We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-6232

Regular-expression DoS when parsing TarFile headers



Description

There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.

Reserved 2024-06-20 | Published 2024-09-03 | Updated 2024-12-04 | Assigner PSF

Problem types

CWE-1333 Inefficient Regular Expression Complexity

Product status

Default status
unaffected

Any version before 3.8.20
affected

3.9.0 before 3.9.20
affected

3.10.0 before 3.10.15
affected

3.11.0 before 3.11.10
affected

3.12.0 before 3.12.6
affected

3.13.0a1 before 3.13.0rc2
affected

Credits

Elias Joakim Myllymäki reporter

Seth Larson coordinator

Seth Larson remediation developer

Gregory P. Smith remediation reviewer

References

github.com/python/cpython/pull/121286 patch

github.com/python/cpython/issues/121285 issue-tracking

mail.python.org/.../thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ vendor-advisory

github.com/...ommit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06 patch

github.com/...ommit/743acbe872485dc18df4d8ab2dc7895187f062c4 patch

github.com/...ommit/d449caf8a179e3b954268b3a88eb9170be3c8fbf patch

github.com/...ommit/ed3a49ea734ada357ff4442996fd4ae71d253373 patch

github.com/...ommit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d patch

github.com/...ommit/b4225ca91547aa97ed3aca391614afbb255bc877 patch

cve.org (CVE-2024-6232)

nvd.nist.gov (CVE-2024-6232)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-6232

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.