-------- Forwarded Message --------
Subject:        [Security-announce] [CVE-2024-3219] Pure-Python fallback of 
socket.socketpair() doesn’t authenticate peer connection
Date:   Mon, 29 Jul 2024 16:54:59 -0500
From:   Seth Larson <s...@python.org>
Reply-To:       security-...@python.org
To:     security-annou...@python.org



There is a MEDIUM severity vulnerability affecting CPython.

The “socket” module provides a pure-Python fallback to the socket.socketpair() 
function for platforms that don’t support AF_UNIX, such as Windows. This 
pure-Python implementation uses AF_INET or AF_INET6 to create a local connected 
pair of sockets. The connection between the two sockets was not verified before 
passing the two sockets back to the user, which leaves the server socket 
vulnerable to a connection race from a malicious local peer.

Platforms that support AF_UNIX such as Linux and macOS are not affected by this 
vulnerability. Versions prior to CPython 3.5 are not affected due to the 
vulnerable API not being included.

Please see the linked CVE ID for the latest information on affected versions:

* https://www.cve.org/CVERecord?id=CVE-2024-3219 
<https://www.cve.org/CVERecord?id=CVE-2024-3219>
* https://github.com/python/cpython/pull/122134 
<https://github.com/python/cpython/pull/122134>
* https://github.com/python/cpython/issues/122133 
<https://github.com/python/cpython/issues/122133>

Reply via email to