We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-3219

Pure-Python fallback of socket.socketpair() doesn’t authenticate peer connection



Description

The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.

Reserved 2024-04-02 | Published 2024-07-29 | Updated 2024-11-04 | Assigner PSF


MEDIUM: 5.1CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

Product status

Default status
unaffected

Any version before 3.8.20
affected

3.9.0 before 3.9.20
affected

3.10.0 before 3.10.15
affected

3.11.0 before 3.11.10
affected

3.12.0 before 3.12.5
affected

3.13.0a1 before 3.13.0rc1
affected

Credits

Ellie reporter

References

github.com/python/cpython/pull/122134 patch

github.com/python/cpython/issues/122133 issue-tracking

mail.python.org/.../thread/WYKDQWIERRE2ICIYMSVRZJO33GSCWU2B/ vendor-advisory

www.openwall.com/lists/oss-security/2024/07/29/3

github.com/...ommit/06fa244666ec6335a3b9bf2367e31b42b9a89b20 patch

github.com/...ommit/0b65c8bf5367625673eafb92f85046a1b31259f2 patch

github.com/...ommit/220e31adeaaa8436c9ff234cba1398bc49e2bb6c patch

github.com/...ommit/5f90abaa786f994db3907fc31e2ee00ea2cf0929 patch

github.com/...ommit/b252317956b7fc035bb3774ef6a177e227f9fc54 patch

github.com/...ommit/2621a8a40ba4b2c68ca564671b7daa5da80a4508 patch

github.com/...ommit/5df322e91a40909e6904bbdbc0c3a6b6a9eead39 patch

github.com/...ommit/c21a36112a0028d7ac3cf8f480e0dc88dba5922c patch

github.com/...ommit/f071f01b7b7e19d7d6b3a4b0ec62f820ecb14660 patch

github.com/...ommit/31302f5fc24eecd693f0c8aaba7c2840b09b594d patch

github.com/...ommit/3f5d9d12c74787fbf3f5891835c85cc15526c86d patch

github.com/...ommit/c5655aa6ad120d2ed7f255bebd6e8b71a9c07dde patch

github.com/...ommit/e319f774f9e766a2b92949444a2d46081df3363a patch

cve.org (CVE-2024-3219)

nvd.nist.gov (CVE-2024-3219)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-3219

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.