First published: Fri Dec 06 2024(Updated: )
Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | >=3.12.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2330804 is considered significant due to the potential impact on network communication in applications using Python 3.12.0.
To fix REDHAT-BUG-2330804, you should update Python to a version that contains the necessary patches addressing this issue.
REDHAT-BUG-2330804 affects systems running Python version 3.12.0 and later.
The writelines() method in asyncio._SelectorSocketTransport is impacted, which fails to properly signal when the write buffer is full.
Currently, there is no known effective workaround for REDHAT-BUG-2330804 aside from upgrading to a patched version.