summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-pydbus
diff options
context:
space:
mode:
authorNarpat Mali <narpat.mali@windriver.com>2023-09-22 12:11:26 +0000
committerArmin Kuster <akuster808@gmail.com>2023-11-14 18:44:48 -0500
commit0b1520a35c07ac98ce353605626b615dec2eedce (patch)
tree18b3d4fa1bb4849f26d17f69de011708c95eec69 /meta-python/recipes-devtools/python/python3-pydbus
parent7da6cb848bc42b3e6bd5d2b37b52ba75510a6ca0 (diff)
downloadmeta-openembedded-0b1520a35c07ac98ce353605626b615dec2eedce.tar.gz
open-vm-tools: fix CVE-2023-20900
A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID -6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download. vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31 e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html . References: https://nvd.nist.gov/vuln/detail/CVE-2023-20900 https://security-tracker.debian.org/tracker/CVE-2023-20900 Signed-off-by: Narpat Mali <narpat.mali@windriver.com> [Minor fixup] Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-pydbus')
0 files changed, 0 insertions, 0 deletions