Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2024-3219

Опубликовано: 29 июл. 2024
Источник: ubuntu
Приоритет: medium
EPSS Низкий

Описание

The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.

РелизСтатусПримечание
devel

DNE

esm-apps/focal

not-affected

see notes
esm-apps/jammy

not-affected

see notes
esm-infra-legacy/trusty

not-affected

see notes
esm-infra/bionic

not-affected

see notes
esm-infra/xenial

not-affected

see notes
focal

not-affected

see notes
jammy

not-affected

see notes
noble

DNE

oracular

DNE

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

not-affected

see notes
noble

DNE

oracular

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/focal

DNE

focal

DNE

jammy

not-affected

see notes
noble

DNE

oracular

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

not-affected

see notes
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

not-affected

see notes
oracular

not-affected

see notes
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

see notes
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

trusty/esm

not-affected

see notes
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

see notes
esm-infra/focal

DNE

esm-infra/xenial

not-affected

see notes
focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

trusty/esm

not-affected

see notes
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra/bionic

not-affected

see notes
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

not-affected

see notes
esm-infra/focal

DNE

focal

DNE

jammy

DNE

noble

DNE

oracular

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/bionic

not-affected

see notes
esm-infra/focal

not-affected

see notes
focal

not-affected

see notes
jammy

DNE

noble

DNE

oracular

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-apps/focal

not-affected

see notes
focal

not-affected

see notes
jammy

DNE

noble

DNE

oracular

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 20%
0.00062
Низкий

Связанные уязвимости

nvd
больше 1 года назад

The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.

msrc
11 месяцев назад

Описание отсутствует

debian
больше 1 года назад

The \u201csocket\u201d module provides a pure-Python fallback to the ...

github
больше 1 года назад

There is a MEDIUM severity vulnerability affecting CPython. The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.

EPSS

Процентиль: 20%
0.00062
Низкий