diff options
Diffstat (limited to 'meta/recipes-graphics/xorg-xserver')
-rw-r--r-- | meta/recipes-graphics/xorg-xserver/xserver-xorg.inc | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc index 5b7d0cd292..057a1ba6ad 100644 --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc | |||
@@ -21,13 +21,13 @@ UPSTREAM_CHECK_REGEX = "xorg-server-(?P<pver>\d+(\.(?!99)\d+)+)\.tar" | |||
21 | 21 | ||
22 | CVE_PRODUCT = "xorg-server x_server" | 22 | CVE_PRODUCT = "xorg-server x_server" |
23 | # This is specific to Debian's xserver-wrapper.c | 23 | # This is specific to Debian's xserver-wrapper.c |
24 | CVE_CHECK_WHITELIST += "CVE-2011-4613" | 24 | CVE_CHECK_IGNORE += "CVE-2011-4613" |
25 | # As per upstream, exploiting this flaw is non-trivial and it requires exact | 25 | # As per upstream, exploiting this flaw is non-trivial and it requires exact |
26 | # timing on the behalf of the attacker. Many graphical applications exit if their | 26 | # timing on the behalf of the attacker. Many graphical applications exit if their |
27 | # connection to the X server is lost, so a typical desktop session is either | 27 | # connection to the X server is lost, so a typical desktop session is either |
28 | # impossible or difficult to exploit. There is currently no upstream patch | 28 | # impossible or difficult to exploit. There is currently no upstream patch |
29 | # available for this flaw. | 29 | # available for this flaw. |
30 | CVE_CHECK_WHITELIST += "CVE-2020-25697" | 30 | CVE_CHECK_IGNORE += "CVE-2020-25697" |
31 | 31 | ||
32 | S = "${WORKDIR}/${XORG_PN}-${PV}" | 32 | S = "${WORKDIR}/${XORG_PN}-${PV}" |
33 | 33 | ||