mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-31 02:31:22 +00:00
29 lines
1.4 KiB
JSON
29 lines
1.4 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2024-3219",
|
||
|
"sourceIdentifier": "cna@python.org",
|
||
|
"published": "2024-07-29T22:15:04.970",
|
||
|
"lastModified": "2024-07-29T22:15:04.970",
|
||
|
"vulnStatus": "Received",
|
||
|
"cveTags": [],
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "There is a MEDIUM severity vulnerability affecting CPython.\n\nThe\n \u201csocket\u201d module provides a pure-Python fallback to the \nsocket.socketpair() function for platforms that don\u2019t support AF_UNIX, \nsuch as Windows. This pure-Python implementation uses AF_INET or \nAF_INET6 to create a local connected pair of sockets. The connection \nbetween the two sockets was not verified before passing the two sockets \nback to the user, which leaves the server socket vulnerable to a \nconnection race from a malicious local peer.\n\nPlatforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included."
|
||
|
}
|
||
|
],
|
||
|
"metrics": {},
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://github.com/python/cpython/issues/122133",
|
||
|
"source": "cna@python.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://github.com/python/cpython/pull/122134",
|
||
|
"source": "cna@python.org"
|
||
|
},
|
||
|
{
|
||
|
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/WYKDQWIERRE2ICIYMSVRZJO33GSCWU2B/",
|
||
|
"source": "cna@python.org"
|
||
|
}
|
||
|
]
|
||
|
}
|