Inefficient Regular Expression Complexity Affecting python3.12-test package, versions <0:3.12.5-2.el9_5.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALMALINUX9-PYTHON312TEST-8304926
- published 25 Oct 2024
- disclosed 12 Nov 2024
Introduced: 25 Oct 2024
New CVE-2024-6232 Open this link in a new tabHow to fix?
Upgrade AlmaLinux:9
python3.12-test
to version 0:3.12.5-2.el9_5.1 or higher.
This issue was patched in ALSA-2024:9451
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python3.12-test
package and not the python3.12-test
package as distributed by AlmaLinux
.
See How to fix?
for AlmaLinux:9
relevant fixed versions and status.
There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
References
- https://errata.almalinux.org/8/ALSA-2024-6975.html
- https://errata.almalinux.org/8/ALSA-2024-8359.html
- https://errata.almalinux.org/9/ALSA-2024-8374.html
- https://errata.almalinux.org/9/ALSA-2024-8446.html
- https://errata.almalinux.org/9/ALSA-2024-8447.html
- https://errata.almalinux.org/8/ALSA-2024-8836.html
- https://errata.almalinux.org/8/ALSA-2024-8838.html
- https://errata.almalinux.org/9/ALSA-2024-9450.html
- https://errata.almalinux.org/9/ALSA-2024-9451.html
- https://errata.almalinux.org/9/ALSA-2024-9468.html
- https://access.redhat.com/security/cve/CVE-2024-6232
- https://access.redhat.com/errata/RHSA-2024:6975
- https://access.redhat.com/errata/RHSA-2024:8359
- https://access.redhat.com/errata/RHSA-2024:8374
- https://access.redhat.com/errata/RHSA-2024:8446
- https://access.redhat.com/errata/RHSA-2024:8447
- https://access.redhat.com/errata/RHSA-2024:8836
- https://access.redhat.com/errata/RHSA-2024:8838
- https://access.redhat.com/errata/RHSA-2024:9450
- https://access.redhat.com/errata/RHSA-2024:9451
- https://access.redhat.com/errata/RHSA-2024:9468
- https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
- https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
- https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
- https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
- https://github.com/python/cpython/issues/121285
- https://github.com/python/cpython/pull/121286
- https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
- https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
- https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877
- http://www.openwall.com/lists/oss-security/2024/09/03/5
- https://security.netapp.com/advisory/ntap-20241018-0007/