In Lib/tarfile.py in Python through 3.8.3, an attacker is able to craft a TAR archive leading to an infinite loop when opened by tarfile.open, because _proc_pax lacks header validation.
https://www.oracle.com/security-alerts/cpujan2021.html
https://usn.ubuntu.com/4428-1/
https://security.netapp.com/advisory/ntap-20200731-0002/
https://security.gentoo.org/glsa/202008-01
https://lists.debian.org/debian-lts-announce/2023/05/msg00024.html
https://lists.debian.org/debian-lts-announce/2020/11/msg00032.html
https://lists.debian.org/debian-lts-announce/2020/08/msg00034.html
https://github.com/python/cpython/pull/21454
https://bugs.python.org/issue39017
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00056.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00053.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00052.html
http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00051.html