Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-64118

Опубликовано: 30 окт. 2025
Источник: debian
EPSS Низкий

Описание

node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
node-tarnot-affectedpackage

Примечания

  • https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph

  • https://github.com/isaacs/node-tar/pull/446

  • Introduced with: https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d (v7.5.1)

  • Fixed by: https://github.com/isaacs/node-tar/commit/5e1a8e638600d3c3a2969b4de6a6ec44fa8d74c9 (v7.5.2)

EPSS

Процентиль: 0%
0.00005
Низкий

Связанные уязвимости

ubuntu
3 месяца назад

node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.

nvd
3 месяца назад

node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.

github
3 месяца назад

node-tar has a race condition leading to uninitialized memory exposure

EPSS

Процентиль: 0%
0.00005
Низкий