跳转到帖子

SUSE: CVE-2024-12254: SUSE Linux Security Advisory

recommended_posts

发布于
  • Members

SUSE: CVE-2024-12254: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:L/AC:M/Au:N/C:P/I:P/A:P)
Published
12/06/2024
Created
01/10/2025
Added
01/09/2025
Modified
01/09/2025

Description

Starting in Python 3.12.0, the asyncio._SelectorSocketTransport.writelines() method would not "pause" writing and signal to the Protocol to drain the buffer to the wire once the write buffer reached the "high-water mark". Because of this, Protocols would not periodically drain the write buffer potentially leading to memory exhaustion. This vulnerability likely impacts a small number of users, you must be using Python 3.12.0 or later, on macOS or Linux, using the asyncio module with protocols, and using .writelines() method which had new zero-copy-on-write behavior in Python 3.12.0 and later. If not all of these factors are true then your usage of Python is unaffected.

Solution(s)

  • suse-upgrade-libpython3_12-1_0
  • suse-upgrade-libpython3_12-1_0-32bit
  • suse-upgrade-python312
  • suse-upgrade-python312-32bit
  • suse-upgrade-python312-base
  • suse-upgrade-python312-base-32bit
  • suse-upgrade-python312-curses
  • suse-upgrade-python312-dbm
  • suse-upgrade-python312-devel
  • suse-upgrade-python312-doc
  • suse-upgrade-python312-doc-devhelp
  • suse-upgrade-python312-idle
  • suse-upgrade-python312-testsuite
  • suse-upgrade-python312-tk
  • suse-upgrade-python312-tools

References

  • https://attackerkb.com/topics/cve-2024-12254
  • CVE - 2024-12254
  • 查看数 697
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。

游客
回帖…