News: 0001585992

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

TARmageddon Strikes: High Profile Security Vulnerability In Popular Rust Library

([Programming] 82 Minutes Ago TARmageddon)


Going public today is CVE-2025-62518, or better known by the name given by the security researchers involved: TARmageddon. The TARmageddon vulnerability affects the popular async-tar Rust library and its various forks like tokio-tar. In turn TARmageddon impacts the uv Python package manager and other users of this library.

Edera made public today their discovery of a critical boundary-parsing bug in the async-tar Rust library and downstream forks like tokio-tar. TARmageddon is rated as a "high" severity bug and can lead to remote code execution through file overwriting attacks.

Yes, this high severity vulnerability with remote code execution (RCE) vector happened even with the code being written in the Rust programming language that is typically promoted for its memory safety guarantees.

Making this issue even more of a headache for those relying on these libraries is that tokio-tar is effectively abandoned without upstream maintenance. In turn Edera organized with decentralized patching of key downstream forks. They coordinated with Binstalk, opa-wasm, and other projects for patching.

Those wishing to learn more about this TARmageddon vulnerability can do so via the [1]Edera.dev blog .



[1] https://edera.dev/stories/tarmageddon



My analyst told me that I was right out of my head,
But I said, "Dear Doctor, I think that it is you instead.
Because I have got a thing that is unique and new,
To prove it I'll have the last laugh on you.
'Cause instead of one head -- I've got two.

And you know two heads are better than one.