CVE Vulnerabilities

CVE-2024-6232

Inefficient Regular Expression Complexity

Published: Sep 03, 2024 | Modified: Nov 03, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

There is a MEDIUM severity vulnerability affecting CPython.

Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.

Weakness

The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles.

Affected Software

NameVendorStart VersionEnd Version
PythonPython*3.8.20 (excluding)
PythonPython3.9.0 (including)3.9.20 (excluding)
PythonPython3.10.0 (including)3.10.15 (excluding)
PythonPython3.11.0 (including)3.11.10 (excluding)
PythonPython3.12.0 (including)3.12.6 (excluding)
PythonPython3.13.0-alpha0 (including)3.13.0-alpha0 (including)
PythonPython3.13.0-alpha1 (including)3.13.0-alpha1 (including)
PythonPython3.13.0-alpha2 (including)3.13.0-alpha2 (including)
PythonPython3.13.0-alpha3 (including)3.13.0-alpha3 (including)
PythonPython3.13.0-alpha4 (including)3.13.0-alpha4 (including)
PythonPython3.13.0-alpha5 (including)3.13.0-alpha5 (including)
PythonPython3.13.0-alpha6 (including)3.13.0-alpha6 (including)
PythonPython3.13.0-beta1 (including)3.13.0-beta1 (including)
PythonPython3.13.0-beta2 (including)3.13.0-beta2 (including)
PythonPython3.13.0-beta3 (including)3.13.0-beta3 (including)
PythonPython3.13.0-beta4 (including)3.13.0-beta4 (including)
PythonPython3.13.0-rc1 (including)3.13.0-rc1 (including)
Red Hat Enterprise Linux 7.7 Advanced Update SupportRedHatpython3-0:3.6.8-10.el7_7.1*
Red Hat Enterprise Linux 7 Extended Lifecycle SupportRedHatpython3-0:3.6.8-21.el7_9.1*
Red Hat Enterprise Linux 8RedHatpython3-0:3.6.8-67.el8_10*
Red Hat Enterprise Linux 8RedHatpython39:3.9-8100020240927003152.d47b87a4*
Red Hat Enterprise Linux 8RedHatpython39-devel:3.9-8100020240927003152.d47b87a4*
Red Hat Enterprise Linux 8RedHatpython3.12-0:3.12.6-1.el8_10*
Red Hat Enterprise Linux 8RedHatpython3.11-0:3.11.10-1.el8_10*
Red Hat Enterprise Linux 8RedHatpython3-0:3.6.8-67.el8_10*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatpython39:3.9-8040020241017072554.63cd9eba*
Red Hat Enterprise Linux 8.4 Telecommunications Update ServiceRedHatpython39:3.9-8040020241017072554.63cd9eba*
Red Hat Enterprise Linux 8.4 Update Services for SAP SolutionsRedHatpython39:3.9-8040020241017072554.63cd9eba*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatpython39:3.9-8060020241017081122.6a631399*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatpython39:3.9-8060020241017081122.6a631399*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatpython39:3.9-8060020241017081122.6a631399*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatpython3.11-0:3.11.2-2.el8_8.4*
Red Hat Enterprise Linux 8.8 Extended Update SupportRedHatpython39:3.9-8080020241016061730.93c2fc2f*
Red Hat Enterprise Linux 9RedHatpython3.11-0:3.11.7-1.el9_4.6*
Red Hat Enterprise Linux 9RedHatpython3.9-0:3.9.18-3.el9_4.6*
Red Hat Enterprise Linux 9RedHatpython3.12-0:3.12.1-4.el9_4.4*
Red Hat Enterprise Linux 9RedHatpython3.11-0:3.11.9-7.el9_5.1*
Red Hat Enterprise Linux 9RedHatpython3.12-0:3.12.5-2.el9_5.1*
Red Hat Enterprise Linux 9RedHatpython3.9-0:3.9.19-8.el9_5.1*
Red Hat Enterprise Linux 9RedHatpython3.9-0:3.9.18-3.el9_4.6*
Red Hat Enterprise Linux 9RedHatpython3.9-0:3.9.19-8.el9_5.1*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatpython3.9-0:3.9.10-4.el9_0.6*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatpython3.9-0:3.9.16-1.el9_2.8*
Red Hat Enterprise Linux 9.2 Extended Update SupportRedHatpython3.11-0:3.11.2-2.el9_2.6*
Python2.7Ubuntubionic*
Python2.7Ubuntuesm-apps/focal*
Python2.7Ubuntuesm-apps/jammy*
Python2.7Ubuntuesm-infra-legacy/trusty*
Python2.7Ubuntuesm-infra/xenial*
Python2.7Ubuntufocal*
Python2.7Ubuntujammy*
Python2.7Ubuntutrusty*
Python2.7Ubuntutrusty/esm*
Python2.7Ubuntuxenial*
Python3.10Ubuntujammy*
Python3.10Ubuntuupstream*
Python3.11Ubuntuesm-apps/jammy*
Python3.11Ubuntujammy*
Python3.11Ubuntuupstream*
Python3.12Ubuntunoble*
Python3.12Ubuntuupstream*
Python3.13Ubuntuupstream*
Python3.4Ubuntuesm-infra-legacy/trusty*
Python3.4Ubuntutrusty*
Python3.4Ubuntutrusty/esm*
Python3.5Ubuntuesm-infra-legacy/trusty*
Python3.5Ubuntuesm-infra/xenial*
Python3.5Ubuntutrusty*
Python3.5Ubuntutrusty/esm*
Python3.5Ubuntuxenial*
Python3.6Ubuntubionic*
Python3.6Ubuntuesm-infra/bionic*
Python3.7Ubuntubionic*
Python3.7Ubuntuesm-apps/bionic*
Python3.8Ubuntubionic*
Python3.8Ubuntuesm-apps/bionic*
Python3.8Ubuntuesm-infra/focal*
Python3.8Ubuntufocal*
Python3.8Ubuntuupstream*
Python3.9Ubuntuesm-apps/focal*
Python3.9Ubuntufocal*
Python3.9Ubuntuupstream*

Extended Description

	  Attackers can create crafted inputs that
	  intentionally cause the regular expression to use
	  excessive backtracking in a way that causes the CPU
	  consumption to spike.

Potential Mitigations

References