The "profiling.sampling" module (Python 3.15+) and "asyncio introspection capabilities" (3.14+, "python -m asyncio ps" and "python -m asyncio pstree") features could be used to read and write addresses in a privileged process if that process connected to a malicious or "infected" Python process via the remote debugging feature. This vulnerability requires persistently and repeatedly connecting to the process to be exploited, even after the connecting process crashes with high likelihood due to ASLR.
| Vendor | Product | Versions |
|---|---|---|
| python software foundation | python | 3.14.0 |
Downstream vendors/products affected by this vulnerability
| Vendor | Product | Source | Confidence |
|---|---|---|---|
| open source | python | cert_advisory | 90% |
Updated description to include remote debugging context, added affected version 3.14.1, and marked exploit availability and active exploitation as true.
Updated severity to CRITICAL, added new description detailing stack-based buffer overflow, and corrected vendor and product names.
Initial creation