Vulnerability Description
The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global properties of the ipaddress.IPv4Address, ipaddress.IPv4Network, ipaddress.IPv6Address, and ipaddress.IPv6Network classes, where values wouldn’t be returned in accordance with the latest information from the IANA Special-Purpose Address Registries. CPython 3.12.4 and 3.13.0a6 contain updated information from these registries and thus have the intended behavior.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- http://www.openwall.com/lists/oss-security/2024/06/17/3
- https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f
- https://github.com/python/cpython/commit/40d75c2b7f5c67e254d0a025e0f2e2c7ada7f69
- https://github.com/python/cpython/commit/895f7e2ac23eff4743143beef0f0c5ac71ea27d
- https://github.com/python/cpython/commit/ba431579efdcbaed7a96f2ac4ea0775879a332f
- https://github.com/python/cpython/commit/c62c9e518b784fe44432a3f4fc265fb95b65190
- https://github.com/python/cpython/commit/f86b17ac511e68192ba71f27e752321a3252cee
- https://github.com/python/cpython/issues/113171
- https://github.com/python/cpython/pull/113179
- https://mail.python.org/archives/list/[email protected]/thread/NRUHDU
- https://security.netapp.com/advisory/ntap-20240726-0004/
- https://www.iana.org/assignments/iana-ipv4-special-registry/iana-ipv4-special-re
- https://www.iana.org/assignments/iana-ipv6-special-registry/iana-ipv6-special-re
- http://www.openwall.com/lists/oss-security/2024/06/17/3
- https://github.com/python/cpython/commit/22adf29da8d99933ffed8647d3e0726edd16f7f
FAQ
What is CVE-2024-4032?
CVE-2024-4032 is a vulnerability with a CVSS score of 7.5 (HIGH). The “ipaddress” module contained incorrect information about whether certain IPv4 and IPv6 addresses were designated as “globally reachable” or “private”. This affected the is_private and is_global pr...
How severe is CVE-2024-4032?
CVE-2024-4032 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-4032?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.