Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "libpython2.7-dbg": "2.7.6-8ubuntu0.2", "libpython2.7-dbgsym": "2.7.6-8ubuntu0.2", "libpython2.7-stdlib-dbgsym": "2.7.6-8ubuntu0.2", "python2.7-examples": "2.7.6-8ubuntu0.2", "libpython2.7-minimal-dbgsym": "2.7.6-8ubuntu0.2", "python2.7-dbg": "2.7.6-8ubuntu0.2", "python2.7-dev-dbgsym": "2.7.6-8ubuntu0.2", "python2.7-dev": "2.7.6-8ubuntu0.2", "libpython2.7-testsuite": "2.7.6-8ubuntu0.2", "python2.7-minimal": "2.7.6-8ubuntu0.2", "libpython2.7-minimal": "2.7.6-8ubuntu0.2", "python2.7": "2.7.6-8ubuntu0.2", "libpython2.7": "2.7.6-8ubuntu0.2", "libpython2.7-dev-dbgsym": "2.7.6-8ubuntu0.2", "libpython2.7-stdlib": "2.7.6-8ubuntu0.2", "python2.7-doc": "2.7.6-8ubuntu0.2", "python2.7-minimal-dbgsym": "2.7.6-8ubuntu0.2", "idle-python2.7": "2.7.6-8ubuntu0.2", "python2.7-dbgsym": "2.7.6-8ubuntu0.2", "libpython2.7-dev": "2.7.6-8ubuntu0.2" } ] }