diff options
| author | Gyorgy Sarvari <skandigraun@gmail.com> | 2026-02-24 20:04:51 +0100 |
|---|---|---|
| committer | Anuj Mittal <anuj.mittal@oss.qualcomm.com> | 2026-03-06 10:09:09 +0530 |
| commit | 24abd61c54b06df372fc8b825751fe17ce3a9410 (patch) | |
| tree | 726c6172260cedf8c1fa70d8d8559f2318b5475c /meta-python/recipes-devtools/python/python3-django-south_1.0.2.bb | |
| parent | 4660316de237b8d0c0f28ea4ce277782900f4002 (diff) | |
| download | meta-openembedded-24abd61c54b06df372fc8b825751fe17ce3a9410.tar.gz | |
minidlna: ignore CVE-2024-51442
Details: https://nvd.nist.gov/vuln/detail/CVE-2024-51442
The description of the vulnerability says "attacker [...] execute arbitrary
OS commands via a specially crafted minidlna.conf configuration file".
There is no official fix for this CVE, and upstream seems to be inactive
for the past 3 years.
The reason for ignoring this CVE is that the referenced minidlna.conf
file is in the /etc folder, and the file is not world-writable. Which
means that this vulnerability can be exploited only when someone is
root - but if the attacker is already root, they don't need to resort
to minidlna config-file modifications to execute any command they want.
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
Signed-off-by: Anuj Mittal <anuj.mittal@oss.qualcomm.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-django-south_1.0.2.bb')
0 files changed, 0 insertions, 0 deletions
