6ad 100644 --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc | |||
@@ -21,13 +21,13 @@ UPSTREAM_CHECK_REGEX = "xorg-server-(?P<pver>\d+(\.(?!99)\d+)+)\.tar" | |||
21 | 21 | ||
22 | CVE_PRODUCT = "xorg-server x_server" | 22 | CVE_PRODUCT = "xorg-server x_server" |
23 | # This is specific to Debian's xserver-wrapper.c | 23 | # This is specific to Debian's xserver-wrapper.c |
24 | CVE_CHECK_WHITELIST += "CVE-2011-4613" | 24 | CVE_CHECK_IGNORE += "CVE-2011-4613" |
25 | # As per upstream, exploiting this flaw is non-trivial and it requires exact | 25 | # As per upstream, exploiting this flaw is non-trivial and it requires exact |
26 | # timing on the behalf of the attacker. Many graphical applications exit if their | 26 | # timing on the behalf of the attacker. Many graphical applications exit if their |
27 | # connection to the X server is lost, so a typical desktop session is either | 27 | # connection to the X server is lost, so a typical desktop session is either |
28 | # impossible or difficult to exploit. There is currently no upstream patch | 28 | # impossible or difficult to exploit. There is currently no upstream patch |
29 | # available for this flaw. | 29 | # available for this flaw. |
30 | CVE_CHECK_WHITELIST += "CVE-2020-25697" | 30 | CVE_CHECK_IGNORE += "CVE-2020-25697" |
31 | 31 | ||
32 | S = "${WORKDIR}/${XORG_PN}-${PV}" | 32 | S = "${WORKDIR}/${XORG_PN}-${PV}" |
33 | 33 | ||