Bug 2449677 - CVE-2026-33056 fido-device-onboard: tar-rs: Arbitrary directory permission modification via crafted tar archive [fedora-all]
Summary: CVE-2026-33056 fido-device-onboard: tar-rs: Arbitrary directory permission mo...
Keywords:
Status: NEW
Alias: None
Product: Fedora
Classification: Fedora
Component: fido-device-onboard
Version: rawhide
Hardware: Unspecified
OS: Unspecified
medium
medium
Target Milestone: ---
Assignee: Peter Robinson
QA Contact:
URL:
Whiteboard: {"flaws": ["e52268c3-21cf-4253-ace1-1...
Depends On:
Blocks: CVE-2026-33056
TreeView+ depends on / blocked
 
Reported: 2026-03-20 17:55 UTC by Jon Moroney
Modified: 2026-03-22 07:40 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Type: ---
Embargoed:


Attachments (Terms of Use)

Description Jon Moroney 2026-03-20 17:55:31 UTC
Disclaimer: Community trackers are created by Red Hat Product Security team on a best effort basis. Package maintainers are required to ascertain if the flaw indeed affects their package, before starting the update process.

Comment 1 Ben Beasley 2026-03-22 07:40:49 UTC
More information is available at https://www.cve.org/CVERecord?id=CVE-2026-33056. This flaw is fixed in version 0.4.45 of the tar crate. Updates for rust-tar-0.4.45 are in testing for all Fedora and EPEL branches, and buildroot overrides are active. Therefore, you can fix this in Fedora at any time by simply rebuilding fido-device-onboard. I’m not going to do that now because rust-sig is not a co-maintainer, but I can do it as provenpackager if you ask me to. In RHEL, where the package uses vendored Rust crate dependencies, you would need to fix this separately within the package’s dependency bundle.


Note You need to log in before you can comment on or make changes to this bug.