From e34ad1e27b7db3237ae0435864cced32133d7025 Mon Sep 17 00:00:00 2001 From: "Maxin B. John" Date: Mon, 7 Apr 2014 17:48:11 +0200 Subject: python: Fix CVE-2014-1912 A remote user can send specially crafted data to trigger a buffer overflow in socket.recvfrom_into() and execute arbitrary code on the target system. The code will run with the privileges of the target service. This back-ported patch fixes CVE-2014-1912 (From OE-Core rev: 344049ccfa59ae489c35fe0fb7592f7d34720b51) Signed-off-by: Maxin B. John Signed-off-by: Richard Purdie --- meta/recipes-devtools/python/python_2.7.3.bb | 1 + 1 file changed, 1 insertion(+) (limited to 'meta/recipes-devtools/python/python_2.7.3.bb') diff --git a/meta/recipes-devtools/python/python_2.7.3.bb b/meta/recipes-devtools/python/python_2.7.3.bb index c7bb9b4131..0d641720f1 100644 --- a/meta/recipes-devtools/python/python_2.7.3.bb +++ b/meta/recipes-devtools/python/python_2.7.3.bb @@ -35,6 +35,7 @@ SRC_URI += "\ file://parallel-makeinst-create-bindir.patch \ file://python-2.7.3-CVE-2013-1752-smtplib-fix.patch \ file://python-fix-build-error-with-Readline-6.3.patch \ + file://python-2.7.3-CVE-2014-1912.patch \ " S = "${WORKDIR}/Python-${PV}" -- cgit v1.2.3-54-g00ecf