Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2024-5642

Опубликовано: 27 июн. 2024
Источник: redhat
CVSS3: 2.7
EPSS Низкий

Описание

CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).

A vulnerability was found in Python/CPython that does not disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols(), which is an invalid value for the underlying OpenSSL API. This issue results in a buffer over-read when NPN is used. See CVE -2024-5535 for OpenSSL for more information.

Отчет

This vulnerability is rated with a Low severity due to NPN not being widely used and specifying an empty list is likely uncommon in practice. Typically, a protocol name would be configured.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10python3.12Not affected
Red Hat Enterprise Linux 6pythonOut of support scope
Red Hat Enterprise Linux 7pythonOut of support scope
Red Hat Enterprise Linux 7python3Out of support scope
Red Hat Enterprise Linux 8gimp:flatpak/python2Fix deferred
Red Hat Enterprise Linux 8inkscape:flatpak/python2Fix deferred
Red Hat Enterprise Linux 8python27:2.7/python2Fix deferred
Red Hat Enterprise Linux 8python3Not affected
Red Hat Enterprise Linux 8python3.11Not affected
Red Hat Enterprise Linux 8python3.12Not affected

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=2294682python: Invalid value for OpenSSL API may cause Buffer over-read when NPN is used

EPSS

Процентиль: 73%
0.00872
Низкий

2.7 Low

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 1 года назад

CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).

CVSS3: 6.5
nvd
больше 1 года назад

CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).

msrc
3 месяца назад

Buffer overread when using an empty list with SSLContext.set_npn_protocols()

CVSS3: 6.5
debian
больше 1 года назад

CPython 3.9 and earlier doesn't disallow configuring an empty list ("[ ...

suse-cvrf
около 1 года назад

Security update for python36

EPSS

Процентиль: 73%
0.00872
Низкий

2.7 Low

CVSS3