summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-flask-bootstrap_3.3.7.1.bb
diff options
context:
space:
mode:
authorYogita Urade <yogita.urade@windriver.com>2024-01-15 11:24:16 +0000
committerArmin Kuster <akuster808@gmail.com>2024-02-07 18:41:41 -0500
commitde760c31d1534cf6c0fefbbd455f7e82662913fd (patch)
tree8dfb5525ab05890ed820c46748ce822b1d48a9c3 /meta-python/recipes-devtools/python/python3-flask-bootstrap_3.3.7.1.bb
parent4af7df792940b42378ed9181d8a01bb7c7b09487 (diff)
downloadmeta-openembedded-de760c31d1534cf6c0fefbbd455f7e82662913fd.tar.gz
zabbix: fix CVE-2023-32726 and CVE-2023-32727
CVE-2023-32726: The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server. CVE-2023-32727: An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server. Refernces: https://nvd.nist.gov/vuln/detail/CVE-2023-32726 https://security-tracker.debian.org/tracker/CVE-2023-32726 https://nvd.nist.gov/vuln/detail/CVE-2023-32727 https://security-tracker.debian.org/tracker/CVE-2023-32727 Signed-off-by: Yogita Urade <yogita.urade@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-flask-bootstrap_3.3.7.1.bb')
0 files changed, 0 insertions, 0 deletions