CVE-2026-33055Type Confusion in Tar-rs

CWE-843Type Confusion9 documents7 sources
Severity
5.1MEDIUMNVD
CNA8.1GHSA8.1OSV8.1
EPSS
0.0%
top 98.60%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 20

Description

tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and below have conditional logic that skips the PAX size header in cases where the base header size is nonzero. As part of CVE-2025-62518, the astral-tokio-tar project was changed to correctly honor PAX size headers in the case where it was different from the base header. This is almost the inverse of the astral-tokio-tar issue. Any discrepancy in how tar parsers honor file size can be used to create archives that appear d

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Packages3 packages

crates.iognu/tar0.0.0-00.4.45+1
CVEListV5alexcrichton/tar-rs< 0.4.45
NVDalexcrichton/tar-rs< 0.4.45

Patches

🔴Vulnerability Details

5
OSV
CVE-2026-33055: tar-rs is a tar archive reading/writing library for Rust2026-03-20
CVEList
tar-rs incorrectly ignores PAX size headers if header size is nonzero2026-03-20
GHSA
tar-rs incorrectly ignores PAX size headers if header size is nonzero2026-03-20
OSV
tar-rs incorrectly ignores PAX size headers if header size is nonzero2026-03-20
OSV
tar-rs incorrectly ignores PAX size headers if header size is nonzero2026-03-19

📋Vendor Advisories

2
Microsoft
tar-rs incorrectly ignores PAX size headers if header size is nonzero2026-03-10
Debian
CVE-2026-33055: rust-tar - tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and be...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-33055 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-33055 — Type Confusion in Alexcrichton Tar-rs | cvebase