vulnerability
Red Hat: CVE-2022-48560: python: use after free in heappushpop() of heapq module (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:N/A:C) | 08/22/2023 | 01/11/2024 | 05/23/2024 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
08/22/2023
Added
01/11/2024
Modified
05/23/2024
Description
A use-after-free exists in Python through 3.9 via heappushpop in heapq.
Solution(s)
redhat-upgrade-babelredhat-upgrade-cython-debugsourceredhat-upgrade-numpy-debugsourceredhat-upgrade-platform-pythonredhat-upgrade-platform-python-debugredhat-upgrade-platform-python-develredhat-upgrade-python-coverage-debugsourceredhat-upgrade-python-lxml-debugsourceredhat-upgrade-python-nose-docsredhat-upgrade-python-psycopg2-debuginforedhat-upgrade-python-psycopg2-debugsourceredhat-upgrade-python-psycopg2-docredhat-upgrade-python-pymongo-debuginforedhat-upgrade-python-pymongo-debugsourceredhat-upgrade-python-sqlalchemy-docredhat-upgrade-python2redhat-upgrade-python2-attrsredhat-upgrade-python2-babelredhat-upgrade-python2-backportsredhat-upgrade-python2-backports-ssl_match_hostnameredhat-upgrade-python2-bsonredhat-upgrade-python2-bson-debuginforedhat-upgrade-python2-chardetredhat-upgrade-python2-coverageredhat-upgrade-python2-coverage-debuginforedhat-upgrade-python2-cythonredhat-upgrade-python2-cython-debuginforedhat-upgrade-python2-debugredhat-upgrade-python2-debuginforedhat-upgrade-python2-debugsourceredhat-upgrade-python2-develredhat-upgrade-python2-dnsredhat-upgrade-python2-docsredhat-upgrade-python2-docs-inforedhat-upgrade-python2-docutilsredhat-upgrade-python2-funcsigsredhat-upgrade-python2-idnaredhat-upgrade-python2-ipaddressredhat-upgrade-python2-jinja2redhat-upgrade-python2-libsredhat-upgrade-python2-lxmlredhat-upgrade-python2-lxml-debuginforedhat-upgrade-python2-markupsaferedhat-upgrade-python2-mockredhat-upgrade-python2-noseredhat-upgrade-python2-numpyredhat-upgrade-python2-numpy-debuginforedhat-upgrade-python2-numpy-docredhat-upgrade-python2-numpy-f2pyredhat-upgrade-python2-pipredhat-upgrade-python2-pip-wheelredhat-upgrade-python2-pluggyredhat-upgrade-python2-psycopg2redhat-upgrade-python2-psycopg2-debugredhat-upgrade-python2-psycopg2-debug-debuginforedhat-upgrade-python2-psycopg2-debuginforedhat-upgrade-python2-psycopg2-testsredhat-upgrade-python2-pyredhat-upgrade-python2-pygmentsredhat-upgrade-python2-pymongoredhat-upgrade-python2-pymongo-debuginforedhat-upgrade-python2-pymongo-gridfsredhat-upgrade-python2-pymysqlredhat-upgrade-python2-pysocksredhat-upgrade-python2-pytestredhat-upgrade-python2-pytest-mockredhat-upgrade-python2-pytzredhat-upgrade-python2-pyyamlredhat-upgrade-python2-pyyaml-debuginforedhat-upgrade-python2-requestsredhat-upgrade-python2-rpm-macrosredhat-upgrade-python2-scipyredhat-upgrade-python2-scipy-debuginforedhat-upgrade-python2-setuptoolsredhat-upgrade-python2-setuptools-wheelredhat-upgrade-python2-setuptools_scmredhat-upgrade-python2-sixredhat-upgrade-python2-sqlalchemyredhat-upgrade-python2-testredhat-upgrade-python2-tkinterredhat-upgrade-python2-toolsredhat-upgrade-python2-urllib3redhat-upgrade-python2-virtualenvredhat-upgrade-python2-wheelredhat-upgrade-python2-wheel-wheelredhat-upgrade-python3-debuginforedhat-upgrade-python3-debugsourceredhat-upgrade-python3-idleredhat-upgrade-python3-libsredhat-upgrade-python3-testredhat-upgrade-python3-tkinterredhat-upgrade-pyyaml-debugsourceredhat-upgrade-scipy-debugsource

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.