diff options
| author | Gyorgy Sarvari <skandigraun@gmail.com> | 2026-02-23 20:18:41 +0100 |
|---|---|---|
| committer | Khem Raj <raj.khem@gmail.com> | 2026-02-24 22:30:27 -0800 |
| commit | 4d6e24106c78eed3b9d9a36115df8d2f057f5178 (patch) | |
| tree | aaa57ee12d60482fd96394191e7fc79b121ef6d9 | |
| parent | 9dec2c8aef23f1046a2b2c6eb6d3ec3a45893474 (diff) | |
| download | meta-openembedded-4d6e24106c78eed3b9d9a36115df8d2f057f5178.tar.gz | |
gnome-shell: ignore CVE-2021-3982
Details: https://nvd.nist.gov/vuln/detail/CVE-2021-3982
The vulnerability is about a privilege escalation, in case
the host distribution sets CAP_SYS_NICE capability on the
gnome-shell binary.
OE distros don't do that, and due to this this recipe is not
affected by this issue. The CVE is ignored.
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
| -rw-r--r-- | meta-gnome/recipes-gnome/gnome-shell/gnome-shell_48.3.bb | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_48.3.bb b/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_48.3.bb index c8a5e20899..802a6948ae 100644 --- a/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_48.3.bb +++ b/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_48.3.bb | |||
| @@ -92,3 +92,4 @@ PACKAGES =+ "${PN}-tools ${PN}-gsettings" | |||
| 92 | FILES:${PN}-tools = "${bindir}/*-tool" | 92 | FILES:${PN}-tools = "${bindir}/*-tool" |
| 93 | RDEPENDS:${PN}-tools = "python3-core" | 93 | RDEPENDS:${PN}-tools = "python3-core" |
| 94 | 94 | ||
| 95 | CVE_STATUS[CVE-2021-3982] = "not-applicable-config: OE doesn't set CAP_SYS_NICE capability" | ||
