Gyorgy Sarvari ad6ea218ae
gnome-shell: ignore CVE-2021-3982
Details: https://nvd.nist.gov/vuln/detail/CVE-2021-3982

The vulnerability is about a privilege escalation, in case
the host distribution sets CAP_SYS_NICE capability on the
gnome-shell binary.

OE distros don't do that, and due to this this recipe is not
affected by this issue. The CVE is ignored.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
(cherry picked from commit 4d6e24106c78eed3b9d9a36115df8d2f057f5178)
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Anuj Mittal <anuj.mittal@oss.qualcomm.com>
2026-03-24 08:52:01 +05:30
..
2021-08-03 10:21:25 -07:00
2026-03-24 08:52:00 +05:30
2011-04-21 20:03:19 +02:00
2026-02-25 13:58:47 +05:30

Dependencies

This layer depends on:

URI: git://git.openembedded.org/openembedded-core branch: scarthgap

URI: git://git.openembedded.org/meta-openembedded branch: scarthgap

Send pull requests to openembedded-devel@lists.openembedded.org with '[meta-gnome][scarthgap]' in the subject'

When sending single patches, please using something like: git send-email -M -1 --to openembedded-devel@lists.openembedded.org --subject-prefix='meta-gnome][scarthgap][PATCH'

Layer maintainer: Anuj Mittal anuj.mittal@oss.qualcomm.com