diff options
| author | Urade, Yogita <Yogita.Urade@windriver.com> | 2023-07-31 07:22:50 +0000 |
|---|---|---|
| committer | Armin Kuster <akuster808@gmail.com> | 2023-08-03 16:50:52 -0400 |
| commit | cb8053362566f1ce17b25c34a1337f6410ebe214 (patch) | |
| tree | 9f4f1608d44a4641ca89754da182d18f4ccdf073 /meta-python/recipes-devtools/python/python3-jsonpatch_1.32.bb | |
| parent | 83470f71c67fe8491013cdbffbc7fa1317d35500 (diff) | |
| download | meta-openembedded-cb8053362566f1ce17b25c34a1337f6410ebe214.tar.gz | |
zabbix: fix CVE-2023-29450
JavaScript pre-processing can be used by the attacker to gain
access to the file system (read-only access on behalf of user
"zabbix") on the Zabbix Server or Zabbix Proxy, potentially
leading to unauthorized access to sensitive data.
Reference:
https://support.zabbix.com/browse/ZBX-22588
Signed-off-by: Yogita Urade <yogita.urade@windriver.com>
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-jsonpatch_1.32.bb')
0 files changed, 0 insertions, 0 deletions
