summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-django_4.2.28.bb
diff options
context:
space:
mode:
authorGyorgy Sarvari <skandigraun@gmail.com>2026-03-05 15:15:12 +0100
committerAnuj Mittal <anuj.mittal@oss.qualcomm.com>2026-03-24 08:52:01 +0530
commitad6ea218aee262b2593d03a52d4cd7116531fe90 (patch)
tree0d391c22b595513f0b65f70cd1ad6028456c61f1 /meta-python/recipes-devtools/python/python3-django_4.2.28.bb
parent1a6816e20f8c0477ca96fc775a9e1227caead03d (diff)
downloadmeta-openembedded-ad6ea218aee262b2593d03a52d4cd7116531fe90.tar.gz
gnome-shell: ignore CVE-2021-3982
Details: https://nvd.nist.gov/vuln/detail/CVE-2021-3982 The vulnerability is about a privilege escalation, in case the host distribution sets CAP_SYS_NICE capability on the gnome-shell binary. OE distros don't do that, and due to this this recipe is not affected by this issue. The CVE is ignored. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit 4d6e24106c78eed3b9d9a36115df8d2f057f5178) Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Anuj Mittal <anuj.mittal@oss.qualcomm.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-django_4.2.28.bb')
0 files changed, 0 insertions, 0 deletions