Inefficient Regular Expression Complexity Affecting python39-six package, versions <0:1.15.0-3.module+el8.9.0+90016+9c2d6573
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ORACLE8-PYTHON39SIX-8305762
- published 26 Oct 2024
- disclosed 3 Sep 2024
Introduced: 3 Sep 2024
CVE-2024-6232 Open this link in a new tabHow to fix?
Upgrade Oracle:8
python39-six
to version 0:1.15.0-3.module+el8.9.0+90016+9c2d6573 or higher.
This issue was patched in ELSA-2024-8359
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream python39-six
package and not the python39-six
package as distributed by Oracle
.
See How to fix?
for Oracle:8
relevant fixed versions and status.
There is a MEDIUM severity vulnerability affecting CPython.
Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
References
- https://linux.oracle.com/cve/CVE-2024-6232.html
- https://linux.oracle.com/errata/ELSA-2024-6975.html
- https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06
- https://github.com/python/cpython/commit/743acbe872485dc18df4d8ab2dc7895187f062c4
- https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf
- https://github.com/python/cpython/commit/ed3a49ea734ada357ff4442996fd4ae71d253373
- https://github.com/python/cpython/issues/121285
- https://github.com/python/cpython/pull/121286
- https://mail.python.org/archives/list/security-announce@python.org/thread/JRYFTPRHZRTLMZLWQEUHZSJXNHM4ACTY/
- https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d
- https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877