Details: https://nvd.nist.gov/vuln/detail/CVE-2021-3982

The vulnerability is about a privilege escalation, in case
the host distribution sets CAP_SYS_NICE capability on the
gnome-shell binary.

OE distros don't do that, and due to this this recipe is not
affected by this issue. The CVE is ignored.

Signed-off-by: Gyorgy Sarvari <[email protected]>
---
 meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb 
b/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb
index 4157cdb67d..ea08e87f89 100644
--- a/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb
+++ b/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb
@@ -70,3 +70,5 @@ PACKAGES =+ "${PN}-tools ${PN}-gsettings"
 FILES:${PN}-tools = "${bindir}/*-tool"
 RDEPENDS:${PN}-tools = "python3-core"
 
+# not-applicable-config: OE doesn't set CAP_SYS_NICE capability
+CVE_CHECK_IGNORE = "CVE-2021-3982"
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#124759): 
https://lists.openembedded.org/g/openembedded-devel/message/124759
Mute This Topic: https://lists.openembedded.org/mt/118031974/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to