Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
{
"cwe_ids": []
}[
{
"source": "https://github.com/python/cpython/commit/550b945fd66f1c6837a53fbf29dc8e524297b8c3",
"target": {
"function": "get_buf",
"file": "Objects/bufferobject.c"
},
"signature_type": "Function",
"deprecated": false,
"signature_version": "v1",
"id": "PSF-2014-6-49d160cc",
"digest": {
"function_hash": "309977180046877818326265354308150323506",
"length": 1576.0
}
},
{
"source": "https://github.com/python/cpython/commit/550b945fd66f1c6837a53fbf29dc8e524297b8c3",
"target": {
"file": "Objects/bufferobject.c"
},
"signature_type": "Line",
"deprecated": false,
"signature_version": "v1",
"id": "PSF-2014-6-89cf1351",
"digest": {
"line_hashes": [
"150755083869012394236169596343615360559",
"333759549387786561734708116223330721126",
"245122130842657787089162520002778066703",
"223354793685248631443489536811747358716",
"216301770560921474631172421429308174413"
],
"threshold": 0.9
}
}
]