Name | CVE-2024-3219 |
Description | The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
pypy (PTS) | jessie | 2.4.0+dfsg-3 | vulnerable |
stretch | 5.6.0+dfsg-4 | vulnerable | |
buster | 7.0.0+dfsg-3 | vulnerable | |
bullseye | 7.3.3+dfsg-2 | vulnerable | |
python2.7 (PTS) | jessie, jessie (lts) | 2.7.9-2-ds1-1+deb8u12 | fixed |
stretch (security) | 2.7.13-2+deb9u6 | fixed | |
stretch (lts), stretch | 2.7.13-2+deb9u9 | fixed | |
buster (security), buster, buster (lts) | 2.7.16-2+deb10u4 | fixed | |
bullseye | 2.7.18-8+deb11u1 | fixed | |
python3.11 (PTS) | bookworm | 3.11.2-6+deb12u2 | fixed |
bookworm (security) | 3.11.2-6+deb12u3 | fixed | |
python3.12 (PTS) | trixie | 3.12.6-1 | fixed |
sid | 3.12.7-1 | fixed | |
python3.13 (PTS) | sid, trixie | 3.13.0-1 | fixed |
python3.9 (PTS) | bullseye | 3.9.2-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
pypy | source | jessie | (unfixed) | end-of-life | ||
pypy | source | (unstable) | (unfixed) | |||
python2.7 | source | (unstable) | (not affected) | |||
python3.11 | source | (unstable) | (not affected) | |||
python3.12 | source | (unstable) | (not affected) | |||
python3.13 | source | (unstable) | (not affected) | |||
python3.9 | source | (unstable) | (not affected) |
- python3.13 <not-affected> (Windows-specific)
- python3.12 <not-affected> (Windows-specific)
- python3.11 <not-affected> (Windows-specific)
- python3.9 <not-affected> (Windows-specific)
- python2.7 <not-affected> (Vulnerable code not present)
https://github.com/python/cpython/pull/122134
https://github.com/python/cpython/issues/122133
https://www.openwall.com/lists/oss-security/2024/07/29/3
3.9-branch: https://github.com/python/cpython/commit/06fa244666ec6335a3b9bf2367e31b42b9a89b20
3.10-branch: https://github.com/python/cpython/commit/0b65c8bf5367625673eafb92f85046a1b31259f2
3.11-branch: https://github.com/python/cpython/commit/5f90abaa786f994db3907fc31e2ee00ea2cf0929
3.12-branch: https://github.com/python/cpython/commit/220e31adeaaa8436c9ff234cba1398bc49e2bb6c
3.13-branch: https://github.com/python/cpython/commit/b252317956b7fc035bb3774ef6a177e227f9fc54
Only affects plattforms which do not support AF_UNIX.