| Message ID | 20260227154032.499047-2-skandigraun@gmail.com |
|---|---|
| State | New |
| Headers | show |
| Series | [meta-multimedia,kirkstone,1/4] streamripper: ignore CVE-2020-37065 | expand |
diff --git a/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb b/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb index 4157cdb67d..ea08e87f89 100644 --- a/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb +++ b/meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb @@ -70,3 +70,5 @@ PACKAGES =+ "${PN}-tools ${PN}-gsettings" FILES:${PN}-tools = "${bindir}/*-tool" RDEPENDS:${PN}-tools = "python3-core" +# not-applicable-config: OE doesn't set CAP_SYS_NICE capability +CVE_CHECK_IGNORE = "CVE-2021-3982"
Details: https://nvd.nist.gov/vuln/detail/CVE-2021-3982 The vulnerability is about a privilege escalation, in case the host distribution sets CAP_SYS_NICE capability on the gnome-shell binary. OE distros don't do that, and due to this this recipe is not affected by this issue. The CVE is ignored. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> --- meta-gnome/recipes-gnome/gnome-shell/gnome-shell_42.9.bb | 2 ++ 1 file changed, 2 insertions(+)