diff options
author | Sona Sarmadi <sona.sarmadi@enea.com> | 2015-04-22 14:57:28 +0200 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2015-04-27 15:20:32 +0100 |
commit | 2590eb53a6dac90cba52edd09ea56a6bdf4c4533 (patch) | |
tree | 24d75564a6a1551596a763c91a3154010b3dbce9 /meta/classes/libc-package.bbclass | |
parent | a2966949e68bbdce8d0a0fd5946d078b84ae63e9 (diff) | |
download | openembedded-core-2590eb53a6dac90cba52edd09ea56a6bdf4c4533.tar.gz |
python: CVE-2014-7185
Integer overflow in bufferobject.c in Python before 2.7.8 allows
context-dependent attackers to obtain sensitive information from
process memory via a large size and offset in a "buffer" function.
PoC:
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/classes/libc-package.bbclass')
0 files changed, 0 insertions, 0 deletions