CVE-2025-45582
NixOS vulnerability analysis and mitigation

Overview

GNU Tar through version 1.35 contains a directory traversal vulnerability that allows file overwrites through a two-step process when extracting crafted TAR archives. The vulnerability was discovered on July 11, 2025, and affects all versions of GNU Tar up to and including version 1.35 (NVD).

Technical details

The vulnerability exploits a two-step process to bypass the built-in protection mechanism that normally blocks directory traversal attempts. First, the victim must extract an archive containing a '../' symlink to a critical directory. Second, the victim must extract another archive containing a critical file, specified via a relative pathname that begins with the symlink name and ends with the critical file's name. The extraction process follows the symlink and overwrites the critical file, bypassing the 'Member name contains ..' protection (NVD, Snyk). The vulnerability has been assigned a CVSS v3.1 score of 4.1 (MEDIUM) with vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L (NVD).

Impact

This vulnerability can affect server applications that automatically extract user-supplied TAR archives and rely on the blocking of traversal attempts. It also impacts software installation processes where 'tar xf' is executed multiple times, such as when installing packages with dependencies set up as untrusted tarballs instead of official packages. For example, an attacker could craft archives to overwrite sensitive files like ~/.ssh/authorized_keys (NVD).

Mitigation and workarounds

No official patch has been released yet as this is a newly discovered vulnerability. Users are advised to exercise caution when extracting untrusted tar archives, especially in automated processes or when running tar multiple times on related archives (NVD).

Additional resources


SourceThis report was generated using AI

Related NixOS vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-11989HIGH8.1
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesOct 27, 2025
CVE-2025-11447HIGH7.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*
NoYesOct 27, 2025
CVE-2025-6601MEDIUM6.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*
NoYesOct 27, 2025
CVE-2025-11974MEDIUM6.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesOct 27, 2025
CVE-2025-11971MEDIUM6.5
  • GitLabGitLab
  • cpe:2.3:a:gitlab:gitlab
NoYesOct 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management