Tarmageddon: One Bug, Four Forks, and a Disclosure Scavenger Hunt - Marina Moore & Alex Zenla, Edera

OpenSSF
OpenSSFMar 25, 2026

Why It Matters

A single parsing bug in a foundational library can cascade through dozens of forks, jeopardizing millions of developers and production systems, making robust open‑source governance and coordinated security responses essential.

Key Takeaways

  • Critical tar parsing bug discovered in Rust's Tokyo‑tar library.
  • Bug enables hidden files extraction, leading to potential remote code execution.
  • Multiple forks propagated vulnerability across 120 crates.io packages.
  • Coordinated disclosure required patching five independent repositories without central maintainer.
  • Open‑source supply‑chain security depends on maintainers, policies, and transparent communication.

Summary

The video recounts how Ada’s research team uncovered a severe parsing flaw in the Rust‑based asynchronous tar library Tokyo‑tar. The vulnerability, triggered by a malformed PAX header, caused the extractor to treat embedded data as a separate tar archive, allowing hidden files to be written during extraction and opening a path to remote code execution.

The presenters explain that the bug could be weaponized in several supply‑chain attack scenarios: Python package builds could be hijacked, container images could be poisoned, and manifest or bill‑of‑materials verification could be subverted. Their investigation revealed that the flaw existed not only in the original library but also in four downstream forks—including a version used by the popular UV tool—affecting roughly 120 crates on crates.io.

Because each fork was maintained by different, often isolated contributors, the disclosure process became a multi‑party effort. Ada’s team had to locate maintainers, draft distinct patches for each repository, and coordinate a 60‑day embargo, all while lacking formal security policies in the upstream projects. Astral’s UV team, which had a defined security process, proved instrumental in communicating the risk to downstream users.

The episode underscores the fragility of open‑source supply‑chain security: without clear ownership, security policies, and funding, critical bugs can proliferate across ecosystems. It also highlights the need for coordinated disclosure frameworks and better stewardship of widely‑used libraries to protect developers and enterprises from hidden attack vectors.

Original Description

Tarmageddon: One Bug, Four Forks, and a Disclosure Scavenger Hunt - Marina Moore & Alex Zenla, Edera
You’ve heard of unmaintained software libraries, but what about libraries maintained in four places? What happens when several people create popular forks of a project and then a vulnerability impacts all of them? When we found a parsing vulnerability in tokio-tar, dubbed Tarmageddon, we discovered what happens next. We’ll walk through this vulnerability and how the responsible disclosure ended up sent to four different projects. We’ll look at how this disclosure became a scavenger hunt for maintainer email addresses, popular forks, and dependent projects.
We’ll then zoom out to the ecosystem that made this disclosure so challenging. Why does rust have separate libraries for asynchronous code? Why do developers make a new library instead of adding features to the ones we already have? As a community, what can we do to make this better? We’ll discuss the roles of open source maintainers, foundations, and community members in making our whole ecosystem more secure.

Comments

Want to join the conversation?

Loading comments...