Bug 2293200 (CVE-2024-28863)
Summary: | CVE-2024-28863 node-tar: denial of service while parsing a tar file due to lack of folders depth validation | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | TEJ RATHI <trathi> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aazores, akostadi, amasferr, amctagga, anjoseph, asoldano, bbaranow, bbuckingham, bdettelb, bmaxwell, boliveir, brian.stansberry, caswilli, cbartlet, cdaley, cdewolf, chazlett, cmiranda, darran.lofthouse, dfreiber, dhanak, dkreling, dkuc, dmayorov, dosoudil, dpalmer, drichtar, drow, dsimansk, dymurray, eaguilar, ebaron, ecerquei, ehelms, fjansen, fjuma, ggainey, gkamathe, gmalinko, gparvin, gtanzill, hhorak, hkataria, ibek, ibolton, ivassile, iweiss, janstey, jburrell, jcantril, jchui, jkang, jkoehler, jkoops, jlledo, jmatthew, jmontleo, jorton, jpallich, jprabhak, jrokos, jshaughn, juwatts, jwendell, kaycoth, kingland, kshier, ktsao, kverlaen, lbainbri, lgao, matzew, mhulan, mkudlej, mmakovy, mnovotny, mosmerov, msochure, mstefank, msvehla, mulliken, nbecker, nboldt, njean, nmoumoul, nodejs-maint, nwallace, orabin, owatkins, pahickey, parichar, pcongius, pcreech, pdelbell, pdrozd, peholase, pgaikwad, pierdipi, pjindal, pmackay, pskopek, rcernich, rchan, rgarg, rguimara, rhaigner, rhuss, rjohnson, rmartinc, rowaters, rstancel, rstepani, rtaniwa, sdawley, sfroberg, sipoyare, slucidi, smaestri, sseago, sthorger, tasato, tjochec, tkral, tom.jenkinson, twalsh, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | node-tar 6.2.1 | Doc Type: | If docs needed, set a value |
Doc Text: |
A flaw was found in ISAACS's node-tar, where it is vulnerable to a denial of service, caused by the lack of folder count validation. The vulnerability exists due to the application not properly controlling the consumption of internal resources while parsing a tar file. By sending a specially crafted request, a remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2293210, 2293211, 2293212, 2293213, 2293214, 2293216, 2293217, 2293218, 2293219, 2293220, 2293221, 2293238, 2293255, 2293256, 2293257, 2293258, 2299178, 2299179, 2299180, 2310139, 2310140, 2310153, 2310154, 2311072, 2311074, 2311076, 2311078, 2311081, 2311082, 2311083, 2311084, 2311086 | ||
Bug Blocks: | 2293261 |
Description
TEJ RATHI
2024-06-20 09:18:22 UTC
Created nodejs18 tracking bugs for this issue: Affects: fedora-39 [bug 2293213] Affects: fedora-40 [bug 2293218] Created nodejs20 tracking bugs for this issue: Affects: fedora-39 [bug 2293214] Affects: fedora-40 [bug 2293219] Created nodejs:13/nodejs tracking bugs for this issue: Affects: epel-8 [bug 2293210] Created nodejs:16-epel/nodejs tracking bugs for this issue: Affects: epel-8 [bug 2293211] Created rstudio tracking bugs for this issue: Affects: fedora-39 [bug 2293216] Affects: fedora-40 [bug 2293220] Created yarnpkg tracking bugs for this issue: Affects: epel-8 [bug 2293212] Affects: fedora-39 [bug 2293217] Affects: fedora-40 [bug 2293221] This issue has been addressed in the following products: RHODF-4.16-RHEL-9 Via RHSA-2024:4591 https://access.redhat.com/errata/RHSA-2024:4591 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:5814 https://access.redhat.com/errata/RHSA-2024:5814 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:6147 https://access.redhat.com/errata/RHSA-2024:6147 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:6148 https://access.redhat.com/errata/RHSA-2024:6148 This issue has been addressed in the following products: RHODF-4.16-RHEL-9 Via RHSA-2024:6755 https://access.redhat.com/errata/RHSA-2024:6755 This issue has been addressed in the following products: Red Hat Migration Toolkit for Containers 1.8 Via RHSA-2024:7164 https://access.redhat.com/errata/RHSA-2024:7164 This issue has been addressed in the following products: Red Hat Satellite 6.16 for RHEL 8 Red Hat Satellite 6.16 for RHEL 9 Via RHSA-2024:8906 https://access.redhat.com/errata/RHSA-2024:8906 |