Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-40217

Опубликовано: 25 авг. 2023
Источник: ubuntu
Приоритет: medium
CVSS3: 5.3

Описание

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-apps/focal

released

2.7.18-1~20.04.7
esm-apps/jammy

released

2.7.18-13ubuntu1.5
esm-infra-legacy/trusty

not-affected

2.7.6-8ubuntu0.6+esm18
esm-infra/bionic

released

2.7.17-1~18.04ubuntu1.13+esm4
esm-infra/xenial

released

2.7.12-1ubuntu0~16.04.18+esm9
focal

released

2.7.18-1~20.04.7
jammy

released

2.7.18-13ubuntu1.5
lunar

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

released

3.10.12-1~22.04.3
lunar

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-apps/jammy

released

3.11.0~rc1-1~22.04.1~esm1
esm-infra/focal

DNE

focal

DNE

jammy

needed

lunar

released

3.11.4-1~23.04.1
mantic

not-affected

3.11.6-3
noble

DNE

oracular

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

DNE

mantic

not-affected

3.12.0-1
noble

not-affected

3.12.0-6
oracular

not-affected

3.12.0-6
plucky

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

needed

esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

DNE

mantic

DNE

noble

DNE

oracular

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

esm-infra-legacy/trusty

not-affected

3.5.2-2ubuntu0~16.04.4~14.04.1+esm1
esm-infra/focal

DNE

esm-infra/xenial

released

3.5.2-2ubuntu0~16.04.13+esm12
focal

DNE

jammy

DNE

lunar

DNE

mantic

DNE

noble

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

3.6.9-1~18.04ubuntu1.13+esm1
esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

DNE

mantic

DNE

noble

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-apps/bionic

released

3.7.5-2ubuntu1~18.04.2+esm3
esm-infra/focal

DNE

focal

DNE

jammy

DNE

lunar

DNE

mantic

DNE

noble

DNE

oracular

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-apps/bionic

released

3.8.0-3ubuntu1~18.04.2+esm2
esm-infra-legacy/trusty

DNE

esm-infra/focal

not-affected

3.8.10-0ubuntu1~20.04.9
focal

released

3.8.10-0ubuntu1~20.04.9
jammy

DNE

lunar

DNE

mantic

DNE

noble

DNE

Показывать по

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

DNE

esm-apps/focal

released

3.9.5-3ubuntu0~20.04.1+esm2
focal

ignored

end of standard support, was needed
jammy

DNE

lunar

DNE

mantic

DNE

noble

DNE

oracular

DNE

plucky

DNE

Показывать по

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.6
redhat
почти 2 года назад

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)

CVSS3: 5.3
nvd
почти 2 года назад

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)

CVSS3: 5.3
msrc
больше 1 года назад

Описание отсутствует

CVSS3: 5.3
debian
почти 2 года назад

An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, ...

suse-cvrf
больше 1 года назад

Security update for python

5.3 Medium

CVSS3