summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-matplotlib/run-ptest
diff options
context:
space:
mode:
authorGyorgy Sarvari <skandigraun@gmail.com>2026-02-23 20:18:43 +0100
committerKhem Raj <raj.khem@gmail.com>2026-02-24 22:30:28 -0800
commit1f70d339eb3d3f4897f3eef91ae86fd915cbfa8c (patch)
treeeabff2d87e967f8d674abaa4c0daec56c3157912 /meta-python/recipes-devtools/python/python3-matplotlib/run-ptest
parenta4583e0e8012fe661bc2622aab63554324a3c72d (diff)
downloadmeta-openembedded-1f70d339eb3d3f4897f3eef91ae86fd915cbfa8c.tar.gz
minidlna: ignore CVE-2024-51442
Details: https://nvd.nist.gov/vuln/detail/CVE-2024-51442 The description of the vulnerability says "attacker [...] execute arbitrary OS commands via a specially crafted minidlna.conf configuration file". There is no official fix for this CVE, and upstream seems to be inactive for the past 3 years. The reason for ignoring this CVE is that the referenced minidlna.conf file is in the /etc folder, and the file is not world-writable. Which means that this vulnerability can be exploited only when someone is root - but if the attacker is already root, they don't need to resort to minidlna config-file modifications to execute any command they want. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-matplotlib/run-ptest')
0 files changed, 0 insertions, 0 deletions