CVE-2025-8194
Rocky Linux vulnerability analysis and mitigation

Overview

A high severity vulnerability (CVE-2025-8194) was discovered in Python's tarfile module affecting the TarFile extraction and entry enumeration APIs. The vulnerability was disclosed on July 28, 2025, and affects all Python versions prior to 3.14.0. The flaw exists in the tar implementation which would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives (NVD, Security Online).

Technical details

The vulnerability lies in the TarFile extraction and entry enumeration APIs of CPython's standard tarfile module. When a .tar archive contains an entry with a negative offset, Python's extraction routines fail to validate the offset, leading to an infinite loop. The issue has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The vulnerability is classified as CWE-835 (Loop with Unreachable Exit Condition - 'Infinite Loop') (NVD).

Impact

The vulnerability can lead to resource exhaustion, application hangs, system unresponsiveness, and denial-of-service conditions when processing maliciously crafted tar archives. Attackers can exploit this flaw by crafting tar files with specifically malformed metadata that causes the parsing process to stall indefinitely (Security Online).

Mitigation and workarounds

For systems unable to upgrade to Python 3.14.0, a temporary mitigation patch can be applied by including specific code after importing the tarfile module. The patch introduces a check to raise an exception if a negative offset is encountered, effectively neutralizing the malicious payload. The patch is available at GitHub Gist.

Additional resources


SourceThis report was generated using AI

Related Rocky Linux vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-7493CRITICAL9.1
  • Rocky LinuxRocky Linux
  • idm:client::python-qrcode
NoYesSep 30, 2025
CVE-2025-10537HIGH8.8
  • NixOSNixOS
  • rhel10::firefox-flatpak
NoYesSep 16, 2025
CVE-2025-10533HIGH8.8
  • NixOSNixOS
  • cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*
NoYesSep 16, 2025
CVE-2025-10532MEDIUM6.5
  • NixOSNixOS
  • firefox-debugsource
NoYesSep 16, 2025
CVE-2025-10536MEDIUM6.2
  • NixOSNixOS
  • thunderbird
NoYesSep 16, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management