diff options
| author | Narpat Mali <narpat.mali@windriver.com> | 2023-09-22 12:11:26 +0000 |
|---|---|---|
| committer | Armin Kuster <akuster808@gmail.com> | 2023-11-14 18:44:48 -0500 |
| commit | 0b1520a35c07ac98ce353605626b615dec2eedce (patch) | |
| tree | 18b3d4fa1bb4849f26d17f69de011708c95eec69 /meta-python/recipes-devtools/python/python3-netaddr_0.8.0.bb | |
| parent | 7da6cb848bc42b3e6bd5d2b37b52ba75510a6ca0 (diff) | |
| download | meta-openembedded-0b1520a35c07ac98ce353605626b615dec2eedce.tar.gz | |
open-vm-tools: fix CVE-2023-20900
A malicious actor that has been granted Guest Operation Privileges
https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID
-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine
may be able to elevate their privileges if that target virtual machine
has been assigned a more privileged Guest Alias https://vdc-download.
vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31
e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
References:
https://nvd.nist.gov/vuln/detail/CVE-2023-20900
https://security-tracker.debian.org/tracker/CVE-2023-20900
Signed-off-by: Narpat Mali <narpat.mali@windriver.com>
[Minor fixup]
Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-netaddr_0.8.0.bb')
0 files changed, 0 insertions, 0 deletions
