{"id":"RUSTSEC-2026-0145","summary":"PAX Header Desynchronization in astral-tokio-tar","details":"Versions of astral-tokio-tar prior to 0.6.2 contain a PAX header interpretation bug that allows manipulated entries to be made selectively visible or invisible during extraction with astral-tokio-tar versus other tar implementations. An attacker could use this differential to smuggle unexpected files onto a victim's filesystem.","aliases":["GHSA-3cv2-h65g-fgmm"],"modified":"2026-05-19T05:03:10.247821731Z","published":"2026-05-18T12:00:00Z","database_specific":{"license":"CC0-1.0"},"references":[{"type":"PACKAGE","url":"https://crates.io/crates/astral-tokio-tar"},{"type":"ADVISORY","url":"https://rustsec.org/advisories/RUSTSEC-2026-0145.html"},{"type":"ADVISORY","url":"https://github.com/astral-sh/tokio-tar/security/advisories/GHSA-3cv2-h65g-fgmm"}],"affected":[{"package":{"name":"astral-tokio-tar","ecosystem":"crates.io","purl":"pkg:cargo/astral-tokio-tar"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0.0.0-0"},{"fixed":"0.6.2"}]}],"ecosystem_specific":{"affected_functions":null,"affects":{"arch":[],"functions":[],"os":[]}},"database_specific":{"informational":null,"source":"https://github.com/rustsec/advisory-db/blob/osv/crates/RUSTSEC-2026-0145.json","categories":["file-disclosure"],"cvss":null}}],"schema_version":"1.7.5"}