summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/qemu/qemu_1.7.2.bb
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2015-04-21 13:29:30 +0200
committerTudor Florea <tudor.florea@enea.com>2015-07-06 20:19:40 +0200
commit2b10e943c879c0a510d4c2dcda127eef76974854 (patch)
tree37a010c2b02f683c19cf84780e45f0ac70c7a7e4 /meta/recipes-devtools/qemu/qemu_1.7.2.bb
parent88d894a438adb9f0ef60f578a190bff9f508adac (diff)
downloadpoky-2b10e943c879c0a510d4c2dcda127eef76974854.tar.gz
python: CVE-2014-7185
Fixes buffer() integer overflow leading to out of bounds read This bug is only an issue if offset and size arguments are untrusted. The buffer() was removed from Python 3 and hence Python 3 was not affected by this issue. Reference http://openwall.com/lists/oss-security/2014/09/25/47 Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Diffstat (limited to 'meta/recipes-devtools/qemu/qemu_1.7.2.bb')
0 files changed, 0 insertions, 0 deletions