Details: https://nvd.nist.gov/vuln/detail/CVE-2021-3982
The vulnerability is about a privilege escalation, in case the host distribution sets CAP_SYS_NICE capability on the gnome-shell binary. OE distros don't do that, and due to this this recipe is not affected by this issue. The CVE is ignored. Signed-off-by: Gyorgy Sarvari <[email protected]> --- meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb | 2 ++ 1 file changed, 2 insertions(+) diff --git a/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb b/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb index 4157cdb67d..ea08e87f89 100644 --- a/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb +++ b/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb @@ -70,3 +70,5 @@ PACKAGES =+ "${PN}-tools ${PN}-gsettings" FILES:${PN}-tools = "${bindir}/*-tool" RDEPENDS:${PN}-tools = "python3-core" +# not-applicable-config: OE doesn't set CAP_SYS_NICE capability +CVE_CHECK_IGNORE = "CVE-2021-3982"
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#124759): https://lists.openembedded.org/g/openembedded-devel/message/124759 Mute This Topic: https://lists.openembedded.org/mt/118031974/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-devel/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
