summaryrefslogtreecommitdiffstats
path: root/meta/recipes-devtools/python/python3/cgi_py.patch
diff options
context:
space:
mode:
authorSoumya Sambu <soumya.sambu@windriver.com>2024-09-03 12:50:49 +0000
committerSteve Sakoman <steve@sakoman.com>2024-09-09 06:08:10 -0700
commit31ea437bf7785201dd4fb04622ec97feba110c93 (patch)
treeff1cb0c80f8deb9d7219d83217b3eb980254f948 /meta/recipes-devtools/python/python3/cgi_py.patch
parent9541ad965035b28697b8df400d7b9bddc4d2519a (diff)
downloadpoky-31ea437bf7785201dd4fb04622ec97feba110c93.tar.gz
python3: Fix CVE-2024-8088
There is a HIGH severity vulnerability affecting the CPython "zipfile" module. When iterating over names of entries in a zip archive (for example, methodsof "zipfile.ZipFile" like "namelist()", "iterdir()", "extractall()", etc) the process can be put into an infinite loop with a maliciously crafted zip archive. This defect applies when reading only metadata or extracting the contents of the zip archive. Programs that are not handling user-controlled zip archives are not affected. References: https://nvd.nist.gov/vuln/detail/CVE-2024-8088 Upstream-Patch: https://github.com/corydolphin/flask-cors/commit/7ae310c56ac30e0b94fb42129aa377bf633256ec (From OE-Core rev: 2d98276ba70ed6c44afecd42a7352f1b3030438f) Signed-off-by: Soumya Sambu <soumya.sambu@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'meta/recipes-devtools/python/python3/cgi_py.patch')
0 files changed, 0 insertions, 0 deletions