First published: Thu Jun 27 2024(Updated: )
CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.set_npn_protocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).
Credit: cna@python.org
Affected Software | Affected Version | How to fix |
---|---|---|
CPython | <3.9 | |
OpenSSL libcrypto |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-5642 is classified as low.
To fix CVE-2024-5642, ensure that your application does not configure an empty list for SSLContext.set_npn_protocols().
CVE-2024-5642 affects CPython versions 3.9 and earlier.
CVE-2024-5642 results in a buffer over-read when NPN is used due to an invalid value.
Yes, CVE-2024-5642 is related to OpenSSL, as it affects the underlying API used in conjunction with SSLContext.