We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-6232

Regular-expression DoS when parsing TarFile headers



AssignerPSF
Reserved2024-06-20
Published2024-09-03
Updated2024-09-07

Description

There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.

Problem types

CWE-1333 Inefficient Regular Expression Complexity

Product status

Default status
0x4002ef8c10

Any version before 3.8.20
affected

3.9.0 before 3.9.20
affected

3.10.0 before 3.10.15
affected

3.11.0 before 3.11.10
affected

3.12.0 before 3.12.6
affected

3.13.0a1 before 3.13.0rc2
affected

Credits

Elias Joakim Myllymäki 0x4002ef8d10

Seth Larson 0x4002ef8d20

Seth Larson 0x4002ef8d30

Gregory P. Smith 0x4002ef8d40

References

https://github.com/python/cpython/pull/121286 patch

https://github.com/python/cpython/issues/121285 issue-tracking

https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/ vendor-advisory

https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06 patch

https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4 patch

https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf patch

https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373 patch

https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d patch

https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877 patch

cve.org CVE-2024-6232

nvd.nist.gov CVE-2024-6232

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-6232
Subscribe to our newsletter to learn more about our work.