astral-tokio-tar is Vulnerable to PAX Header Desynchronization
Moderate severity
GitHub Reviewed
Published
Apr 27, 2026
in
astral-sh/tokio-tar
•
Updated May 6, 2026
Description
Published to the GitHub Advisory Database
May 6, 2026
Reviewed
May 6, 2026
Last updated
May 6, 2026
Impact
Versions of astral-tokio-tar prior to 0.6.1 contain a PAX header interpretation bug that allows manipulated entries to be made selectively visible or invisible during extraction with astral-tokio-tar versus other tar implementations. An attacker could use this differential to smuggle unexpected files onto a victim's filesystem.
See GHSA-j5gw-2vrg-8fgx for a similar desynchronization bug in astral-tokio-tar.
Patches
Versions 0.6.1 and newer of astral-tokio-tar address this differential.
Workarounds
Users are advised to upgrade to version 0.6.1 or newer to address this advisory.
There is no workaround other than upgrading. Users should experience no breaking changes as a result of the upgrade.
Resources
Attribution
References