mirror of
https://git.yoctoproject.org/poky
synced 2026-02-11 03:03:02 +01:00
python: CVE-2014-7185
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function. PoC: (From OE-Core rev: 2590eb53a6dac90cba52edd09ea56a6bdf4c4533) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
523aaea8e2
commit
97e9be8130
@@ -37,6 +37,7 @@ SRC_URI += "\
|
||||
file://python-fix-build-error-with-Readline-6.3.patch \
|
||||
file://python-2.7.3-CVE-2014-1912.patch \
|
||||
file://python2.7.3-nossl3.patch \
|
||||
file://python-2.7.3-CVE-2014-7185.patch \
|
||||
"
|
||||
|
||||
S = "${WORKDIR}/Python-${PV}"
|
||||
|
||||
Reference in New Issue
Block a user