summaryrefslogtreecommitdiffstats
path: root/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
diff options
context:
space:
mode:
Diffstat (limited to 'meta/recipes-graphics/xorg-xserver/xserver-xorg.inc')
-rw-r--r--meta/recipes-graphics/xorg-xserver/xserver-xorg.inc10
1 files changed, 9 insertions, 1 deletions
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
index b3e03744c0..d83cb94317 100644
--- a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
+++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc
@@ -17,7 +17,15 @@ PE = "2"
17XORG_PN = "xorg-server" 17XORG_PN = "xorg-server"
18SRC_URI = "${XORG_MIRROR}/individual/xserver/${XORG_PN}-${PV}.tar.bz2" 18SRC_URI = "${XORG_MIRROR}/individual/xserver/${XORG_PN}-${PV}.tar.bz2"
19 19
20CVE_PRODUCT = "xorg-server" 20CVE_PRODUCT = "xorg-server x_server"
21# This is specific to Debian's xserver-wrapper.c
22CVE_CHECK_WHITELIST += "CVE-2011-4613"
23# As per upstream, exploiting this flaw is non-trivial and it requires exact
24# timing on the behalf of the attacker. Many graphical applications exit if their
25# connection to the X server is lost, so a typical desktop session is either
26# impossible or difficult to exploit. There is currently no upstream patch
27# available for this flaw.
28CVE_CHECK_WHITELIST += "CVE-2020-25697"
21 29
22S = "${WORKDIR}/${XORG_PN}-${PV}" 30S = "${WORKDIR}/${XORG_PN}-${PV}"
23 31