CVE Vulnerabilities

CVE-2024-28863

Uncontrolled Resource Consumption

Published: Mar 21, 2024 | Modified: Dec 16, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
TarIsaacs*6.2.1 (excluding)
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-chains-controller-rhel8:v1.16.0-6*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-cli-tkn-rhel8:v1.16.0-7*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-console-plugin-rhel8:v1.16.0-52*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-controller-rhel8:v1.16.0-7*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-entrypoint-rhel8:v1.16.0-7*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-events-rhel8:v1.16.0-7*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-git-init-rhel8:v1.16.0-5*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-hub-api-rhel8:v1.16.0-3*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-hub-db-migration-rhel8:v1.16.0-3*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-hub-ui-rhel8:v1.16.0-3*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-manual-approval-gate-rhel8:v1.16.0-2*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-nop-rhel8:v1.16.0-7*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-operator-bundle:v1.16.0-42*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-operator-proxy-rhel8:v1.16.0-28*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-operator-webhook-rhel8:v1.16.0-28*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-pipelines-as-code-rhel8:v1.16.0-3*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-resolvers-rhel8:v1.16.0-7*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-results-api-rhel8:v1.16.0-6*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-results-retention-policy-agent-rhel8:v1.16.0-4*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-results-watcher-rhel8:v1.16.0-6*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-rhel8-operator:v1.16.0-28*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-serve-tkn-cli-rhel8:v1.16.0-5*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-triggers-controller-rhel8:v1.16.0-4*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-triggers-core-interceptors-rhel8:v1.16.0-5*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-triggers-eventlistenersink-rhel8:v1.16.0-5*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-triggers-webhook-rhel8:v1.16.0-5*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-webhook-rhel8:v1.16.0-7*
OpenShift-Pipelines-1.16-RHEL-8RedHatopenshift-pipelines/pipelines-workingdirinit-rhel8:v1.16.0-7*
Red Hat Developer Hub 1.2 on RHEL 9RedHatrhdh/rhdh-hub-rhel9:1.2-132*
Red Hat Enterprise Linux 8RedHatnodejs:20-8100020240808073736.489197e6*
Red Hat Enterprise Linux 8RedHatnodejs:18-8100020240807161023.489197e6*
Red Hat Enterprise Linux 9RedHatnodejs:18-9040020240807131341.rhel9*
Red Hat Migration Toolkit for Containers 1.8RedHatrhmtc/openshift-migration-ui-rhel8:v1.8.4-10*
RHODF-4.16-RHEL-9RedHatodf4/mcg-core-rhel9:v4.16.0-60*
RHODF-4.16-RHEL-9RedHatodf4/ocs-client-console-rhel9:v4.16.2-2*
RHODF-4.16-RHEL-9RedHatodf4/odf-console-rhel9:v4.16.2-2*
RHODF-4.16-RHEL-9RedHatodf4/odf-multicluster-console-rhel9:v4.16.2-2*
Node-tarUbuntuesm-apps/focal*
Node-tarUbuntuesm-apps/jammy*
Node-tarUbuntufocal*
Node-tarUbuntujammy*
Node-tarUbuntumantic*
Node-tarUbuntuupstream*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References