CVE-2024-6232

Source
https://cve.org/CVERecord?id=CVE-2024-6232
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6232.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-6232
Aliases
Downstream
Related
Published
2024-09-03T13:15:05.363Z
Modified
2026-02-08T04:15:38.751773Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

There is a MEDIUM severity vulnerability affecting CPython.

Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.

References

Affected packages

Git / github.com/python/cpython

Affected versions

v3.*
v3.10.0
v3.10.1
v3.10.10
v3.10.11
v3.10.12
v3.10.13
v3.10.14
v3.10.2
v3.10.3
v3.10.4
v3.10.5
v3.10.6
v3.10.7
v3.10.8
v3.10.9
v3.11.0
v3.11.1
v3.11.2
v3.11.3
v3.11.4
v3.11.5
v3.11.6
v3.11.7
v3.11.8
v3.11.9
v3.12.0
v3.12.1
v3.12.2
v3.12.3
v3.12.4
v3.12.5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-6232.json"