<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/meta-openembedded.git/meta-oe/recipes-connectivity/zabbix, branch kirkstone</title>
<subtitle>Mirror of git.openembedded.org/meta-openembedded</subtitle>
<id>https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=kirkstone</id>
<link rel='self' href='https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=kirkstone'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/'/>
<updated>2025-12-25T09:17:02+00:00</updated>
<entry>
<title>zabbix: patch CVE-2025-49643</title>
<updated>2025-12-25T09:17:02+00:00</updated>
<author>
<name>Gyorgy Sarvari</name>
<email>skandigraun@gmail.com</email>
</author>
<published>2025-12-24T19:34:33+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=12807d9007b806e1c9e729909f40b5004800174a'/>
<id>urn:sha1:12807d9007b806e1c9e729909f40b5004800174a</id>
<content type='text'>
The actual patch was identified by checking the file that was modified
in the tag 6.0.42, and also by looking at the Jira item referenced by it:
the patch references DEV-4466, the same ID that is referenced in the
Jira ticket[1] referenced by the NVD report (look in the "All Activity" tab).

[1]: https://support.zabbix.com/browse/ZBX-27284

Signed-off-by: Gyorgy Sarvari &lt;skandigraun@gmail.com&gt;
</content>
</entry>
<entry>
<title>zabbix: update SRC_URI</title>
<updated>2025-11-17T08:08:19+00:00</updated>
<author>
<name>Gyorgy Sarvari</name>
<email>skandigraun@gmail.com</email>
</author>
<published>2025-11-12T19:35:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=2ee25ae10a51021a78e6aa7e2ae584729e523897'/>
<id>urn:sha1:2ee25ae10a51021a78e6aa7e2ae584729e523897</id>
<content type='text'>
The downloaded artifact was moved to a new folder.

Signed-off-by: Gyorgy Sarvari &lt;skandigraun@gmail.com&gt;
</content>
</entry>
<entry>
<title>zabbix: fix CVE-2023-32726 and CVE-2023-32727</title>
<updated>2024-02-07T23:41:41+00:00</updated>
<author>
<name>Yogita Urade</name>
<email>yogita.urade@windriver.com</email>
</author>
<published>2024-01-15T11:24:16+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=de760c31d1534cf6c0fefbbd455f7e82662913fd'/>
<id>urn:sha1:de760c31d1534cf6c0fefbbd455f7e82662913fd</id>
<content type='text'>
CVE-2023-32726:
The vulnerability is caused by improper check for check
if RDLENGTH does not overflow the buffer in response
from DNS server.

CVE-2023-32727:
An attacker who has the privilege to configure Zabbix
items can use function icmpping() with additional
malicious command inside it to execute arbitrary code
on the current Zabbix server.

Refernces:
https://nvd.nist.gov/vuln/detail/CVE-2023-32726
https://security-tracker.debian.org/tracker/CVE-2023-32726
https://nvd.nist.gov/vuln/detail/CVE-2023-32727
https://security-tracker.debian.org/tracker/CVE-2023-32727

Signed-off-by: Yogita Urade &lt;yogita.urade@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>zabbix: fix CVE-2023-29450</title>
<updated>2023-08-03T20:50:52+00:00</updated>
<author>
<name>Urade, Yogita</name>
<email>Yogita.Urade@windriver.com</email>
</author>
<published>2023-07-31T07:22:50+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=cb8053362566f1ce17b25c34a1337f6410ebe214'/>
<id>urn:sha1:cb8053362566f1ce17b25c34a1337f6410ebe214</id>
<content type='text'>
JavaScript pre-processing can be used by the attacker to gain
access to the file system (read-only access on behalf of user
"zabbix") on the Zabbix Server or Zabbix Proxy, potentially
leading to unauthorized access to sensitive data.

Reference:
https://support.zabbix.com/browse/ZBX-22588

Signed-off-by: Yogita Urade &lt;yogita.urade@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>zabbix: fix CVE-2023-29449</title>
<updated>2023-08-03T20:50:52+00:00</updated>
<author>
<name>Urade, Yogitag</name>
<email>Yogita.Urade@windriver.com</email>
</author>
<published>2023-07-31T07:22:49+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=83470f71c67fe8491013cdbffbc7fa1317d35500'/>
<id>urn:sha1:83470f71c67fe8491013cdbffbc7fa1317d35500</id>
<content type='text'>
JavaScript preprocessing, webhooks and global scripts can cause
uncontrolled CPU, memory, and disk I/O utilization.
Preprocessing/webhook/global script configuration and testing
are only available to Administrative roles (Admin and Superadmin).
Administrative privileges should be typically granted to users
who need to perform tasks that require more control over the system.
The security risk is limited because not all users have this level
of access.

References:
https://support.zabbix.com/browse/ZBX-22589

Signed-off-by: Yogita Urade &lt;yogita.urade@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>zabbix: fix CVE-2023-29451</title>
<updated>2023-04-28T11:21:36+00:00</updated>
<author>
<name>Changqing Li</name>
<email>changqing.li@windriver.com</email>
</author>
<published>2023-04-27T02:04:08+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=4b0bd9c49ba89ef283c55467eef1724ee6c831fe'/>
<id>urn:sha1:4b0bd9c49ba89ef283c55467eef1724ee6c831fe</id>
<content type='text'>
Refer: https://support.zabbix.com/browse/ZBX-22587

Signed-off-by: Changqing Li &lt;changqing.li@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>zabbix: fix CVE-2022-43515,CVE-2022-46768</title>
<updated>2023-01-12T16:05:55+00:00</updated>
<author>
<name>Changqing Li</name>
<email>changqing.li@windriver.com</email>
</author>
<published>2023-01-05T00:54:29+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=c479d226e7baf30657a6b7ef3196640a7a567f81'/>
<id>urn:sha1:c479d226e7baf30657a6b7ef3196640a7a567f81</id>
<content type='text'>
Signed-off-by: Changqing Li &lt;changqing.li@windriver.com&gt;
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
<entry>
<title>zabbix: upgrade 5.2.6 -&gt; 5.4.12</title>
<updated>2022-07-18T13:43:50+00:00</updated>
<author>
<name>Changqing Li</name>
<email>changqing.li@windriver.com</email>
</author>
<published>2022-06-29T01:20:39+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=0af58eb63d4d5a53a8981304132d4856f1de7924'/>
<id>urn:sha1:0af58eb63d4d5a53a8981304132d4856f1de7924</id>
<content type='text'>
This upgrade CVE fix:
CVE-2022-24349
CVE-2022-24917
CVE-2022-24918
CVE-2022-24919

Signed-off-by: Changqing Li &lt;changqing.li@windriver.com&gt;
</content>
</entry>
<entry>
<title>recipes: Update LICENSE variable to use SPDX license identifiers</title>
<updated>2022-03-05T01:41:45+00:00</updated>
<author>
<name>Khem Raj</name>
<email>raj.khem@gmail.com</email>
</author>
<published>2022-03-04T08:44:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=14c7d8a0d7cb843ac8b0d25cc4170fa640ac1295'/>
<id>urn:sha1:14c7d8a0d7cb843ac8b0d25cc4170fa640ac1295</id>
<content type='text'>
Signed-off-by: Khem Raj &lt;raj.khem@gmail.com&gt;
</content>
</entry>
<entry>
<title>Convert to new override syntax</title>
<updated>2021-08-03T17:21:25+00:00</updated>
<author>
<name>Martin Jansa</name>
<email>Martin.Jansa@gmail.com</email>
</author>
<published>2021-07-29T15:04:53+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=c61dc077bbd81260e4f167fa2251643ba0ba6974'/>
<id>urn:sha1:c61dc077bbd81260e4f167fa2251643ba0ba6974</id>
<content type='text'>
This is the result of automated script (0.9.1) conversion:

oe-core/scripts/contrib/convert-overrides.py .

converting the metadata to use ":" as the override character instead of "_".

Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
</content>
</entry>
</feed>
