Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
{
"binaries": [
{
"binary_name": "idle-python2.7",
"binary_version": "2.7.6-8ubuntu0.2"
},
{
"binary_name": "libpython2.7",
"binary_version": "2.7.6-8ubuntu0.2"
},
{
"binary_name": "libpython2.7-dev",
"binary_version": "2.7.6-8ubuntu0.2"
},
{
"binary_name": "libpython2.7-minimal",
"binary_version": "2.7.6-8ubuntu0.2"
},
{
"binary_name": "libpython2.7-stdlib",
"binary_version": "2.7.6-8ubuntu0.2"
},
{
"binary_name": "libpython2.7-testsuite",
"binary_version": "2.7.6-8ubuntu0.2"
},
{
"binary_name": "python2.7",
"binary_version": "2.7.6-8ubuntu0.2"
},
{
"binary_name": "python2.7-dev",
"binary_version": "2.7.6-8ubuntu0.2"
},
{
"binary_name": "python2.7-examples",
"binary_version": "2.7.6-8ubuntu0.2"
},
{
"binary_name": "python2.7-minimal",
"binary_version": "2.7.6-8ubuntu0.2"
}
],
"availability": "No subscription required"
}