CVE Vulnerabilities

CVE-2024-5642

Published: Jun 27, 2024 | Modified: Oct 07, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
2.7 LOW
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
Ubuntu
LOW

CPython 3.9 and earlier doesnt disallow configuring an empty list ([]) for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).

Affected Software

Name Vendor Start Version End Version
Red Hat Enterprise Linux 8 RedHat python39:3.9-8100020251126112422.d47b87a4 *
Red Hat Enterprise Linux 8 RedHat python39-devel:3.9-8100020251126112422.d47b87a4 *
Red Hat Enterprise Linux 9 RedHat python3.9-0:3.9.25-2.el9_7 *
Red Hat Enterprise Linux 9 RedHat python3.9-0:3.9.25-2.el9_7 *
Red Hat Discovery 2 RedHat discovery/discovery-server-rhel9:sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf *
Red Hat Discovery 2 RedHat discovery/discovery-ui-rhel9:sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee *
Red Hat Update Infrastructure 5 RedHat rhui5/cds-rhel9:sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be *
Red Hat Update Infrastructure 5 RedHat rhui5/haproxy-rhel9:sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16 *
Red Hat Update Infrastructure 5 RedHat rhui5/installer-rhel9:sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9 *
Red Hat Update Infrastructure 5 RedHat rhui5/rhua-rhel9:sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2 *
Python2.7 Ubuntu focal *
Python2.7 Ubuntu trusty/esm *
Python3.11 Ubuntu mantic *
Python3.12 Ubuntu mantic *
Python3.4 Ubuntu trusty/esm *
Python3.5 Ubuntu esm-infra/xenial *
Python3.5 Ubuntu trusty/esm *
Python3.8 Ubuntu upstream *
Python3.9 Ubuntu focal *

References