diff options
| author | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-16 20:33:47 +0000 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-02-21 23:37:27 +0000 |
| commit | 71ef3191938da772b07274165dd3a85c2ed011f1 (patch) | |
| tree | fd830ada451fec669352cb0dfc1bb316ea9cefd8 /meta/recipes-graphics/xorg-xserver | |
| parent | 5a3d6c7bda0f158473c82d1c38ae2df26192dccb (diff) | |
| download | poky-71ef3191938da772b07274165dd3a85c2ed011f1.tar.gz | |
meta/scripts: Automated conversion of OE renamed variables
(From OE-Core rev: aa52af4518604b5bf13f3c5e885113bf868d6c81)
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-graphics/xorg-xserver')
| -rw-r--r-- | meta/recipes-graphics/xorg-xserver/xserver-xorg.inc | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc index 5b7d0cd292..057a1ba6ad 100644 --- a/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc +++ b/meta/recipes-graphics/xorg-xserver/xserver-xorg.inc | |||
| @@ -21,13 +21,13 @@ UPSTREAM_CHECK_REGEX = "xorg-server-(?P<pver>\d+(\.(?!99)\d+)+)\.tar" | |||
| 21 | 21 | ||
| 22 | CVE_PRODUCT = "xorg-server x_server" | 22 | CVE_PRODUCT = "xorg-server x_server" |
| 23 | # This is specific to Debian's xserver-wrapper.c | 23 | # This is specific to Debian's xserver-wrapper.c |
| 24 | CVE_CHECK_WHITELIST += "CVE-2011-4613" | 24 | CVE_CHECK_IGNORE += "CVE-2011-4613" |
| 25 | # As per upstream, exploiting this flaw is non-trivial and it requires exact | 25 | # As per upstream, exploiting this flaw is non-trivial and it requires exact |
| 26 | # timing on the behalf of the attacker. Many graphical applications exit if their | 26 | # timing on the behalf of the attacker. Many graphical applications exit if their |
| 27 | # connection to the X server is lost, so a typical desktop session is either | 27 | # connection to the X server is lost, so a typical desktop session is either |
| 28 | # impossible or difficult to exploit. There is currently no upstream patch | 28 | # impossible or difficult to exploit. There is currently no upstream patch |
| 29 | # available for this flaw. | 29 | # available for this flaw. |
| 30 | CVE_CHECK_WHITELIST += "CVE-2020-25697" | 30 | CVE_CHECK_IGNORE += "CVE-2020-25697" |
| 31 | 31 | ||
| 32 | S = "${WORKDIR}/${XORG_PN}-${PV}" | 32 | S = "${WORKDIR}/${XORG_PN}-${PV}" |
| 33 | 33 | ||
