{"id":"RUSTSEC-2026-0112","summary":"PAX Header Desynchronization in astral-tokio-tar","details":"Versions of astral-tokio-tar prior to 0.6.1 contain a PAX header interpretation\nbug that allows manipulated entries to be made selectively visible or invisible\nduring extraction with astral-tokio-tar versus other tar implementations.\nAn attacker could use this differential to smuggle unexpected files onto a\nvictim's filesystem.","aliases":["GHSA-fp55-jw48-c537"],"modified":"2026-04-28T13:30:15.618809Z","published":"2026-04-27T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/astral-tokio-tar"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2026-0112.html"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-fp55-jw48-c537"}],"affected":[{"package":{"name":"astral-tokio-tar","ecosystem":"crates.io","purl":"pkg:cargo/astral-tokio-tar"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.6.1"}]}],"ecosystem_specific":{"affected_functions":null,"affects":{"arch":[],"functions":[],"os":[]}},"database_specific":{"cvss":null,"categories":["format-injection"],"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0112.json","informational":null}}],"schema_version":"1.7.5"}