UBUNTU-CVE-2025-59825

Source
https://ubuntu.com/security/CVE-2025-59825
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-59825.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-59825
Upstream
Published
2025-09-23T20:15:00Z
Modified
2025-09-25T07:34:35.103920Z
Severity
  • 6.1 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.3 and earlier of astral-tokio-tar, tar archives may extract outside of their intended destination directory when using the Entry::unpackinraw API. Additionally, the Entry::allowexternalsymlinks control (which defaults to true) could be bypassed via a pair of symlinks that individually point within the destination but combine to point outside of it. These behaviors could be used individually or combined to bypass the intended security control of limiting extraction to the given directory. This in turn would allow an attacker with a malicious tar archive to perform an arbitrary file write and potentially pivot into code execution. This issue has been patched in version 0.5.4. There is no workaround other than upgrading.

References

Affected packages

Ubuntu:25.04 / rust-astral-tokio-tar

Package

Name
rust-astral-tokio-tar
Purl
pkg:deb/ubuntu/rust-astral-tokio-tar@0.5.1-1?arch=source&distro=plucky

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

0.*

0.5.1-1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "librust-astral-tokio-tar-dev",
            "binary_version": "0.5.1-1"
        }
    ]
}