The vulnerability is a classic path traversal issue, often referred to as 'Zip Slip', but in this case, it involves symlinks within a tar archive. The root cause lies in the archive extraction logic in src/pkg/archive/archive.go. Three internal handler functions, defaultHandler, stripHandler, and filterHandler, were responsible for processing archive entries. Each of these functions contained a call to os.Symlink to create symbolic links based on the LinkTarget field provided in the archive. The critical flaw was the failure to validate that the LinkTarget, especially when combined with the destination path, resolved to a location safely within the intended extraction directory. An attacker could craft an archive with a LinkTarget containing '..' sequences to traverse up the directory tree and create a symlink pointing to an arbitrary location on the filesystem. A subsequent entry in the same archive could then write to this symlink, allowing for arbitrary file write. The patch addresses this by replacing the direct, unsafe os.Symlink calls with a new writeEntry function. This new function utilizes the os.Root API, which provides kernel-level protection against path traversal, and adds explicit validation for symlink targets to ensure they are relative and do not escape the root extraction directory.