README.md
Rendering markdown...
# GitHub Security Advisory - Tarmageddon: PAX Header Desynchronization in tokio-tar
## Summary
Versions of astral-tokio-tar prior to 0.5.6 contain a boundary parsing vulnerability that allows attackers to smuggle additional archive entries by exploiting inconsistent PAX/ustar header handling. When processing archives with PAX-extended headers containing size overrides, the parser incorrectly advances stream position based on ustar header size (often zero) instead of the PAX-specified size, causing it to interpret file content as legitimate tar headers.
This vulnerability was disclosed to multiple Rust tar parsers, all derived from the original the original async-tar fork of tar-rs.
## Details
### Vulnerability Description
The vulnerability stems from inconsistent handling of PAX extended headers versus ustar headers when determining file data boundaries. Specifically:
1. **PAX header** correctly specifies the file size (e.g., `size=1048576`)
2. **ustar header** incorrectly specifies zero size (`size=000000000000`)
3. **tokio-tar** advances the stream position based on the ustar size (0 bytes)
4. **Inner content** is then interpreted as legitimate outer archive entries
### Attack Mechanism
When a TAR file contains:
- An outer entry with PAX `size=N` but ustar `size=0`
- File data that begins with valid TAR header structures
- The parser treats inner content as additional outer entries
This creates a **header/data desynchronization** where the parser's position becomes misaligned with actual file boundaries.
### Root Cause
```rust
// Vulnerable: Uses ustar size instead of PAX override
let file_size = header.size(); // Returns 0 from ustar field
let next_pos = current_pos + 512 + pad_to_512(file_size); // Advances 0 bytes
// Fixed: Apply PAX overrides before position calculation
let mut file_size = header.size();
if let Some(pax_size) = pending_pax.get("size") {
file_size = pax_size.parse().unwrap();
}
let next_pos = current_pos + 512 + pad_to_512(file_size); // Correct advance
```
## Impact
The impact of this vulnerability depends on where astral-tokio-tar is used, and whether it is used to extract untrusted tar archives. If used to extract untrusted inputs, it may result in unexpected attacker-controlled access to the filesystem, in turn potential resulting in arbitrary code execution or credential exfiltration.
See [**GHSA-w476-p2h3-79g9**](https://github.com/astral-sh/uv/security/advisories/GHSA-w476-p2h3-79g9) for how this vulnerability affects uv, astral-tokio-tar's primary downstream user. Observe that **unlike** this advisory, uv's advisory is considered **low severity** due to overlap with intentional existing capabilities in source distributions.
## Workarounds
Users are advised to upgrade to version 0.5.6 or newer to address this advisory.
This is no workaround other than upgrading.
## References
- [Edera blog post](https://edera.dev/stories/tarmageddon)
- [Technical Reproduction Repository](https://github.com/edera-dev/cve-tarmageddon)
## Timeline
| Date | Event |
| --- | --- |
| Aug 21, 2025 | Vulnerability discovered by Edera Security Team |
| Aug 21, 2025 | Initial analysis and PoC confirmed |
| Aug 22, 2025 | Maintainers notified (privately) |
| Aug 25, 2025 | Private patch and test suite shared |
| Oct 7, 2025 | Text freeze for GHSA |
| Oct 21, 2025 | Coordinated public disclosure and patched releases |
## Credits
- **Discovered by:** Steven Noonan (Edera) and Alex Zenla (Edera)
- **Coordinated disclosure:** Ann Wallace (Edera)