CVE-2025-8194
Publication date 29 July 2025
Last updated 29 July 2025
Ubuntu priority
Cvss 3 Severity Score
There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. This vulnerability can be mitigated by including the following patch after importing the “tarfile” module: import tarfile def _block_patched(self, count): if count < 0: # pragma: no cover raise tarfile.InvalidHeaderError("invalid offset") return _block_patched._orig_block(self, count) _block_patched._orig_block = tarfile.TarInfo._block tarfile.TarInfo._block = _block_patched
Status
Package | Ubuntu Release | Status |
---|---|---|
python2.7 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy |
Needs evaluation
|
|
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Needs evaluation
|
|
python3.4 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
14.04 LTS trusty |
Needs evaluation
|
|
python3.5 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Needs evaluation
|
|
python3.6 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
18.04 LTS bionic |
Needs evaluation
|
|
python3.7 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
18.04 LTS bionic |
Needs evaluation
|
|
python3.8 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal |
Needs evaluation
|
|
18.04 LTS bionic |
Needs evaluation
|
|
python3.9 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal |
Needs evaluation
|
|
python3.10 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy |
Needs evaluation
|
|
python3.11 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy |
Needs evaluation
|
|
python3.12 | 25.04 plucky | Not in release |
24.04 LTS noble |
Needs evaluation
|
|
22.04 LTS jammy | Not in release | |
python3.13 | 25.04 plucky |
Needs evaluation
|
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
python3.14 | 25.04 plucky | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release |
Patch details
Package | Patch details |
---|---|
python3.9 | |
python3.10 | |
python3.11 | |
python3.12 | |
python3.13 |
|
python3.14 |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | None |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |