summaryrefslogtreecommitdiffstats
path: root/meta-python/recipes-devtools/python/python3-astor/0001-rtrip.py-convert-to-python3.patch
diff options
context:
space:
mode:
authorYi Zhao <yi.zhao@windriver.com>2022-10-10 15:30:07 +0800
committerArmin Kuster <akuster808@gmail.com>2022-10-13 10:59:03 -0400
commit6b7c2efd68136de060ff1f9981d522ff1c091bb4 (patch)
treee282536bb19850645b965d5e3fe7826713041307 /meta-python/recipes-devtools/python/python3-astor/0001-rtrip.py-convert-to-python3.patch
parent9702cc9ba38510bc715cf8f3ce734f0fda571a5c (diff)
downloadmeta-openembedded-6b7c2efd68136de060ff1f9981d522ff1c091bb4.tar.gz
open-vm-tools: Security fix CVE-2022-31676
CVE-2022-31676: VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine. Reference: https://nvd.nist.gov/vuln/detail/CVE-2022-31676 Patch from: https://github.com/vmware/open-vm-tools/commit/70a74758bfe0042c27f15ce590fb21a2bc54d745 Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-python/recipes-devtools/python/python3-astor/0001-rtrip.py-convert-to-python3.patch')
0 files changed, 0 insertions, 0 deletions