CVE-2025-62518

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-62518
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-62518.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-62518
Aliases
Downstream
Related
Published
2025-10-21T16:13:02Z
Modified
2025-11-11T02:50:27.880784Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
astral-tokio-tar Vulnerable to PAX Header Desynchronization
Details

astral-tokio-tar is a tar archive reading/writing library for async Rust. Versions of astral-tokio-tar prior to 0.5.6 contain a boundary parsing vulnerability that allows attackers to smuggle additional archive entries by exploiting inconsistent PAX/ustar header handling. When processing archives with PAX-extended headers containing size overrides, the parser incorrectly advances stream position based on ustar header size (often zero) instead of the PAX-specified size, causing it to interpret file content as legitimate tar headers. This issue has been patched in version 0.5.6. There are no workarounds.

Database specific
{
    "cwe_ids": [
        "CWE-843"
    ]
}
References

Affected packages

Git / github.com/astral-sh/tokio-tar

Affected ranges

Type
GIT
Repo
https://github.com/astral-sh/tokio-tar
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other

9b5e692
b1e6022
ba2b140
c06006a
efeaea9

v0.*

v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.5.4
v0.5.5

v5.*

v5.0.0