--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2025-e6cbc78be8
2025-11-03 01:23:43.637809+00:00
--------------------------------------------------------------------------------

Name        : rust-astral-tokio-tar
Product     : Fedora EPEL 10.1
Version     : 0.5.6
Release     : 1.el10_1
URL         : https://crates.io/crates/astral-tokio-tar
Summary     : Rust implementation of an async TAR file reader and writer
Description :
A Rust implementation of an async TAR file reader and writer. This
library does not currently handle compression, but it is abstract over
all I/O readers and writers. Additionally, great lengths are taken to
ensure that the entire contents are never required to be entirely
resident in memory all at once.

--------------------------------------------------------------------------------
Update Information:

uv 0.8.24
https://github.com/astral-sh/uv/blob/0.8.24/CHANGELOG.md
Since uv was built with astral-tokio-tar 0.5.6, this is a security fix for
CVE-2025-62518.
rust-astral-tokio-tar 0.5.6
Fixed a parser desynchronization vulnerability when reading tar archives that
  contain mismatched size information in PAX/ustar headers.
This vulnerability is being tracked as GHSA-j5gw-2vrg-8fgx
and CVE-2025-62518.
Update rust-tikv-jemallocator and rust-tikv-jemalloc-sys to 0.6.1.
Initial packages for a number of new dependencies for uv, and initial EPEL10
packages for a few of their dependencies.
--------------------------------------------------------------------------------
ChangeLog:

* Tue Oct 21 2025 Benjamin A. Beasley <[email protected]> - 0.5.6-1
- Update to version 0.5.6; Fixes RHBZ#2405351
- Security fix for CVE-2025-62518
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2405468 - CVE-2025-62518 rust-astral-tokio-tar: astral-tokio-tar 
Vulnerable to PAX Header Desynchronization [epel-10]
        https://bugzilla.redhat.com/show_bug.cgi?id=2405468
  [ 2 ] Bug #2405469 - CVE-2025-62518 uv: astral-tokio-tar Vulnerable to PAX 
Header Desynchronization [epel-10]
        https://bugzilla.redhat.com/show_bug.cgi?id=2405469
--------------------------------------------------------------------------------

This update can be installed with the "yum" update programs.  Use
su -c 'yum update rust-astral-tokio-tar' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html

All packages are signed with the Fedora EPEL GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------

-- 
_______________________________________________
epel-package-announce mailing list -- 
[email protected]
To unsubscribe send an email to 
[email protected]
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it: 
https://pagure.io/fedora-infrastructure/new_issue

Reply via email to