FIND-20260329-002 · 2026-03-29 · Innovation Veille
CVE-2026-33056 — Cargo tar crate allows malicious crates to modify filesystem permissions
cve
HIGH
CVE-2026-33056 affects the tar crate used by Cargo to extract packages during builds. A malicious crate could change permissions on arbitrary directories on the filesystem when extracted. Rust 1.94.1 (released 2026-03-26) ships the patched tar crate. For crates.io users, the registry blocked exploitative uploads on 2026-03-13 and audited all historically published crates — no affected crates were found. Users of private or alternate registries should contact their vendor and upgrade to Rust 1.94.1 immediately.
Source
https://blog.rust-lang.org/2026/03/21/cve-2026-33056/
ODS Impact
ODS Rust services (oid, billing-engine, pdf-engine, docstore) all use crates.io exclusively. Risk is LOW — crates.io is patched. Confirm Rust 1.94.1 is used in CI (GitHub Actions). No immediate code change required.
Security Review
License: N/A | Maintenance: ACTIVE | Risk: LOW | Recommendation: SAFE_TO_USE
Tags
cve
rust
cargo
supply-chain
permissions