summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-devtools/perl/libdev-checklib-perl/0001-CheckLib.pm-don-t-execute-the-binary.patch
diff options
context:
space:
mode:
authorYi Zhao <yi.zhao@eng.windriver.com>2023-06-29 21:04:15 +0800
committerArmin Kuster <akuster808@gmail.com>2023-07-02 11:24:51 -0400
commit76305fc4c3c841fecdc92ebd8145de1803347b1c (patch)
tree4276dda45fe0f104717394258904267e7fa67665 /meta-oe/recipes-devtools/perl/libdev-checklib-perl/0001-CheckLib.pm-don-t-execute-the-binary.patch
parentd71a08b3d8fc69d3213c10885af9cc693056a8bd (diff)
downloadmeta-openembedded-76305fc4c3c841fecdc92ebd8145de1803347b1c.tar.gz
open-vm-tools: Security fix CVE-2023-20867
CVE-2023-20867: A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. Reference: https://nvd.nist.gov/vuln/detail/CVE-2023-20867 Patch from: https://github.com/vmware/open-vm-tools/blob/CVE-2023-20867.patch/2023-20867-Remove-some-dead-code.patch Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-oe/recipes-devtools/perl/libdev-checklib-perl/0001-CheckLib.pm-don-t-execute-the-binary.patch')
0 files changed, 0 insertions, 0 deletions