From 97e9be81304ddebdee1045105264f09cac6b239a Mon Sep 17 00:00:00 2001 From: Sona Sarmadi Date: Wed, 22 Apr 2015 14:57:28 +0200 Subject: python: CVE-2014-7185 Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function. PoC: (From OE-Core rev: 2590eb53a6dac90cba52edd09ea56a6bdf4c4533) Signed-off-by: Richard Purdie --- meta/recipes-devtools/python/python_2.7.3.bb | 1 + 1 file changed, 1 insertion(+) (limited to 'meta/recipes-devtools/python/python_2.7.3.bb') diff --git a/meta/recipes-devtools/python/python_2.7.3.bb b/meta/recipes-devtools/python/python_2.7.3.bb index 4d2594a942..ccae3fa261 100644 --- a/meta/recipes-devtools/python/python_2.7.3.bb +++ b/meta/recipes-devtools/python/python_2.7.3.bb @@ -37,6 +37,7 @@ SRC_URI += "\ file://python-fix-build-error-with-Readline-6.3.patch \ file://python-2.7.3-CVE-2014-1912.patch \ file://python2.7.3-nossl3.patch \ + file://python-2.7.3-CVE-2014-7185.patch \ " S = "${WORKDIR}/Python-${PV}" -- cgit v1.2.3-54-g00ecf