In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
https://bugs.python.org/issue39017
https://github.com/python/cpython/pull/21454
https://usn.ubuntu.com/4428-1/
https://security.netapp.com/advisory/ntap-20200731-0002/
https://security.gentoo.org/glsa/202008-01
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://www.oracle.com/security-alerts/cpujan2021.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
Source: MITRE
Published: 2020-07-13
Updated: 2023-05-24
Type: CWE-835
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 7.5
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH