summaryrefslogtreecommitdiffstats
path: root/package/python-django/python-django.mk
diff options
context:
space:
mode:
authorPeter Korsgaard <peter@korsgaard.com>2018-08-17 09:01:21 +0200
committerPeter Korsgaard <peter@korsgaard.com>2018-08-17 16:54:07 +0200
commit9c2bbc3fc9a6193ac866c06d474e99f6e428efbc (patch)
tree2affbd3ebdf70698a7478b8804760e9b1ce0b3bc /package/python-django/python-django.mk
parentf881e72248aedd9b8a9b024f94563e0398fdafa0 (diff)
downloadbuildroot-9c2bbc3fc9a6193ac866c06d474e99f6e428efbc.tar.gz
buildroot-9c2bbc3fc9a6193ac866c06d474e99f6e428efbc.zip
libfuse: security bump to version 2.9.8
Fixes CVE-2018-10906 - In fuse before versions 2.9.8 and 3.x before 3.2.5, fusermount is vulnerable to a restriction bypass when SELinux is active. This allows non-root users to mount a FUSE file system with the 'allow_other' mount option regardless of whether 'user_allow_other' is set in the fuse configuration. An attacker may use this flaw to mount a FUSE file system, accessible by other users, and trick them into accessing files on that file system, possibly causing Denial of Service or other unspecified effects. And additionally: - libfuse no longer segfaults when fuse_interrupted() is called outside the event loop. - The fusermount binary has been hardened in several ways to reduce potential attack surface. Most importantly, mountpoints and mount options must now match a hard-coded whitelist. It is expected that this whitelist covers all regular use-cases. Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
Diffstat (limited to 'package/python-django/python-django.mk')
0 files changed, 0 insertions, 0 deletions
OpenPOWER on IntegriCloud