Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2024-10980

Опубликовано: 12 дек. 2024
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2024-10980: python3.12 security update (IMPORTANT)

[3.12.8-1]

  • Update to 3.12.8
  • Security fix for CVE-2024-9287 and CVE-2024-12254 Resolves: RHEL-64880, RHEL-70315

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

python3.12

3.12.8-1.el8_10

python3.12-debug

3.12.8-1.el8_10

python3.12-devel

3.12.8-1.el8_10

python3.12-idle

3.12.8-1.el8_10

python3.12-libs

3.12.8-1.el8_10

python3.12-rpm-macros

3.12.8-1.el8_10

python3.12-test

3.12.8-1.el8_10

python3.12-tkinter

3.12.8-1.el8_10

Oracle Linux x86_64

python3.12

3.12.8-1.el8_10

python3.12-debug

3.12.8-1.el8_10

python3.12-devel

3.12.8-1.el8_10

python3.12-idle

3.12.8-1.el8_10

python3.12-libs

3.12.8-1.el8_10

python3.12-rpm-macros

3.12.8-1.el8_10

python3.12-test

3.12.8-1.el8_10

python3.12-tkinter

3.12.8-1.el8_10

Связанные CVE

Связанные уязвимости

rocky
8 месяцев назад

Important: python3.12 security update

oracle-oval
8 месяцев назад

ELSA-2024-10978: python3.12 security update (IMPORTANT)

suse-cvrf
около 1 месяца назад

Security update for python313

CVSS3: 7.5
ubuntu
8 месяцев назад

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

CVSS3: 7.5
redhat
8 месяцев назад

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.