Skip to content

Security: 5 vulnerabilities found #183

@github-actions

Description

@github-actions

Security Audit Report

Date: 2026-04-30T05:30:50.154Z
Vulnerabilities: 5

RUSTSEC-2026-0113: unpack_in can chmod arbitrary directories by following symlinks

Package: astral-tokio-tar@0.6.0
Severity: Unknown
URL: GHSA-xx64-wwv2-hcqq

In versions 0.6.0 and earlier of astral-tokio-tar, the unpack_in API could
inadvertently modify the permissions of external (i.e. non-archive) directories
outside of the archive. An attacker could use this to contrite a tar archive
that maliciously changes directory permissions outside of its intended
hierarchy. This flaw only affects directories; individual file permissions
cannot be modified via it.

See GHSA-j4xf-2g29-59ph for the equivalent flaw in the tar crate.

Patched Versions: >=0.6.1


RUSTSEC-2026-0112: PAX Header Desynchronization in astral-tokio-tar

Package: astral-tokio-tar@0.6.0
Severity: Unknown
URL: GHSA-fp55-jw48-c537

Versions of astral-tokio-tar prior to 0.6.1 contain a PAX header interpretation
bug that allows manipulated entries to be made selectively visible or invisible
during extraction with astral-tokio-tar versus other tar implementations.
An attacker could use this differential to smuggle unexpected files onto a
victim's filesystem.

Patched Versions: >=0.6.1


RUSTSEC-2026-0104: Reachable panic in certificate revocation list parsing

Package: rustls-webpki@0.103.10
Severity: Unknown
URL: null

A panic was reachable when parsing certificate revocation lists via [BorrowedCertRevocationList::from_der]
or [OwnedCertRevocationList::from_der]. This was the result of mishandling a syntactically valid empty
BIT STRING appearing in the onlySomeReasons element of a IssuingDistributionPoint CRL extension.

This panic is reachable prior to a CRL's signature being verified.

Applications that do not use CRLs are not affected.

Thank you to @tynus3 for the report.

Patched Versions: >=0.103.13, <0.104.0-alpha.1, >=0.104.0-alpha.7


RUSTSEC-2026-0098: Name constraints for URI names were incorrectly accepted

Package: rustls-webpki@0.103.10
Severity: Unknown
URL: null

Name constraints for URI names were ignored and therefore accepted.

Note this library does not provide an API for asserting URI names, and URI name constraints are otherwise not implemented. URI name constraints are now rejected unconditionally.

Since name constraints are restrictions on otherwise properly-issued certificates, this bug is reachable only after signature verification and requires misissuance to exploit.

This vulnerability is identified as GHSA-965h-392x-2mh5. Thank you to @1seal for the report.

Patched Versions: >=0.103.12, <0.104.0-alpha.1, >=0.104.0-alpha.6


RUSTSEC-2026-0099: Name constraints were accepted for certificates asserting a wildcard name

Package: rustls-webpki@0.103.10
Severity: Unknown
URL: null

Permitted subtree name constraints for DNS names were accepted for certificates asserting a wildcard name.

This was incorrect because, given a name constraint of accept.example.com, *.example.com could feasibly allow a name of reject.example.com which is outside the constraint.
This is very similar to CVE-2025-61727.

Since name constraints are restrictions on otherwise properly-issued certificates, this bug is reachable only after signature verification and requires misissuance to exploit.

This vulnerability is identified as GHSA-xgp8-3hg3-c2mh. Thank you to @1seal for the report.

Patched Versions: >=0.103.12, <0.104.0-alpha.1, >=0.104.0-alpha.6


This issue was automatically created by the security audit workflow.

Metadata

Metadata

Assignees

No one assigned

    Labels

    dependenciesPull requests that update a dependency filesecurity

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions