node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2.
Metrics
Affected Vendors & Products
References
History
Fri, 31 Oct 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Node-tar Project
Node-tar Project node-tar |
|
| Vendors & Products |
Node-tar Project
Node-tar Project node-tar |
Thu, 30 Oct 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | node-tar is a Tar for Node.js. In 7.5.1, using .t (aka .list) with { sync: true } to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read. This vulnerability is fixed in 7.5.2. | |
| Title | node-tar vulnerable to race condition leading to uninitialized memory exposure | |
| Weaknesses | CWE-362 CWE-367 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-30T17:50:20.421Z
Updated: 2025-10-30T18:42:19.663Z
Reserved: 2025-10-27T15:26:14.128Z
Link: CVE-2025-64118
Updated: 2025-10-30T18:42:14.810Z
Status : Received
Published: 2025-10-30T18:15:33.673
Modified: 2025-10-30T18:15:33.673
Link: CVE-2025-64118
No data.