WhisperX tag archive

#symlink

This page collects WhisperX intelligence signals tagged #symlink. It is designed for humans, search engines, and AI agents: each item links to a canonical source-backed record with sector, source, timestamp, credibility, and exportable structured data.

Latest Signals (10)

The Lab · 2026-04-09 13:27:25 · GitHub Issues

1. GitHub Security: Container Mount Validation Flaw Allows Symlink Bypass, Risking Host Path Access

A critical vulnerability in the container mount validation logic of a codebase allows for a symlink-based path traversal, potentially enabling unauthorized access to host system directories. The flaw resides in the `validateMount` function within `pkg/container/container.go`, which fails to resolve symbolic links befor...

The Lab · 2026-04-20 18:22:53 · GitHub Issues

2. Go Security Alert: CVE-2026-32282 Exposes Symlink Escape Risk in `Root.Chmod`

A critical security flaw in the Go programming language's standard library has been flagged, exposing a potential path traversal vulnerability. The issue, tracked as CVE-2026-32282, resides in the `internal/syscall/unix` package. Specifically, the `Root.Chmod` function can be manipulated to follow symbolic links outsid...

The Lab · 2026-04-27 00:54:07 · GitHub Issues

3. CVE-2026-28684: python-dotenv Symlink Flaw Enables Arbitrary Local File Overwrite

A critical vulnerability in the python-dotenv library exposes systems to local symlink-based file overwrite attacks. CVE-2026-28684 affects version 1.1.0 and earlier, allowing a local attacker to manipulate the `set_key()` and `unset_key()` functions into redirecting writes to arbitrary files on the system. The flaw r...

The Lab · 2026-04-29 05:54:09 · GitHub Issues

4. astral-tokio-tar Library Discloses 5 Security Vulnerabilities Including Symlink-Based Permission Escape

A security audit dated April 29, 2026, has identified five vulnerabilities in the astral-tokio-tar library, a widely used Rust crate for handling tar archives with asynchronous I/O. The disclosure, catalogued under the RUSTSEC identifiers, reveals flaws ranging from arbitrary directory permission manipulation through s...

The Lab · 2026-04-30 05:54:10 · GitHub Issues

5. astral-tokio-tar Archive Library Flaw Allows External Directory Permission Manipulation

A set of security advisories has been published against the astral-tokio-tar Rust library, flagging multiple vulnerabilities in version 0.6.0 that could allow attackers to manipulate directory permissions outside the intended archive extraction boundary. The most prominently documented flaw, tracked as RUSTSEC-2026-011...

The Lab · 2026-05-01 05:54:05 · GitHub Issues

6. Symlink Exploitation Allows Arbitrary Directory Permission Manipulation in astral-tokio-tar Library

A coordinated security disclosure has revealed multiple vulnerabilities in astral-tokio-tar, a Rust-based tar archive library widely used in systems programming. Two high-severity flaws—RUSTSEC-2026-0113 and RUSTSEC-2026-0112—were identified in version 0.6.0, exposing systems that process untrusted tar archives to dire...

The Lab · 2026-05-03 05:54:10 · GitHub Issues

7. astral-tokio-tar v0.6.0 Flaw Allows Arbitrary Directory Permission Manipulation via Symlinks

A critical security audit has identified a symlink-based vulnerability in the astral-tokio-tar Rust crate (versions 0.6.0 and earlier), allowing attackers to modify permissions on directories outside the intended archive hierarchy. The flaw, catalogued as RUSTSEC-2026-0113, resides in the unpack_in API, which fails to ...

The Lab · 2026-05-04 05:54:06 · GitHub Issues

8. Critical Symlink Flaw in astral-tokio-tar Enables Arbitrary Directory Permission Manipulation

Two security advisories have been issued against the astral-tokio-tar Rust library, exposing vulnerabilities in version 0.6.0 that could allow attackers to manipulate directory permissions outside intended archive boundaries. The first flaw, catalogued as RUSTSEC-2026-0113, stems from the `unpack_in` API's failure to p...

The Lab · 2026-05-05 05:31:41 · GitHub Issues

9. Critical Symlink Vulnerability in Tokio-Tar Library Enables Arbitrary Directory Permission Manipulation

A critical security flaw in the astral-tokio-tar archive library allows maliciously crafted tar archives to modify directory permissions outside the intended extraction hierarchy. The vulnerability, catalogued as RUSTSEC-2026-0113, affects all versions through 0.6.0 and exposes systems to arbitrary permission changes o...

The Lab · 2026-05-08 05:59:07 · GitHub Issues

10. Security Researchers Flag Symlink Traversal Flaw in Rust Archive Library astral-tokio-tar

A security audit has uncovered five vulnerabilities in astral-tokio-tar, a widely-used Rust library for handling tar archives. The most severe flaw—tracked as RUSTSEC-2026-0113—allows the unpack_in API to modify permissions on directories outside the intended archive hierarchy by following malicious symlinks. The vulne...