diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2015-04-21 13:29:30 +0200 |
---|---|---|
committer | Tudor Florea <tudor.florea@enea.com> | 2015-07-06 20:19:40 +0200 |
commit | 2b10e943c879c0a510d4c2dcda127eef76974854 (patch) | |
tree | 37a010c2b02f683c19cf84780e45f0ac70c7a7e4 /meta/recipes-devtools/python/python_2.7.3.bb | |
parent | 88d894a438adb9f0ef60f578a190bff9f508adac (diff) | |
download | poky-2b10e943c879c0a510d4c2dcda127eef76974854.tar.gz |
python: CVE-2014-7185
Fixes buffer() integer overflow leading to out of bounds read
This bug is only an issue if offset and size arguments are untrusted.
The buffer() was removed from Python 3 and hence Python 3 was not
affected by this issue.
Reference
http://openwall.com/lists/oss-security/2014/09/25/47
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Diffstat (limited to 'meta/recipes-devtools/python/python_2.7.3.bb')
-rw-r--r-- | meta/recipes-devtools/python/python_2.7.3.bb | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-devtools/python/python_2.7.3.bb b/meta/recipes-devtools/python/python_2.7.3.bb index 28ea2347e3..0d9ca456fe 100644 --- a/meta/recipes-devtools/python/python_2.7.3.bb +++ b/meta/recipes-devtools/python/python_2.7.3.bb | |||
@@ -38,6 +38,7 @@ SRC_URI += "\ | |||
38 | file://python-2.7.3-CVE-2014-1912.patch \ | 38 | file://python-2.7.3-CVE-2014-1912.patch \ |
39 | file://json-flaw-CVE-2014-4616.patch \ | 39 | file://json-flaw-CVE-2014-4616.patch \ |
40 | file://python2.7.3-nossl3.patch \ | 40 | file://python2.7.3-nossl3.patch \ |
41 | file://python-2.7.3-CVE-2014-7185.patch \ | ||
41 | " | 42 | " |
42 | 43 | ||
43 | S = "${WORKDIR}/Python-${PV}" | 44 | S = "${WORKDIR}/Python-${PV}" |