Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2014-7185

Опубликовано: 08 окт. 2014
Источник: debian
EPSS Низкий

Описание

Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
python2.5removedpackage
python2.5no-dsasqueezepackage
python2.6removedpackage
python2.6no-dsasqueezepackage
python2.6no-dsawheezypackage
python2.7fixed2.7.8-1package
python2.7no-dsawheezypackage

Примечания

  • http://bugs.python.org/issue21831

  • Upstream fix http://hg.python.org/cpython/rev/8d963c7db507

EPSS

Процентиль: 78%
0.01208
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

redhat
почти 11 лет назад

Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

nvd
больше 10 лет назад

Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

github
около 3 лет назад

Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.

suse-cvrf
почти 10 лет назад

Security update for python

EPSS

Процентиль: 78%
0.01208
Низкий