CVE-2024-6232
There is a MEDIUM severity vulnerability affecting CPython. Regular expressions that allowed excessive backtracking during tarfile.TarFile header parsing are vulnerable to ReDoS via specifically-crafted tar archives.
- T
Tim Bastin detected CVE-2024-6232 with a risk of 3.45
- T
Tim Bastin fixed CVE-2024-6232
- T
Tim Bastin detected CVE-2024-6232 with a risk of 3.45
System updated the risk assessment to 1.72
System recalculated raw risk assessment
System updated the risk assessment to 3.45
System recalculated raw risk assessment
System updated the risk assessment to 1.72
System recalculated raw risk assessment
System updated the risk assessment from 1.72 to 0.86
System recalculated raw risk assessment
System updated the risk assessment from 0.86 to 1.72
System recalculated raw risk assessment
System updated the risk assessment from 1.72 to 3.45
System recalculated raw risk assessment
System updated the risk assessment from 3.45 to 1.72
System recalculated raw risk assessment
System detected CVE-2024-6232 with scanner: container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning
System fixed CVE-2024-6232
System detected CVE-2024-6232 with a risk of 1.72
System removed scanner: container-scanning
System detected CVE-2024-6232 with scanner: container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning github.com/l3montree-dev/devguard/cmd/devguard-scanner/container-scanning
System fixed CVE-2024-6232
System detected CVE-2024-6232 with a risk of 1.72
- T
Tim Bastin fixed CVE-2024-6232
System updated the risk assessment from 1.72 to 3.45
System recalculated raw risk assessment
Reopen this vulnerability
Affected component
debian/python3.11