mirror of
https://git.yoctoproject.org/poky
synced 2026-03-27 16:02:21 +01:00
python: Fix CVE-2014-7185
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function. This back-ported patch fixes CVE-2014-7185 (From OE-Core rev: 49ceed974e39ab8ac4be410e5caa5e1ef7a646d9) (From OE-Core rev: 3dd696e03e66fa98b58a17b7f34ffe4002ddc9c6) Signed-off-by: Wenzong Fan <wenzong.fan@windriver.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> Signed-off-by: Armin Kuster <akuster808@gmail.com> Conflicts: meta/recipes-devtools/python/python_2.7.3.bb hand merged bb file since I did not take previous patch. Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
bd00bc3d0d
commit
b70ef7b95a
@@ -38,6 +38,7 @@ SRC_URI += "\
|
||||
file://python-2.7.3-CVE-2014-1912.patch \
|
||||
file://json-flaw-fix.patch \
|
||||
file://posix_close.patch \
|
||||
file://python-2.7.3-CVE-2014-7185.patch \
|
||||
"
|
||||
|
||||
S = "${WORKDIR}/Python-${PV}"
|
||||
|
||||
Reference in New Issue
Block a user