summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/GitPython/hardcode-git-path.patch
diff options
context:
space:
mode:
authorMichael Weiss <dev.primeos@gmail.com>2018-07-25 23:30:19 +0200
committerMichael Weiss <dev.primeos@gmail.com>2018-07-25 23:53:40 +0200
commit46cd782b43416969b1f11232ecf5b80e798a92a2 (patch)
tree163fc17ad9aa55f0a8e80b1f238da4fea719ab16 /pkgs/development/python-modules/GitPython/hardcode-git-path.patch
parent7110d87d51cda2ce3dc40d3a2e0ec0acf06fdbb1 (diff)
fuse3: 3.2.4 -> 3.2.5 (security, CVE-2018-10906)
Upstream changelog: - SECURITY UPDATE: In previous versions of libfuse it was possible to for unprivileged users to specify the allow_other option even when this was forbidden in /etc/fuse.conf. The vulnerability is present only on systems where SELinux is active (including in permissive mode). - The fusermount binary has been hardened in several ways to reduce potential attack surface. Most importantly, mountpoints and mount options must now match a hard-coded whitelist. It is expected that this whitelist covers all regular use-cases. - Added a test of seekdir to test_syscalls. - Fixed readdir bug when non-zero offsets are given to filler and the filesystem client, after reading a whole directory, re-reads it from a non-zero offset e. g. by calling seekdir followed by readdir.
Diffstat (limited to 'pkgs/development/python-modules/GitPython/hardcode-git-path.patch')
0 files changed, 0 insertions, 0 deletions