Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-64118

Опубликовано: 30 окт. 2025
Источник: redhat
CVSS3: 4.7
EPSS Низкий

Описание

node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.

A flaw was found in node-tar, a Tar utility for Node.js. This vulnerability allows a local attacker to potentially disclose sensitive information. When the .t (or .list) function is used with { sync: true } to read tar entry contents, and the tar file is concurrently modified on disk to a smaller size, the function may return uninitialized memory contents. This could lead to the exposure of arbitrary data.

Отчет

This vulnerability is rated Moderate for Red Hat products because it affects node-tar when synchronously reading tar entry contents from a file that is concurrently modified to a smaller size. This race condition can lead to the exposure of uninitialized memory. Exploitation requires an attacker to control the tar file and time its modification during a synchronous read operation.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Confidential Compute Attestationopenshift-sandboxed-containers/osc-pccsFix deferred
Cryostat 4io.cryostat-cryostatFix deferred
Logging Subsystem for Red Hat OpenShiftopenshift-logging/kibana6-rhel8Fix deferred
Migration Toolkit for Containersrhmtc/openshift-migration-ui-rhel8Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel8Fix deferred
Multicluster Engine for Kubernetesmulticluster-engine/console-mce-rhel9Fix deferred
Network Observability Operatornetwork-observability/network-observability-console-plugin-rhel9Fix deferred
Node HealthCheck Operatorworkload-availability/node-remediation-console-rhel9Fix deferred
OpenShift Lightspeedopenshift-lightspeed/lightspeed-to-dataverse-exporter-rhel9Fix deferred
OpenShift Pipelinesopenshift-pipelines/pipelines-console-plugin-rhel8Fix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-367
https://bugzilla.redhat.com/show_bug.cgi?id=2407440node-tar: tar: node-tar: Information disclosure via reading a truncated tar file

EPSS

Процентиль: 0%
0.00006
Низкий

4.7 Medium

CVSS3

Связанные уязвимости

ubuntu
5 месяцев назад

node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.

nvd
5 месяцев назад

node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.

debian
5 месяцев назад

node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { s ...

github
5 месяцев назад

node-tar has a race condition leading to uninitialized memory exposure

CVSS3: 7
fstec
5 месяцев назад

Уязвимость библиотеки node-tar программной платформы Node.js, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 0%
0.00006
Низкий

4.7 Medium

CVSS3