diff options
| author | Sona Sarmadi <sona.sarmadi@enea.com> | 2015-04-22 14:57:28 +0200 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2015-04-27 15:20:32 +0100 |
| commit | 2590eb53a6dac90cba52edd09ea56a6bdf4c4533 (patch) | |
| tree | 24d75564a6a1551596a763c91a3154010b3dbce9 /meta/recipes-devtools/python/python-native | |
| parent | a2966949e68bbdce8d0a0fd5946d078b84ae63e9 (diff) | |
| download | openembedded-core-2590eb53a6dac90cba52edd09ea56a6bdf4c4533.tar.gz openembedded-core-2590eb53a6dac90cba52edd09ea56a6bdf4c4533.tar.bz2 openembedded-core-2590eb53a6dac90cba52edd09ea56a6bdf4c4533.zip | |
python: CVE-2014-7185
Integer overflow in bufferobject.c in Python before 2.7.8 allows
context-dependent attackers to obtain sensitive information from
process memory via a large size and offset in a "buffer" function.
PoC:
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-devtools/python/python-native')
0 files changed, 0 insertions, 0 deletions
