You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Introduced through: root@* › [email protected]
Fix: Upgrade gevent to version 24.10.1
Security information
Factors contributing to the scoring:
Snyk: [CVSS v4.0 8.3](https://security.snyk.io/vuln/SNYK-PYTHON-GEVENT-8320934) - High Severity | [CVSS v3.1 6.5](https://security.snyk.io/vuln/SNYK-PYTHON-GEVENT-8320934) - Medium Severity
NVD: NVD only publishes analysis of vulnerabilities which are assigned a CVE ID. This vulnerability currently does not have an assigned CVE ID.
Why are the scores different? Learn how Snyk evaluates vulnerability scores
Overview
Affected versions of this package are vulnerable to Race Condition when the fallback socketpair implementation is used on platforms that lack native support and the vulnerable function does not properly authenticate the connected sockets. An attacker must be able to predict the address and port and establish a connection before the legitimate client.
The text was updated successfully, but these errors were encountered:
Introduced through
[email protected]
Fixed in
[email protected]
Detailed paths and remediation
Security information
Factors contributing to the scoring:
Why are the scores different? Learn how Snyk evaluates vulnerability scores
Overview
Affected versions of this package are vulnerable to Race Condition when the fallback socketpair implementation is used on platforms that lack native support and the vulnerable function does not properly authenticate the connected sockets. An attacker must be able to predict the address and port and establish a connection before the legitimate client.
The text was updated successfully, but these errors were encountered: