CPython 3.9 and earlier doesnt disallow configuring an empty list ([]) for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Red Hat Enterprise Linux 8 | RedHat | python39:3.9-8100020251126112422.d47b87a4 | * |
| Red Hat Enterprise Linux 8 | RedHat | python39-devel:3.9-8100020251126112422.d47b87a4 | * |
| Red Hat Enterprise Linux 9 | RedHat | python3.9-0:3.9.25-2.el9_7 | * |
| Red Hat Enterprise Linux 9 | RedHat | python3.9-0:3.9.25-2.el9_7 | * |
| Red Hat Discovery 2 | RedHat | discovery/discovery-server-rhel9:sha256:d4e8987a100ea60942306f1564679e51fa1364f6124fbfb3100959f83a1f16bf | * |
| Red Hat Discovery 2 | RedHat | discovery/discovery-ui-rhel9:sha256:899bd7f941512d54af8ab369ca03028a7d27d05887ccce24bc12c7ccd3e4dbee | * |
| Red Hat Update Infrastructure 5 | RedHat | rhui5/cds-rhel9:sha256:87d268fd03fa0063620a043b43bce078144e06849ca6b83fd0e375c13ecb15be | * |
| Red Hat Update Infrastructure 5 | RedHat | rhui5/haproxy-rhel9:sha256:c0cb48d44556c064626eab0d70e5f427ac132bbd921342dcb862267413bf8d16 | * |
| Red Hat Update Infrastructure 5 | RedHat | rhui5/installer-rhel9:sha256:e1d64fbd0e4b90259d9fbb94736ed74c7c384d13067c6bbbb107c664683cb1a9 | * |
| Red Hat Update Infrastructure 5 | RedHat | rhui5/rhua-rhel9:sha256:4642951a6a57511f8b481a6481fcd417fc7f3de86511cdab28b9b89639c2bdb2 | * |
| Python2.7 | Ubuntu | focal | * |
| Python2.7 | Ubuntu | trusty/esm | * |
| Python3.11 | Ubuntu | mantic | * |
| Python3.12 | Ubuntu | mantic | * |
| Python3.4 | Ubuntu | trusty/esm | * |
| Python3.5 | Ubuntu | esm-infra/xenial | * |
| Python3.5 | Ubuntu | trusty/esm | * |
| Python3.8 | Ubuntu | upstream | * |
| Python3.9 | Ubuntu | focal | * |