Skip to content

Tracking issue: Rust Tarmageddon (CVE-2025-62518) #455265

@niklaskorz

Description

@niklaskorz

CVE-2025-62518 / GHSA-j5gw-2vrg-8fgx revealed a high severity vulnerability in:

  • astral-tokio-tar (fixed in 0.5.6)
  • async-tar (fixed in 0.5.1)
  • tokio-tar (no fixed version available)
  • and potentially other, less popular forks of async-tar

The following packages reference potentially vulnerable versions of these crates.
Ideally, we can bump these to the fixed version of astral-tokio-tar or async-tar, preferably as an upstream PR.
If not, we have to assess whether the package itself has to be marked as vulnerable.
The list was generated by rg -l 'cargoDeps|cargoLock|cargoHash' pkgs/ and a very hacky Python script.

Metadata

Metadata

Assignees

No one assigned

    Labels

    1.severity: securityIssues which raise a security issue, or PRs that fix one5.scope: trackingLong-lived issue tracking long-term fixes or multiple sub-problems6.topic: rustGeneral-purpose programming language emphasizing performance, type safety, and concurrency.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions