Security Audit Report
Date: 2026-04-30T05:30:50.154Z
Vulnerabilities: 5
RUSTSEC-2026-0113: unpack_in can chmod arbitrary directories by following symlinks
Package: astral-tokio-tar@0.6.0
Severity: Unknown
URL: GHSA-xx64-wwv2-hcqq
In versions 0.6.0 and earlier of astral-tokio-tar, the unpack_in API could
inadvertently modify the permissions of external (i.e. non-archive) directories
outside of the archive. An attacker could use this to contrite a tar archive
that maliciously changes directory permissions outside of its intended
hierarchy. This flaw only affects directories; individual file permissions
cannot be modified via it.
See GHSA-j4xf-2g29-59ph for the equivalent flaw in the tar crate.
Patched Versions: >=0.6.1
RUSTSEC-2026-0112: PAX Header Desynchronization in astral-tokio-tar
Package: astral-tokio-tar@0.6.0
Severity: Unknown
URL: GHSA-fp55-jw48-c537
Versions of astral-tokio-tar prior to 0.6.1 contain a PAX header interpretation
bug that allows manipulated entries to be made selectively visible or invisible
during extraction with astral-tokio-tar versus other tar implementations.
An attacker could use this differential to smuggle unexpected files onto a
victim's filesystem.
Patched Versions: >=0.6.1
RUSTSEC-2026-0104: Reachable panic in certificate revocation list parsing
Package: rustls-webpki@0.103.10
Severity: Unknown
URL: null
A panic was reachable when parsing certificate revocation lists via [BorrowedCertRevocationList::from_der]
or [OwnedCertRevocationList::from_der]. This was the result of mishandling a syntactically valid empty
BIT STRING appearing in the onlySomeReasons element of a IssuingDistributionPoint CRL extension.
This panic is reachable prior to a CRL's signature being verified.
Applications that do not use CRLs are not affected.
Thank you to @tynus3 for the report.
Patched Versions: >=0.103.13, <0.104.0-alpha.1, >=0.104.0-alpha.7
RUSTSEC-2026-0098: Name constraints for URI names were incorrectly accepted
Package: rustls-webpki@0.103.10
Severity: Unknown
URL: null
Name constraints for URI names were ignored and therefore accepted.
Note this library does not provide an API for asserting URI names, and URI name constraints are otherwise not implemented. URI name constraints are now rejected unconditionally.
Since name constraints are restrictions on otherwise properly-issued certificates, this bug is reachable only after signature verification and requires misissuance to exploit.
This vulnerability is identified as GHSA-965h-392x-2mh5. Thank you to @1seal for the report.
Patched Versions: >=0.103.12, <0.104.0-alpha.1, >=0.104.0-alpha.6
RUSTSEC-2026-0099: Name constraints were accepted for certificates asserting a wildcard name
Package: rustls-webpki@0.103.10
Severity: Unknown
URL: null
Permitted subtree name constraints for DNS names were accepted for certificates asserting a wildcard name.
This was incorrect because, given a name constraint of accept.example.com, *.example.com could feasibly allow a name of reject.example.com which is outside the constraint.
This is very similar to CVE-2025-61727.
Since name constraints are restrictions on otherwise properly-issued certificates, this bug is reachable only after signature verification and requires misissuance to exploit.
This vulnerability is identified as GHSA-xgp8-3hg3-c2mh. Thank you to @1seal for the report.
Patched Versions: >=0.103.12, <0.104.0-alpha.1, >=0.104.0-alpha.6
This issue was automatically created by the security audit workflow.
Security Audit Report
Date: 2026-04-30T05:30:50.154Z
Vulnerabilities: 5
RUSTSEC-2026-0113:
unpack_incan chmod arbitrary directories by following symlinksPackage:
astral-tokio-tar@0.6.0Severity: Unknown
URL: GHSA-xx64-wwv2-hcqq
In versions 0.6.0 and earlier of astral-tokio-tar, the unpack_in API could
inadvertently modify the permissions of external (i.e. non-archive) directories
outside of the archive. An attacker could use this to contrite a tar archive
that maliciously changes directory permissions outside of its intended
hierarchy. This flaw only affects directories; individual file permissions
cannot be modified via it.
See GHSA-j4xf-2g29-59ph for the equivalent flaw in the tar crate.
Patched Versions: >=0.6.1
RUSTSEC-2026-0112: PAX Header Desynchronization in astral-tokio-tar
Package:
astral-tokio-tar@0.6.0Severity: Unknown
URL: GHSA-fp55-jw48-c537
Versions of astral-tokio-tar prior to 0.6.1 contain a PAX header interpretation
bug that allows manipulated entries to be made selectively visible or invisible
during extraction with astral-tokio-tar versus other tar implementations.
An attacker could use this differential to smuggle unexpected files onto a
victim's filesystem.
Patched Versions: >=0.6.1
RUSTSEC-2026-0104: Reachable panic in certificate revocation list parsing
Package:
rustls-webpki@0.103.10Severity: Unknown
URL: null
A panic was reachable when parsing certificate revocation lists via [
BorrowedCertRevocationList::from_der]or [
OwnedCertRevocationList::from_der]. This was the result of mishandling a syntactically valid emptyBIT STRINGappearing in theonlySomeReasonselement of aIssuingDistributionPointCRL extension.This panic is reachable prior to a CRL's signature being verified.
Applications that do not use CRLs are not affected.
Thank you to @tynus3 for the report.
Patched Versions: >=0.103.13, <0.104.0-alpha.1, >=0.104.0-alpha.7
RUSTSEC-2026-0098: Name constraints for URI names were incorrectly accepted
Package:
rustls-webpki@0.103.10Severity: Unknown
URL: null
Name constraints for URI names were ignored and therefore accepted.
Note this library does not provide an API for asserting URI names, and URI name constraints are otherwise not implemented. URI name constraints are now rejected unconditionally.
Since name constraints are restrictions on otherwise properly-issued certificates, this bug is reachable only after signature verification and requires misissuance to exploit.
This vulnerability is identified as GHSA-965h-392x-2mh5. Thank you to @1seal for the report.
Patched Versions: >=0.103.12, <0.104.0-alpha.1, >=0.104.0-alpha.6
RUSTSEC-2026-0099: Name constraints were accepted for certificates asserting a wildcard name
Package:
rustls-webpki@0.103.10Severity: Unknown
URL: null
Permitted subtree name constraints for DNS names were accepted for certificates asserting a wildcard name.
This was incorrect because, given a name constraint of
accept.example.com,*.example.comcould feasibly allow a name ofreject.example.comwhich is outside the constraint.This is very similar to CVE-2025-61727.
Since name constraints are restrictions on otherwise properly-issued certificates, this bug is reachable only after signature verification and requires misissuance to exploit.
This vulnerability is identified as GHSA-xgp8-3hg3-c2mh. Thank you to @1seal for the report.
Patched Versions: >=0.103.12, <0.104.0-alpha.1, >=0.104.0-alpha.6
This issue was automatically created by the security audit workflow.