Use After Free Affecting python3-uamqp package, versions <1.5.3-150100.4.13.1


Severity

Recommended
0.0
high
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.21% (60th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Use After Free vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SLES154-PYTHON3UAMQP-6263870
  • published23 Feb 2024
  • disclosed22 Feb 2024

Introduced: 22 Feb 2024

CVE-2024-25110  (opens in a new tab)
CWE-416  (opens in a new tab)

How to fix?

Upgrade SLES:15.4 python3-uamqp to version 1.5.3-150100.4.13.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream python3-uamqp package and not the python3-uamqp package as distributed by SLES. See How to fix? for SLES:15.4 relevant fixed versions and status.

The UAMQP is a general purpose C library for AMQP 1.0. During a call to open_get_offered_capabilities, a memory allocation may fail causing a use-after-free issue and if a client called it during connection communication it may cause a remote code execution. Users are advised to update the submodule with commit 30865c9c. There are no known workarounds for this vulnerability.

CVSS Scores

version 3.1