CVE-2023-24535

NameCVE-2023-24535
DescriptionParsing invalid messages can panic. Parsing a text-format message which contains a potential number consisting of a minus sign, one or more characters of whitespace, and no further input will cause a panic.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python2.7 (PTS)buster2.7.16-2+deb10u1vulnerable
buster (security)2.7.16-2+deb10u3vulnerable
bullseye2.7.18-8vulnerable
python3.10 (PTS)sid3.10.13-1vulnerable
python3.11 (PTS)bookworm3.11.2-6vulnerable
sid, trixie3.11.5-3vulnerable
python3.12 (PTS)sid, trixie3.12.0~rc2-1vulnerable
python3.7 (PTS)buster3.7.3-2+deb10u3vulnerable
buster (security)3.7.3-2+deb10u5vulnerable
python3.9 (PTS)bullseye3.9.2-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python2.7source(unstable)(unfixed)unimportant
python3.10source(unstable)(unfixed)unimportant
python3.11source(unstable)(unfixed)unimportant
python3.12source(unstable)(unfixed)unimportant
python3.7source(unstable)(unfixed)unimportant
python3.9source(unstable)(unfixed)unimportant

Notes

https://github.com/python/cpython/issues/103800
Disputed upstream and not considered a security issue, negligible security impact

Search for package or bug name: Reporting problems