An integer overflow flaw was found in the way the buffer() function handled its offset and size arguments. An attacker able to control those arguments could use this flaw to disclose portions of the application memory or cause it to crash.
Find out more about CVE-2014-7185 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue affects the versions of python as shipped with Red Hat Enterprise Linux 7. A future update may address this issue.
Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.
Base Score | 4 |
---|---|
Base Metrics | AV:N/AC:H/Au:N/C:P/I:N/A:P |
Access Vector | Network |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | Partial |
Integrity Impact | None |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Errata | Release Date |
---|---|---|
Red Hat Software Collections for Red Hat Enterprise Linux 6 (python27-python) | RHSA-2015:1064 | 2015-06-04 |
Red Hat Enterprise Linux 7 (python) | RHSA-2015:2101 | 2015-11-19 |
Red Hat Software Collections for Red Hat Enterprise Linux 7 (python27-python) | RHSA-2015:1064 | 2015-06-04 |
Red Hat Enterprise Linux 6 (python) | RHSA-2015:1330 | 2015-07-20 |
Platform | Package | State |
---|---|---|
Red Hat Software Collections for Red Hat Enterprise Linux | rh-python34-python | Not affected |
Red Hat Software Collections 1 for Red Hat Enterprise Linux | python33-python | Not affected |
Red Hat Enterprise Linux 5 | python | Will not fix |
Red Hat Enterprise Linux 4 | python | Will not fix |