Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a "buffer" function.
{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "idle-python2.7",
            "binary_version": "2.7.6-8ubuntu0.2"
        },
        {
            "binary_name": "libpython2.7",
            "binary_version": "2.7.6-8ubuntu0.2"
        },
        {
            "binary_name": "libpython2.7-dev",
            "binary_version": "2.7.6-8ubuntu0.2"
        },
        {
            "binary_name": "libpython2.7-minimal",
            "binary_version": "2.7.6-8ubuntu0.2"
        },
        {
            "binary_name": "libpython2.7-stdlib",
            "binary_version": "2.7.6-8ubuntu0.2"
        },
        {
            "binary_name": "libpython2.7-testsuite",
            "binary_version": "2.7.6-8ubuntu0.2"
        },
        {
            "binary_name": "python2.7",
            "binary_version": "2.7.6-8ubuntu0.2"
        },
        {
            "binary_name": "python2.7-dev",
            "binary_version": "2.7.6-8ubuntu0.2"
        },
        {
            "binary_name": "python2.7-examples",
            "binary_version": "2.7.6-8ubuntu0.2"
        },
        {
            "binary_name": "python2.7-minimal",
            "binary_version": "2.7.6-8ubuntu0.2"
        }
    ]
}