astral-tokio-tar Archive Library Flaw Allows External Directory Permission Manipulation
A set of security advisories has been published against the astral-tokio-tar Rust library, flagging multiple vulnerabilities in version 0.6.0 that could allow attackers to manipulate directory permissions outside the intended archive extraction boundary. The most prominently documented flaw, tracked as RUSTSEC-2026-0113, exposes a weakness in the library's unpack_in API, which fails to properly restrict symlink resolution during tar extraction.
The vulnerability stems from inadequate safeguards preventing symlink traversal. In affected versions, an attacker could craft a malicious tar archive containing symlinks that resolve to directories outside the archive's intended extraction hierarchy. When unpacked, the library would follow these symlinks and inadvertently modify permissions on external directories. The flaw specifically affects directory permissions; individual file permissions cannot be altered through this vector. A related advisory, RUSTSEC-2026-0112, flags a PAX Header Desynchronization issue in the same package. Both vulnerabilities reference equivalent flaws in the standard tar crate (GHSA-j4xf-2g29-59ph), suggesting a broader pattern of symlink handling weaknesses across Rust's archive processing ecosystem.
The library maintainers have addressed the flaw in version 0.6.1 and later releases. The RUSTSEC database currently classifies the severity as Unknown, indicating a full impact assessment is still pending. Systems relying on astral-tokio-tar for archive extraction in security-sensitive contexts face potential risk if processing untrusted tar archives with versions prior to 0.6.1. Developers using this library should verify their dependency versions and apply the patched release promptly, particularly in environments handling external or user-supplied archive files.