diff options
author | Wang Mingyu <wangmy@cn.fujitsu.com> | 2020-12-15 15:22:03 +0800 |
---|---|---|
committer | Khem Raj <raj.khem@gmail.com> | 2020-12-15 00:52:55 -0800 |
commit | d259144422bb44af9dbc7397fc4077d0bf3fc83f (patch) | |
tree | 95bdb81430eaae729035dc4bac452111956dbb9f | |
parent | 9301b77e3266160ffb7e9bfd69d445f0392076c8 (diff) | |
download | meta-openembedded-d259144422bb44af9dbc7397fc4077d0bf3fc83f.tar.gz |
zabbix: CVE-2020-15803 Security Advisory
References
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15803
Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com>
Signed-off-by: Khem Raj <raj.khem@gmail.com>
-rw-r--r-- | meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2020-15803.patch | 36 | ||||
-rw-r--r-- | meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb | 1 |
2 files changed, 37 insertions, 0 deletions
diff --git a/meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2020-15803.patch b/meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2020-15803.patch new file mode 100644 index 0000000000..2eec4bf327 --- /dev/null +++ b/meta-oe/recipes-connectivity/zabbix/zabbix/CVE-2020-15803.patch | |||
@@ -0,0 +1,36 @@ | |||
1 | From 4943334fd9bf7dffd49f9e86251ad40b3efe2135 Mon Sep 17 00:00:00 2001 | ||
2 | From: Wang Mingyu <wangmy@cn.fujitsu.com> | ||
3 | Date: Fri, 11 Dec 2020 17:02:20 +0900 | ||
4 | Subject: [PATCH] Fix bug for CVE-2020-15803 | ||
5 | |||
6 | Signed-off-by: Wang Mingyu <wangmy@cn.fujitsu.com> | ||
7 | --- | ||
8 | frontends/php/include/classes/html/CIFrame.php | 7 +++++++ | ||
9 | 1 file changed, 7 insertions(+) | ||
10 | |||
11 | diff --git a/frontends/php/include/classes/html/CIFrame.php b/frontends/php/include/classes/html/CIFrame.php | ||
12 | index 32220cd..70f2ab5 100644 | ||
13 | --- a/frontends/php/include/classes/html/CIFrame.php | ||
14 | +++ b/frontends/php/include/classes/html/CIFrame.php | ||
15 | @@ -29,6 +29,7 @@ class CIFrame extends CTag { | ||
16 | $this->setHeight($height); | ||
17 | $this->setScrolling($scrolling); | ||
18 | $this->setId($id); | ||
19 | + $this->setSandbox(); | ||
20 | } | ||
21 | |||
22 | public function setSrc($value = null) { | ||
23 | @@ -69,4 +70,10 @@ class CIFrame extends CTag { | ||
24 | $this->setAttribute('scrolling', $value); | ||
25 | return $this; | ||
26 | } | ||
27 | + | ||
28 | + private function setSandbox() { | ||
29 | + if (ZBX_IFRAME_SANDBOX !== false) { | ||
30 | + $this->setAttribute('sandbox', ZBX_IFRAME_SANDBOX); | ||
31 | + } | ||
32 | + } | ||
33 | } | ||
34 | -- | ||
35 | 2.25.1 | ||
36 | |||
diff --git a/meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb b/meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb index 0e0ddd5779..98a31879c4 100644 --- a/meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb +++ b/meta-oe/recipes-connectivity/zabbix/zabbix_4.4.6.bb | |||
@@ -26,6 +26,7 @@ PACKAGE_ARCH = "${MACHINE_ARCH}" | |||
26 | SRC_URI = "http://jaist.dl.sourceforge.net/project/zabbix/ZABBIX%20Latest%20Stable/${PV}/${BPN}-${PV}.tar.gz \ | 26 | SRC_URI = "http://jaist.dl.sourceforge.net/project/zabbix/ZABBIX%20Latest%20Stable/${PV}/${BPN}-${PV}.tar.gz \ |
27 | file://0001-Fix-configure.ac.patch \ | 27 | file://0001-Fix-configure.ac.patch \ |
28 | file://zabbix-agent.service \ | 28 | file://zabbix-agent.service \ |
29 | file://CVE-2020-15803.patch \ | ||
29 | " | 30 | " |
30 | 31 | ||
31 | SRC_URI[md5sum] = "e666539220be93b1af38e40f5fbb1f79" | 32 | SRC_URI[md5sum] = "e666539220be93b1af38e40f5fbb1f79" |