First published: Mon Jul 13 2020(Updated: )
In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation. Reference: <a href="https://bugs.python.org/issue39017">https://bugs.python.org/issue39017</a> Upstream commit: <a href="https://github.com/python/cpython/pull/21454">https://github.com/python/cpython/pull/21454</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Python Babel Localedata | <3.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1856481 is high due to the potential for denial of service through an infinite loop.
To fix REDHAT-BUG-1856481, upgrade Python to version 3.8.4 or later where the vulnerability is addressed.
Users of Python versions prior to 3.8.4 are affected by REDHAT-BUG-1856481.
The issue in REDHAT-BUG-1856481 is caused by a lack of header validation in the tarfile module's _proc_pax function.
A workaround for REDHAT-BUG-1856481 includes avoiding the use of tarfile.open with untrusted TAR archives until the software is updated.