diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2015-04-21 13:29:30 +0200 |
---|---|---|
committer | Tudor Florea <tudor.florea@enea.com> | 2015-07-06 20:19:40 +0200 |
commit | 2b10e943c879c0a510d4c2dcda127eef76974854 (patch) | |
tree | 37a010c2b02f683c19cf84780e45f0ac70c7a7e4 /meta/recipes-devtools/qemu/qemu_1.7.2.bb | |
parent | 88d894a438adb9f0ef60f578a190bff9f508adac (diff) | |
download | poky-2b10e943c879c0a510d4c2dcda127eef76974854.tar.gz |
python: CVE-2014-7185
Fixes buffer() integer overflow leading to out of bounds read
This bug is only an issue if offset and size arguments are untrusted.
The buffer() was removed from Python 3 and hence Python 3 was not
affected by this issue.
Reference
http://openwall.com/lists/oss-security/2014/09/25/47
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Diffstat (limited to 'meta/recipes-devtools/qemu/qemu_1.7.2.bb')
0 files changed, 0 insertions, 0 deletions