<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/meta-openembedded.git/meta-python/recipes-devtools/python/python-pycrypto/CVE-2013-7459.patch, branch pyro</title>
<subtitle>Mirror of git.openembedded.org/meta-openembedded</subtitle>
<id>https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=pyro</id>
<link rel='self' href='https://git.enea.com/cgit/linux/meta-openembedded.git/atom?h=pyro'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/'/>
<updated>2017-09-14T00:16:28+00:00</updated>
<entry>
<title>python-pycrypto: Security fix CVE-2013-7459</title>
<updated>2017-09-14T00:16:28+00:00</updated>
<author>
<name>Yi Zhao</name>
<email>yi.zhao@windriver.com</email>
</author>
<published>2017-08-24T05:56:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/meta-openembedded.git/commit/?id=44af8be65f2f1969df006eec08040f5ff81df790'/>
<id>urn:sha1:44af8be65f2f1969df006eec08040f5ff81df790</id>
<content type='text'>
CVE-2013-7459: Heap-based buffer overflow in the ALGnew function in
block_templace.c in Python Cryptography Toolkit (aka pycrypto) allows
remote attackers to execute arbitrary code as demonstrated by a crafted
iv parameter to cryptmsg.py.

Reference:
https://nvd.nist.gov/vuln/detail/CVE-2013-7459

Patch from:
https://github.com/dlitz/pycrypto/commit/8dbe0dc3eea5c689d4f76b37b93fe216cf1f00d4

Signed-off-by: Yi Zhao &lt;yi.zhao@windriver.com&gt;
Signed-off-by: Martin Jansa &lt;Martin.Jansa@gmail.com&gt;
(cherry picked from commit e4af9cf961c70bb4a96eaafd995d0ff2c264cb8e)
Signed-off-by: Armin Kuster &lt;akuster808@gmail.com&gt;
</content>
</entry>
</feed>
