Логотип exploitDog
bind:"CVE-2024-12254" OR bind:"CVE-2024-9287"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2024-12254" OR bind:"CVE-2024-9287"

Количество 44

Количество 44

rocky логотип

RLSA-2024:10980

около 1 года назад

Important: python3.12 security update

EPSS: Низкий
rocky логотип

RLSA-2024:10978

11 месяцев назад

Important: python3.12 security update

EPSS: Низкий
oracle-oval логотип

ELSA-2024-10980

около 1 года назад

ELSA-2024-10980: python3.12 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2024-10978

около 1 года назад

ELSA-2024-10978: python3.12 security update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02074-1

8 месяцев назад

Security update for python313

EPSS: Низкий
ubuntu логотип

CVE-2024-12254

около 1 года назад

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2024-12254

около 1 года назад

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2024-12254

около 1 года назад

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2024-12254

около 1 года назад

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2024-12254

около 1 года назад

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writel ...

CVSS3: 7.5
EPSS: Низкий
ubuntu логотип

CVE-2024-9287

больше 1 года назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
EPSS: Низкий
redhat логотип

CVE-2024-9287

больше 1 года назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 6.3
EPSS: Низкий
nvd логотип

CVE-2024-9287

больше 1 года назад

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
EPSS: Низкий
msrc логотип

CVE-2024-9287

11 месяцев назад

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2024-9287

больше 1 года назад

A vulnerability has been found in the CPython `venv` module and CLI wh ...

CVSS3: 7.8
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:4291-1

около 1 года назад

Security update for python312

EPSS: Низкий
github логотип

GHSA-ph84-rcj2-fxxm

около 1 года назад

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

CVSS3: 7.5
EPSS: Низкий
fstec логотип

BDU:2025-00345

около 1 года назад

Уязвимость метода asyncio._SelectorSocketTransport.writelines() языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:0048-1

около 1 года назад

Security update for python312

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2024:3959-1

около 1 года назад

Security update for python312

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
rocky логотип
RLSA-2024:10980

Important: python3.12 security update

около 1 года назад
rocky логотип
RLSA-2024:10978

Important: python3.12 security update

11 месяцев назад
oracle-oval логотип
ELSA-2024-10980

ELSA-2024-10980: python3.12 security update (IMPORTANT)

около 1 года назад
oracle-oval логотип
ELSA-2024-10978

ELSA-2024-10978: python3.12 security update (IMPORTANT)

около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:02074-1

Security update for python313

8 месяцев назад
ubuntu логотип
CVE-2024-12254

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

CVSS3: 7.5
0%
Низкий
около 1 года назад
redhat логотип
CVE-2024-12254

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

CVSS3: 7.5
0%
Низкий
около 1 года назад
nvd логотип
CVE-2024-12254

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

CVSS3: 7.5
0%
Низкий
около 1 года назад
msrc логотип
CVSS3: 7.5
0%
Низкий
около 1 года назад
debian логотип
CVE-2024-12254

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writel ...

CVSS3: 7.5
0%
Низкий
около 1 года назад
ubuntu логотип
CVE-2024-9287

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
redhat логотип
CVE-2024-9287

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 6.3
0%
Низкий
больше 1 года назад
nvd логотип
CVE-2024-9287

A vulnerability has been found in the CPython `venv` module and CLI where path names provided when creating a virtual environment were not quoted properly, allowing the creator to inject commands into virtual environment "activation" scripts (ie "source venv/bin/activate"). This means that attacker-controlled virtual environments are able to run commands when the virtual environment is activated. Virtual environments which are not created by an attacker or which aren't activated before being used (ie "./venv/bin/python") are not affected.

CVSS3: 7.8
0%
Низкий
больше 1 года назад
msrc логотип
CVSS3: 7.8
0%
Низкий
11 месяцев назад
debian логотип
CVE-2024-9287

A vulnerability has been found in the CPython `venv` module and CLI wh ...

CVSS3: 7.8
0%
Низкий
больше 1 года назад
suse-cvrf логотип
SUSE-SU-2024:4291-1

Security update for python312

0%
Низкий
около 1 года назад
github логотип
GHSA-ph84-rcj2-fxxm

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

CVSS3: 7.5
0%
Низкий
около 1 года назад
fstec логотип
BDU:2025-00345

Уязвимость метода asyncio._SelectorSocketTransport.writelines() языка программирования Python, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2025:0048-1

Security update for python312

0%
Низкий
около 1 года назад
suse-cvrf логотип
SUSE-SU-2024:3959-1

Security update for python312

0%
Низкий
около 1 года назад

Уязвимостей на страницу