RUSTSEC-2026-0066

Source
https://rustsec.org/advisories/RUSTSEC-2026-0066
Import Source
https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0066.json
JSON Data
https://api.osv.dev/v1/vulns/RUSTSEC-2026-0066
Aliases
Published
2026-03-17T12:00:00Z
Modified
2026-03-23T09:56:17.487066Z
Severity
  • 1.7 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
Summary
Insufficient validation of PAX extensions during extraction
Details

In versions 0.5.6 and earlier of astral-tokio-tar, malformed PAX extensions were silently skipped when parsing tar archives. This silent skipping (rather than rejection) of invalid PAX extensions could be used as a building block for a parser differential, for example by silently skipping a malformed GNU "long link" extension so that a subsequent parser would misinterpret the extension.

In practice, exploiting this behavior in astral-tokio-tar requires a secondary misbehaving tar parser, i.e. one that insufficiently validates malformed PAX extensions and interprets them rather than skipping or erroring on them. This vulnerability is considered low-severity as it requires a separate vulnerability against any unrelated tar parser.

This issue has been fixed in version 0.6.0.

Database specific
{
    "license": "CC0-1.0"
}
References

Affected packages

crates.io / astral-tokio-tar

Package

Name
astral-tokio-tar
View open source insights on deps.dev
Purl
pkg:cargo/astral-tokio-tar

Affected ranges

Type
SEMVER
Events
Introduced
0.0.0-0
Fixed
0.6.0

Ecosystem specific

{
    "affected_functions": null,
    "affects": {
        "functions": [],
        "arch": [],
        "os": []
    }
}

Database specific

source
"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0066.json"
informational
null
categories
[]
cvss
"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U"