Severity
1.7LOWNVD
EPSS
0.0%
top 94.85%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 20

Description

astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.6 and earlier, malformed PAX extensions were silently skipped when parsing tar archives. This silent skipping (rather than rejection) of invalid PAX extensions could be used as a building block for a parser differential, for example by silently skipping a malformed GNU “long link” extension so that a subsequent parser would misinterpret the extension. In practice, exploiting this behavior in astral-tokio-ta

CVSS vector

CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages1 packages

CVEListV5astral-sh/tokio-tar< 0.6.0

🔴Vulnerability Details

6
CVEList
astral-tokio-tar insufficiently validates PAX extensions during extraction2026-03-20
OSV
CVE-2026-32766: astral-tokio-tar is a tar archive reading/writing library for async Rust2026-03-20
OSV
astral-tokio-tar insufficiently validates PAX extensions during extraction2026-03-17
OSV
Insufficient validation of PAX extensions during extraction2026-03-17
GHSA
astral-tokio-tar insufficiently validates PAX extensions during extraction2026-03-17

📋Vendor Advisories

3
Red Hat
astral-tokio-tar: astral-tokio-tar: Potential archive misinterpretation via malformed PAX extensions2026-03-20
Microsoft
astral-tokio-tar insufficiently validates PAX extensions during extraction2026-03-10
Debian
CVE-2026-32766: rust-astral-tokio-tar - astral-tokio-tar is a tar archive reading/writing library for async Rust. In ver...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-32766 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-32766 — Interpretation Conflict in Tokio-tar | cvebase