Bug 2384043 (CVE-2025-8194)

Summary: CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bbrownin, daisy82lopez, dfreiber, drow, jburrell, ljawale, luizcosta, nweather, rbobbitt, vkumar
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2384060, 2384071, 2384073, 2384061, 2384062, 2384063, 2384064, 2384066, 2384067, 2384068, 2384069, 2384070, 2384072, 2384074, 2384075, 2384076, 2384077, 2384078, 2384079, 2384080, 2384081    
Bug Blocks:    

Description OSIDB Bzimport 2025-07-28 19:01:13 UTC
There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. 

This vulnerability can be mitigated by including the following patch after importing the “tarfile” module:



import tarfile

def _block_patched(self, count):
    if count < 0:  # pragma: no cover
        raise tarfile.InvalidHeaderError("invalid offset")
    return _block_patched._orig_block(self, count)

_block_patched._orig_block = tarfile.TarInfo._block
tarfile.TarInfo._block = _block_patched

Comment 2 errata-xmlrpc 2025-08-26 01:01:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:14546 https://access.redhat.com/errata/RHSA-2025:14546

Comment 3 errata-xmlrpc 2025-08-26 02:05:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:14560 https://access.redhat.com/errata/RHSA-2025:14560

Comment 4 errata-xmlrpc 2025-08-28 08:36:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:14841 https://access.redhat.com/errata/RHSA-2025:14841

Comment 5 errata-xmlrpc 2025-08-28 16:56:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:14900 https://access.redhat.com/errata/RHSA-2025:14900

Comment 6 errata-xmlrpc 2025-09-02 02:57:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2025:14984 https://access.redhat.com/errata/RHSA-2025:14984

Comment 7 errata-xmlrpc 2025-09-02 03:55:29 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:15007 https://access.redhat.com/errata/RHSA-2025:15007

Comment 8 errata-xmlrpc 2025-09-02 04:03:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:15010 https://access.redhat.com/errata/RHSA-2025:15010

Comment 9 errata-xmlrpc 2025-09-02 05:48:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:15019 https://access.redhat.com/errata/RHSA-2025:15019

Comment 10 errata-xmlrpc 2025-09-04 13:05:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:15348 https://access.redhat.com/errata/RHSA-2025:15348

Comment 11 errata-xmlrpc 2025-09-04 16:30:04 UTC
This issue has been addressed in the following products:

  RHEL-8 based Middleware Containers

Via RHSA-2025:15358 https://access.redhat.com/errata/RHSA-2025:15358

Comment 12 errata-xmlrpc 2025-09-15 01:23:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:15724 https://access.redhat.com/errata/RHSA-2025:15724

Comment 13 errata-xmlrpc 2025-09-15 14:15:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:15800 https://access.redhat.com/errata/RHSA-2025:15800

Comment 14 errata-xmlrpc 2025-09-16 14:41:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:15968 https://access.redhat.com/errata/RHSA-2025:15968

Comment 15 errata-xmlrpc 2025-09-16 17:57:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:16012 https://access.redhat.com/errata/RHSA-2025:16012

Comment 16 errata-xmlrpc 2025-09-16 19:26:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:16016 https://access.redhat.com/errata/RHSA-2025:16016

Comment 17 errata-xmlrpc 2025-09-17 05:23:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:16031 https://access.redhat.com/errata/RHSA-2025:16031

Comment 18 errata-xmlrpc 2025-09-17 14:21:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:16062 https://access.redhat.com/errata/RHSA-2025:16062

Comment 19 errata-xmlrpc 2025-09-17 14:42:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2025:16078 https://access.redhat.com/errata/RHSA-2025:16078

Comment 20 errata-xmlrpc 2025-09-17 17:53:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:16117 https://access.redhat.com/errata/RHSA-2025:16117

Comment 21 errata-xmlrpc 2025-09-17 17:54:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:16118 https://access.redhat.com/errata/RHSA-2025:16118

Comment 22 errata-xmlrpc 2025-09-18 07:51:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions

Via RHSA-2025:16152 https://access.redhat.com/errata/RHSA-2025:16152

Comment 23 errata-xmlrpc 2025-09-18 07:51:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.8 Telecommunications Update Service

Via RHSA-2025:16153 https://access.redhat.com/errata/RHSA-2025:16153

Comment 24 errata-xmlrpc 2025-09-18 07:52:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On

Via RHSA-2025:16151 https://access.redhat.com/errata/RHSA-2025:16151

Comment 25 errata-xmlrpc 2025-09-22 01:15:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:16262 https://access.redhat.com/errata/RHSA-2025:16262

Comment 34 daisy 2025-11-07 05:48:02 UTC
CVE-2025-48924 is an uncontrolled-recursion vulnerability in Apache Commons Lang’s ClassUtils.getClass(...) that can cause a StackOverflowError (and thus a denial-of-service) when very long or specially crafted class name strings are processed; it affects commons-lang 2.0–2.6 and commons-lang3 3.0 up to (but not including) 3.18.0, and the issue is fixed in commons-lang3 3.18.0 — mitigation steps are to scan your dependency tree (including transitive dependencies), upgrade to 3.18.0+ (or migrate off vulnerable 2.x), add input-length/structure checks if you can’t immediately upgrade, monitor for StackOverflowError crashes, and communicate the fix plan to stakeholders so the library upgrade and testing can be scheduled.  
    https://www.ez-passpa.com