summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorWang Mingyu <wangmy@cn.fujitsu.com>2020-12-15 15:22:03 +0800
committerArmin Kuster <akuster808@gmail.com>2021-01-10 19:26:00 -0800
commitb5ddfc05f5951071ac2a452149c8c0b77aa3de2b (patch)
tree56e776b93f388329596b510da1b8c78d9a9f8657
parentaaaf03ada11b7f0207c34bc5f72ffff942fee8b6 (diff)
downloadmeta-openembedded-b5ddfc05f5951071ac2a452149c8c0b77aa3de2b.tar.gz
zabbix: CVE-2020-15803 Security Advisory
References https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803 Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit d259144422bb44af9dbc7397fc4077d0bf3fc83f) Signed-off-by: Armin Kuster <akuster808@gmail.com> (cherry picked from commit d9911b087c83e0c73fbe7eeb497ca388b62d7706) Signed-off-by: Armin Kuster <akuster808@gmail.com>
-rw-r--r--meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2020-15803.patch36
-rw-r--r--meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb1
2 files changed, 37 insertions, 0 deletions
diff --git a/meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2020-15803.patch b/meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2020-15803.patch
new file mode 100644
index 0000000000..2eec4bf327
--- /dev/null
+++ b/meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2020-15803.patch
@@ -0,0 +1,36 @@
1From 4943334fd9bf7dffd49f9e86251ad40b3efe2135 Mon Sep 17 00:00:00 2001
2From: Wang Mingyu <wangmy@cn.fujitsu.com>
3Date: Fri, 11 Dec 2020 17:02:20 +0900
4Subject: [PATCH] Fix bug for CVE-2020-15803
5
6Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com>
7---
8 frontends/php/include/classes/html/CIFrame.php | 7 +++++++
9 1 file changed, 7 insertions(+)
10
11diff --git a/frontends/php/include/classes/html/CIFrame.php b/frontends/php/include/classes/html/CIFrame.php
12index 32220cd..70f2ab5 100644
13--- a/frontends/php/include/classes/html/CIFrame.php
14+++ b/frontends/php/include/classes/html/CIFrame.php
15@@ -29,6 +29,7 @@ class CIFrame extends CTag {
16 $this->setHeight($height);
17 $this->setScrolling($scrolling);
18 $this->setId($id);
19+ $this->setSandbox();
20 }
21
22 public function setSrc($value = null) {
23@@ -69,4 +70,10 @@ class CIFrame extends CTag {
24 $this->setAttribute('scrolling', $value);
25 return $this;
26 }
27+
28+ private function setSandbox() {
29+ if (ZBX_IFRAME_SANDBOX !== false) {
30+ $this->setAttribute('sandbox', ZBX_IFRAME_SANDBOX);
31+ }
32+ }
33 }
34--
352.25.1
36
diff --git a/meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb b/meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb
index 0e0ddd5779..98a31879c4 100644
--- a/meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb
+++ b/meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb
@@ -26,6 +26,7 @@ PACKAGE_ARCH = "${MACHINE_ARCH}"
26SRC_URI = "http://jaist.dl.sourceforge.net/project/zabbix/ZABBIX%20Latest%20Stable/${PV}/${BPN}-${PV}.tar.gz \ 26SRC_URI = "http://jaist.dl.sourceforge.net/project/zabbix/ZABBIX%20Latest%20Stable/${PV}/${BPN}-${PV}.tar.gz \
27 file://0001-Fix-configure.ac.patch \ 27 file://0001-Fix-configure.ac.patch \
28 file://zabbix-agent.service \ 28 file://zabbix-agent.service \
29 file://CVE-2020-15803.patch \
29" 30"
30 31
31SRC_URI[md5sum] = "e666539220be93b1af38e40f5fbb1f79" 32SRC_URI[md5sum] = "e666539220be93b1af38e40f5fbb1f79"