In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation. Reference: https://bugs.python.org/issue39017 Upstream commit: https://github.com/python/cpython/pull/21454
Created mingw-python3 tracking bugs for this issue: Affects: fedora-all [bug 1856489] Created python2 tracking bugs for this issue: Affects: fedora-all [bug 1856485] Created python26 tracking bugs for this issue: Affects: fedora-all [bug 1856486] Created python3 tracking bugs for this issue: Affects: fedora-all [bug 1856488] Created python34 tracking bugs for this issue: Affects: epel-all [bug 1856483] Affects: fedora-all [bug 1856491] Created python35 tracking bugs for this issue: Affects: fedora-all [bug 1856490] Created python36 tracking bugs for this issue: Affects: fedora-all [bug 1856492] Created python37 tracking bugs for this issue: Affects: fedora-all [bug 1856493] Created python38 tracking bugs for this issue: Affects: fedora-all [bug 1856484] Created python39 tracking bugs for this issue: Affects: fedora-all [bug 1856482]
Mitigation: This flaw can be mitigated by not opening untrusted files with tarfile.
Statement: A service is vulnerable if it uses python's tarfile module to open untrusted tar files. If an attacker is able to submit a crafted tar file to a service which uses the tarfile module to open it, an infinite loop will be executed, potentially causing a denial of service. The tarfile module is included with python.
Flaw summary: In Lib/tarfile.py's _proc_pax() function, there's a while True loop which relies upon the value of the pos variable in order to exit the loop. This variable is incremented with `pos += length` but it's possible for length to be 0, thus the loop will never exit. It's possible for length to be set to 0 because the function uses regex to parse the length like: (length, keyword, value). The patch raises an exception if the length variable is 0 and adds a test.
Tomas, Joshua, is the updated summary of all the bugzillas scripted? Can the script be updated to use the *This is a minor update (do not send email)* option?
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 6 Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:4285 https://access.redhat.com/errata/RHSA-2020:4285
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-20907
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:4273 https://access.redhat.com/errata/RHSA-2020:4273
This issue has been addressed in the following products: Red Hat Software Collections for Red Hat Enterprise Linux 7 Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS Via RHSA-2020:4299 https://access.redhat.com/errata/RHSA-2020:4299
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4433 https://access.redhat.com/errata/RHSA-2020:4433
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4641 https://access.redhat.com/errata/RHSA-2020:4641
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:4654 https://access.redhat.com/errata/RHSA-2020:4654
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:5009 https://access.redhat.com/errata/RHSA-2020:5009
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:5010 https://access.redhat.com/errata/RHSA-2020:5010
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2021:0528 https://access.redhat.com/errata/RHSA-2021:0528
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2021:0761 https://access.redhat.com/errata/RHSA-2021:0761
This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2021:0881 https://access.redhat.com/errata/RHSA-2021:0881