CVE-2024-3219

Source
https://cve.org/CVERecord?id=CVE-2024-3219
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-3219.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-3219
Aliases
Downstream
Published
2024-07-29T21:54:05.830Z
Modified
2026-05-18T05:58:51.175178662Z
Severity
  • 5.1 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
Pure-Python fallback of socket.socketpair() doesn’t authenticate peer connection
Details

The “socket” module provides a pure-Python fallback to the socket.socketpair() function for platforms that don’t support AFUNIX, such as Windows. This pure-Python implementation uses AFINET or AF_INET6 to create a local connected pair of sockets. The connection between the two sockets was not verified before passing the two sockets back to the user, which leaves the server socket vulnerable to a connection race from a malicious local peer.

Platforms that support AF_UNIX such as Linux and macOS are not affected by this vulnerability. Versions prior to CPython 3.5 are not affected due to the vulnerable API not being included.

Database specific
{
    "cna_assigner": "PSF",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/3xxx/CVE-2024-3219.json"
}
References

Affected packages

Git / github.com/python/cpython

Affected ranges

Type
GIT
Repo
https://github.com/python/cpython
Events

Affected versions

v3.*
v3.13.0b1
v3.13.0b2
v3.13.0b3
v3.13.0b4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-3219.json"