CVE-2024-11168

Publication date 12 November 2024

Last updated 30 May 2025


Ubuntu priority

Cvss 3 Severity Score

3.7 · Low

Score breakdown

The urllib.parse.urlsplit() and urlparse() functions improperly validated bracketed hosts (`[]`), allowing hosts that weren't IPv6 or IPvFuture. This behavior was not conformant to RFC 3986 and potentially enabled SSRF if a URL is processed by more than one URL parser.

Status

Package Ubuntu Release Status
python2.7 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Fixed 2.7.18-13ubuntu1.5+esm5
20.04 LTS focal
Fixed 2.7.18-1~20.04.7+esm6
18.04 LTS bionic
Fixed 2.7.17-1~18.04ubuntu1.13+esm10
16.04 LTS xenial
Fixed 2.7.12-1ubuntu0~16.04.18+esm15
14.04 LTS trusty
Fixed 2.7.6-8ubuntu0.6+esm24
python3.10 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Fixed 3.10.12-1~22.04.8
20.04 LTS focal Not in release
python3.11 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy
Fixed 3.11.0~rc1-1~22.04.1~esm2
20.04 LTS focal Not in release
python3.12 25.04 plucky Not in release
24.10 oracular
Not affected
24.04 LTS noble
Not affected
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
python3.13 25.04 plucky
Not affected
24.10 oracular
Not affected
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
python3.4 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
14.04 LTS trusty
Fixed 3.4.3-1ubuntu1~14.04.7+esm14
python3.5 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
16.04 LTS xenial
Fixed 3.5.2-2ubuntu0~16.04.13+esm16
14.04 LTS trusty
Fixed 3.5.2-2ubuntu0~16.04.4~14.04.1+esm4
python3.6 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic
Fixed 3.6.9-1~18.04ubuntu1.13+esm3
python3.7 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal Not in release
18.04 LTS bionic
Fixed 3.7.5-2ubuntu1~18.04.2+esm4
python3.8 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 3.8.10-0ubuntu1~20.04.14
18.04 LTS bionic
Fixed 3.8.0-3ubuntu1~18.04.2+esm3
python3.9 25.04 plucky Not in release
24.10 oracular Not in release
24.04 LTS noble Not in release
22.04 LTS jammy Not in release
20.04 LTS focal
Fixed 3.9.5-3ubuntu0~20.04.1+esm3

Get expanded security coverage with Ubuntu Pro

Reduce your average CVE exposure time from 98 days to 1 day with expanded CVE patching, ten-years security maintenance and optional support for the full stack of open-source applications. Free for personal use.

Get Ubuntu Pro

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
python3.10
python3.11
python3.12
python3.6
python3.7
python3.8
python3.9

Severity score breakdown

Parameter Value
Base score 3.7 · Low
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact Low
Availability impact None
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

References

Related Ubuntu Security Notices (USN)

Other references