summaryrefslogtreecommitdiffstats
path: root/oe-init-build-env
diff options
context:
space:
mode:
authorSona Sarmadi <sona.sarmadi@enea.com>2015-04-22 14:57:28 +0200
committerRichard Purdie <richard.purdie@linuxfoundation.org>2015-04-27 15:20:32 +0100
commit2590eb53a6dac90cba52edd09ea56a6bdf4c4533 (patch)
tree24d75564a6a1551596a763c91a3154010b3dbce9 /oe-init-build-env
parenta2966949e68bbdce8d0a0fd5946d078b84ae63e9 (diff)
downloadopenembedded-core-2590eb53a6dac90cba52edd09ea56a6bdf4c4533.tar.gz
openembedded-core-2590eb53a6dac90cba52edd09ea56a6bdf4c4533.tar.bz2
openembedded-core-2590eb53a6dac90cba52edd09ea56a6bdf4c4533.zip
python: CVE-2014-7185
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function. PoC: Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'oe-init-build-env')
0 files changed, 0 insertions, 0 deletions