DEBIAN-CVE-2024-5642

Source
https://security-tracker.debian.org/tracker/CVE-2024-5642
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-5642.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-5642
Upstream
Published
2024-06-27T21:15:16Z
Modified
2025-09-19T06:06:34Z
Summary
[none]
Details

CPython 3.9 and earlier doesn't disallow configuring an empty list ("[]") for SSLContext.setnpnprotocols() which is an invalid value for the underlying OpenSSL API. This results in a buffer over-read when NPN is used (see CVE-2024-5535 for OpenSSL). This vulnerability is of low severity due to NPN being not widely used and specifying an empty list likely being uncommon in-practice (typically a protocol name would be configured).

References

Affected packages

Debian:12 / pypy3

Package

Name
pypy3
Purl
pkg:deb/debian/pypy3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.10+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / pypy3

Package

Name
pypy3
Purl
pkg:deb/debian/pypy3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.10+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / pypy3

Package

Name
pypy3
Purl
pkg:deb/debian/pypy3?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.3.10+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}