Fix potentially vulnerable cloned function#69180
Conversation
|
Hi there! Welcome to the Salt Community! Thank you for making your first contribution. We have a lengthy process for issues and PRs. Someone from the Core Team will follow up as soon as possible. In the meantime, here's some information that may help as you continue your Salt journey. There are lots of ways to get involved in our community. Every month, there are around a dozen opportunities to meet with other contributors and the Salt Core team and collaborate in real time. The best way to keep track is by subscribing to the Salt Community Events Calendar. |
What does this PR do?
Our tool identified a potential vulnerability in a clone function in
doc/_themes/saltstack/static/js/vendor/bootstrap.jssourced from twbs/bootstrap. This issue, originally reported in CVE-2016-10735, was resolved in the repository via this commit twbs/bootstrap@d9be1da.This PR suggests applying the corresponding patch to fix the vulnerabilities in this codebase.