From 49ceed974e39ab8ac4be410e5caa5e1ef7a646d9 Mon Sep 17 00:00:00 2001 From: Wenzong Fan Date: Wed, 12 Nov 2014 03:25:48 -0500 Subject: python: Fix CVE-2014-7185 Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function. This back-ported patch fixes CVE-2014-7185 Signed-off-by: Wenzong Fan Signed-off-by: Ross Burton --- meta/recipes-devtools/python/python_2.7.3.bb | 1 + 1 file changed, 1 insertion(+) (limited to 'meta/recipes-devtools/python/python_2.7.3.bb') diff --git a/meta/recipes-devtools/python/python_2.7.3.bb b/meta/recipes-devtools/python/python_2.7.3.bb index f2e6fde4d6..50c751e323 100644 --- a/meta/recipes-devtools/python/python_2.7.3.bb +++ b/meta/recipes-devtools/python/python_2.7.3.bb @@ -39,6 +39,7 @@ SRC_URI += "\ file://json-flaw-fix.patch \ file://posix_close.patch \ file://remove-BOM-insection-code.patch \ + file://python-2.7.3-CVE-2014-7185.patch \ " S = "${WORKDIR}/Python-${PV}" -- cgit v1.2.3