Описание
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
python2.5 | removed | package | ||
python2.5 | no-dsa | squeeze | package | |
python2.6 | removed | package | ||
python2.6 | no-dsa | squeeze | package | |
python2.6 | no-dsa | wheezy | package | |
python2.7 | fixed | 2.7.8-1 | package | |
python2.7 | no-dsa | wheezy | package |
Примечания
http://bugs.python.org/issue21831
Upstream fix http://hg.python.org/cpython/rev/8d963c7db507
EPSS
Связанные уязвимости
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
EPSS