diff options
| author | Sona Sarmadi <sona.sarmadi@enea.com> | 2015-04-21 13:29:30 +0200 |
|---|---|---|
| committer | Tudor Florea <tudor.florea@enea.com> | 2015-07-06 20:19:40 +0200 |
| commit | 2b10e943c879c0a510d4c2dcda127eef76974854 (patch) | |
| tree | 37a010c2b02f683c19cf84780e45f0ac70c7a7e4 /scripts/runqemu-ifup | |
| parent | 88d894a438adb9f0ef60f578a190bff9f508adac (diff) | |
| download | poky-2b10e943c879c0a510d4c2dcda127eef76974854.tar.gz | |
python: CVE-2014-7185
Fixes buffer() integer overflow leading to out of bounds read
This bug is only an issue if offset and size arguments are untrusted.
The buffer() was removed from Python 3 and hence Python 3 was not
affected by this issue.
Reference
http://openwall.com/lists/oss-security/2014/09/25/47
Signed-off-by: Sona Sarmadi <sona.sarmadi@enea.com>
Diffstat (limited to 'scripts/runqemu-ifup')
0 files changed, 0 insertions, 0 deletions
