{"id":"RUSTSEC-2026-0113","summary":"`unpack_in` can chmod arbitrary directories by following symlinks","details":"In versions 0.6.0 and earlier of astral-tokio-tar, the unpack_in API could\ninadvertently modify the permissions of external (i.e. non-archive) directories\noutside of the archive. An attacker could use this to contrite a tar archive\nthat maliciously changes directory permissions outside of its intended\nhierarchy. This flaw only affects directories; individual file permissions\ncannot be modified via it.\n\nSee GHSA-j4xf-2g29-59ph for the equivalent flaw in the tar crate.","aliases":["GHSA-xx64-wwv2-hcqq"],"modified":"2026-04-28T13:30:08.277501Z","published":"2026-04-27T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/astral-tokio-tar"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2026-0113.html"},{"type":"ADVISORY","url":"https://github.com/advisories/GHSA-xx64-wwv2-hcqq"}],"affected":[{"package":{"name":"astral-tokio-tar","ecosystem":"crates.io","purl":"pkg:cargo/astral-tokio-tar"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.6.1"}]}],"ecosystem_specific":{"affects":{"arch":[],"os":[],"functions":[]},"affected_functions":null},"database_specific":{"informational":null,"cvss":null,"categories":["file-disclosure"],"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0113.json"}}],"schema_version":"1.7.5"}