First published: Mon Jul 29 2024(Updated: )
The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AF_UNIX, such as Windows. This pure-Python implementation uses AF_INET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer. Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.
Credit: cna@python.org
Affected Software | Affected Version | How to fix |
---|---|---|
CPython | >3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-3219 is considered a medium severity vulnerability due to potential risks associated with socket connections.
To fix CVE-2024-3219, upgrade to Python CPython version 3.6 or later where the vulnerability has been addressed.
CVE-2024-3219 affects Python CPython versions prior to 3.6 on platforms that do not support AF_UNIX.
CVE-2024-3219 is a vulnerability related to the socket module's implementation of socket pairs in Python.
CVE-2024-3219 could potentially be exploited in specific scenarios involving local socket communications, increasing the risk of data exposure.