Skip to content

Commit 43daa01

Browse files

File tree

5 files changed

+36
-9
lines changed

5 files changed

+36
-9
lines changed

advisories/github-reviewed/2022/05/GHSA-r93v-9p5q-vhpf/GHSA-r93v-9p5q-vhpf.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-r93v-9p5q-vhpf",
4-
"modified": "2023-06-13T17:25:42Z",
4+
"modified": "2025-10-30T19:53:41Z",
55
"published": "2022-05-24T17:37:49Z",
66
"aliases": [
77
"CVE-2020-35906"

advisories/github-reviewed/2025/02/GHSA-rr6p-3pfg-562j/GHSA-rr6p-3pfg-562j.json

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rr6p-3pfg-562j",
4-
"modified": "2025-02-20T22:53:32Z",
4+
"modified": "2025-10-30T19:54:04Z",
55
"published": "2025-02-20T20:16:21Z",
66
"aliases": [
77
"CVE-2025-24893"
@@ -82,10 +82,15 @@
8282
{
8383
"type": "WEB",
8484
"url": "https://jira.xwiki.org/browse/XWIKI-22149"
85+
},
86+
{
87+
"type": "WEB",
88+
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-24893"
8589
}
8690
],
8791
"database_specific": {
8892
"cwe_ids": [
93+
"CWE-94",
8994
"CWE-95"
9095
],
9196
"severity": "CRITICAL",

advisories/github-reviewed/2025/10/GHSA-29xp-372q-xqph/GHSA-29xp-372q-xqph.json

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,11 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-29xp-372q-xqph",
4-
"modified": "2025-10-30T17:13:17Z",
4+
"modified": "2025-10-30T19:53:34Z",
55
"published": "2025-10-30T17:13:17Z",
6-
"aliases": [],
6+
"aliases": [
7+
"CVE-2025-64118"
8+
],
79
"summary": "node-tar has a race condition leading to uninitialized memory exposure",
810
"details": "### Summary\n\nUsing `.t` (aka `.list`) with `{ sync: true }` to read tar entry contents returns uninitialized memory contents if tar file was changed on disk to a smaller size while being read.\n\n### Details\n\nSee:\n* https://github.com/isaacs/node-tar/issues/445\n* https://github.com/isaacs/node-tar/pull/446\n* Regression happened in https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d\n\n### PoC\n\nA:\n```js\nimport * as tar from 'tar'\nimport fs from 'node:fs'\n\nfs.writeFileSync('tar.test.tmp', Buffer.alloc(1*1024))\n\n// from readme\nconst filesAdded = []\ntar.c(\n {\n sync: true,\n file: 'tar.test.tmp.tar',\n onWriteEntry(entry) {\n // initially, it's uppercase and 0o644\n console.log('adding', entry.path, entry.stat.mode.toString(8))\n // make all the paths lowercase\n entry.path = entry.path.toLowerCase()\n // make the entry executable\n entry.stat.mode = 0o755\n // in the archive, it's lowercase and 0o755\n filesAdded.push([entry.path, entry.stat.mode.toString(8)])\n },\n },\n ['./tar.test.tmp'],\n)\n\nconst a = fs.readFileSync('tar.test.tmp.tar')\n\nfor (let i = 0; ; i++){\n if (i % 10000 === 0) console.log(i)\n fs.writeFileSync('tar.test.tmp.tar', a)\n fs.truncateSync('tar.test.tmp.tar', 600)\n}\n```\n\nB (vulnerable):\n```js\nimport * as tar from 'tar'\nimport * as fs from 'fs'\n\nwhile (true) {\n fs.readFileSync(import.meta.filename)\n tar.t({\n sync: true,\n file: 'tar.test.tmp.tar',\n onReadEntry: e => e.on('data', b => {\n const a = b.filter(x => x)\n if (a.length > 0) console.log(a.toString())\n })\n })\n}\n```\n\nRun A and B in parallel on Node.js 22 or >=25.1.0\n\nDumps `B` memory (wait for some time to observe text data)\n\n### Impact\n\nExposes process memory and could result in e.g. unintentionally (aka attacker-controlled) attempting to process sensitive data rather than tar entry contents. Uninitialized memory can contain unrelated file contents, environment variables, passwords, etc.\n\nTo execute, an attacker must reduce the file size to boundary between a tar header and body block, in the time between when the tar archive file size is read via `stat`, and the time when the tar archive parser reaches the entry that is truncated. If the file is truncated at a different boundary, then the uninitialized data will very likely not be a valid tar entry, causing the parser to treat the entry as a damaged archive (that is, throwing an error in `strict: true` mode, or by default, skipping the entry harmlessly).\n\nThis is conditional on using the `sync: true` option to the `tar.list`/`tar.t` method, and the `7.5.1` version specifically. Earlier versions were not affected.\n\nThis is also conditional to attacker being able to truncate (or induce a truncation/replacement) of a file on disk (e.g. in cache).\n\nIf the tar file is initially larger than the `opt.maxReadSize` (16kb by default), then uninitialized memory is not exposed to user code, and instead the program enters an infinite loop, causing a DoS rather than an information disclosure vulnerability.\n\nBy default, `tar.list` does _not_ process tar archive entry body content. So, this is further conditional on the user code doing something with the tar entry file contents in an `onReadEntry` method which would expose the file contents (for example, attempting to parse them in such a way that the uninitialized data could appear in an error message).\n\nOther methods in this library (`tar.extract`, etc.) are not affected by this vulnerability.",
911
"severity": [
@@ -41,6 +43,10 @@
4143
"type": "WEB",
4244
"url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-29xp-372q-xqph"
4345
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64118"
49+
},
4450
{
4551
"type": "WEB",
4652
"url": "https://github.com/isaacs/node-tar/issues/445"
@@ -49,6 +55,10 @@
4955
"type": "WEB",
5056
"url": "https://github.com/isaacs/node-tar/pull/446"
5157
},
58+
{
59+
"type": "WEB",
60+
"url": "https://github.com/isaacs/node-tar/commit/5330eb04bc43014f216e5c271b40d5c00d45224d"
61+
},
5262
{
5363
"type": "WEB",
5464
"url": "https://github.com/isaacs/node-tar/commit/5e1a8e638600d3c3a2969b4de6a6ec44fa8d74c9"
@@ -65,6 +75,6 @@
6575
"severity": "MODERATE",
6676
"github_reviewed": true,
6777
"github_reviewed_at": "2025-10-30T17:13:17Z",
68-
"nvd_published_at": null
78+
"nvd_published_at": "2025-10-30T18:15:33Z"
6979
}
7080
}

advisories/github-reviewed/2025/10/GHSA-g59r-24g3-h7cm/GHSA-g59r-24g3-h7cm.json

Lines changed: 10 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-g59r-24g3-h7cm",
4-
"modified": "2025-10-30T17:22:53Z",
4+
"modified": "2025-10-30T19:54:46Z",
55
"published": "2025-10-30T17:22:53Z",
66
"aliases": [
77
"CVE-2025-64112"
@@ -43,6 +43,14 @@
4343
"type": "WEB",
4444
"url": "https://github.com/statamic/cms/security/advisories/GHSA-g59r-24g3-h7cm"
4545
},
46+
{
47+
"type": "ADVISORY",
48+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64112"
49+
},
50+
{
51+
"type": "WEB",
52+
"url": "https://github.com/statamic/cms/commit/e513751f433679ce698606e20c554a0c839987c1"
53+
},
4654
{
4755
"type": "PACKAGE",
4856
"url": "https://github.com/statamic/cms"
@@ -59,6 +67,6 @@
5967
"severity": "HIGH",
6068
"github_reviewed": true,
6169
"github_reviewed_at": "2025-10-30T17:22:53Z",
62-
"nvd_published_at": null
70+
"nvd_published_at": "2025-10-30T18:15:33Z"
6371
}
6472
}

advisories/github-reviewed/2025/10/GHSA-xgp7-7qjq-vg47/GHSA-xgp7-7qjq-vg47.json

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-xgp7-7qjq-vg47",
4-
"modified": "2025-10-30T17:04:26Z",
4+
"modified": "2025-10-30T19:54:37Z",
55
"published": "2025-10-30T17:04:26Z",
66
"aliases": [
77
"CVE-2025-62726"
@@ -40,6 +40,10 @@
4040
"type": "WEB",
4141
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-xgp7-7qjq-vg47"
4242
},
43+
{
44+
"type": "ADVISORY",
45+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62726"
46+
},
4347
{
4448
"type": "WEB",
4549
"url": "https://github.com/n8n-io/n8n/pull/19559"
@@ -60,6 +64,6 @@
6064
"severity": "HIGH",
6165
"github_reviewed": true,
6266
"github_reviewed_at": "2025-10-30T17:04:26Z",
63-
"nvd_published_at": null
67+
"nvd_published_at": "2025-10-30T17:15:39Z"
6468
}
6569
}

0 commit comments

Comments
 (0)