aboutsummaryrefslogtreecommitdiffstats
path: root/contrib/tools/python/src/Lib/email/errors.py
diff options
context:
space:
mode:
authornpt-1707 <npthanh132@gmail.com>2025-05-12 11:37:42 +0300
committerrobot-piglet <robot-piglet@yandex-team.com>2025-05-12 11:51:50 +0300
commitbf1279129bcf6c1b1001e39c39a13d80737898d3 (patch)
treecb4abf79cf9999e8a48e37badced7fc0a141ac1a /contrib/tools/python/src/Lib/email/errors.py
parent3828d7ccd94bdcdb1515d956d96f5050b158f3f4 (diff)
downloadydb-bf1279129bcf6c1b1001e39c39a13d80737898d3.tar.gz
Fix potential vulnerable cloned function
* Changelog entry Type: fix Component: contrib/restricted/http-parser/http_parser.c Hi there, I identified another vulnerability in a clone function http_parser_execute() in `contrib/restricted/http-parser/http_parser.c` sourced from [nodejs/node](https://github.com/nodejs/node). This issue, originally reported in-8287](https://nvd.nist.gov/vuln/detail/cve-2020-8287), was resolved in the repository via this commit https://github.com/nodejs/node/commit/fc70ce08f5818a286fb5899a1bc3aff5965a745e. This PR applies the corresponding patch to fix the vulnerabilities in this codebase. Please review at your convenience. Thank you! --- Pull Request resolved: https://github.com/ytsaurus/ytsaurus/pull/1260 Co-authored-by: nadya02 <nadya02@yandex-team.com> commit_hash:074ecc3485a1c90bd75678a6464ea12654804660
Diffstat (limited to 'contrib/tools/python/src/Lib/email/errors.py')
0 files changed, 0 insertions, 0 deletions