CVE-2024-4032 Affecting python3.12-devel package, versions <0:3.12.5-2.el9
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-PYTHON312DEVEL-8383963
- published 19 Nov 2024
- disclosed 12 Nov 2024
How to fix?
Upgrade AlmaLinux:9
python3.12-devel
to version 0:3.12.5-2.el9 or higher.
This issue was patched in ALSA-2024:9190
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.12-devel
package and not the python3.12-devel
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries.
CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
References
- https://errata.almalinux.org/9/ALSA-2024-4766.html
- https://errata.almalinux.org/9/ALSA-2024-4779.html
- https://errata.almalinux.org/8/ALSA-2024-5962.html
- https://errata.almalinux.org/8/ALSA-2024-6961.html
- https://errata.almalinux.org/8/ALSA-2024-6962.html
- https://errata.almalinux.org/8/ALSA-2024-6975.html
- https://errata.almalinux.org/9/ALSA-2024-9190.html
- https://access.redhat.com/security/cve/CVE-2024-4032
- https://access.redhat.com/errata/RHSA-2024:4766
- https://access.redhat.com/errata/RHSA-2024:4779
- https://access.redhat.com/errata/RHSA-2024:5962
- https://access.redhat.com/errata/RHSA-2024:6961
- https://access.redhat.com/errata/RHSA-2024:6962
- https://access.redhat.com/errata/RHSA-2024:6975
- https://access.redhat.com/errata/RHSA-2024:9190
- http://www.openwall.com/lists/oss-security/2024/06/17/3
- https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f8
- https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69f
- https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d3
- https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332fb
- https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b651906
- https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee3
- https://github.com/python/cpython/issues/113171
- https://github.com/python/cpython/pull/113179
- https://mail.python.org/archives/list/security-announce@python.org/thread/NRUHDUS2IV2USIZM2CVMSFL6SCKU3RZA/
- https://security.netapp.com/advisory/ntap-20240726-0004/
- https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-registry.xhtml
- https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-registry.xhtml