Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-5642
HistoryJun 27, 2024 - 9:15 p.m.

CVE-2024-5642

2024-06-2721:15:16
Debian Security Bug Tracker
security-tracker.debian.org
5
cpython 3.9
sslcontext
buffer over-read
npn
openssl api
vulnerability
low severity
protocol name configured
unix

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%

CPython 3.9 and earlier doesn’t disallow configuring an empty list (“[]”) for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).

6.6 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

15.7%