Описание
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
An integer overflow flaw was found in the way the buffer() function handled its offset and size arguments. An attacker able to control those arguments could use this flaw to disclose portions of the application memory or cause it to crash.
Отчет
This issue affects the versions of python as shipped with Red Hat Enterprise Linux 7. A future update may address this issue. Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 4 | python | Will not fix | ||
Red Hat Enterprise Linux 5 | python | Will not fix | ||
Red Hat Software Collections | python27-python | Affected | ||
Red Hat Software Collections | python33-python | Not affected | ||
Red Hat Software Collections | rh-python34-python | Not affected | ||
Red Hat Enterprise Linux 6 | python | Fixed | RHSA-2015:1330 | 20.07.2015 |
Red Hat Enterprise Linux 7 | python | Fixed | RHSA-2015:2101 | 19.11.2015 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | python27 | Fixed | RHSA-2015:1064 | 04.06.2015 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | python27-python | Fixed | RHSA-2015:1064 | 04.06.2015 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | python27-python-pip | Fixed | RHSA-2015:1064 | 04.06.2015 |
Показывать по
Дополнительная информация
Статус:
EPSS
4 Medium
CVSS2
Связанные уязвимости
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
Integer overflow in bufferobject.c in Python before 2.7.8 allows conte ...
Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
EPSS
4 Medium
CVSS2