astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.6 and earlier, malformed PAX extensions were silently skipped when parsing tar archives. This silent skipping (rather than rejection) of invalid PAX extensions could be used as a building block for a parser differential, for example by silently skipping a malformed GNU “long link” extension so that a subsequent parser would misinterpret the extension. In practice, exploiting this behavior in astral-tokio-tar requires a secondary misbehaving tar parser, i.e. one that insufficiently validates malformed PAX extensions and interprets them rather than skipping or erroring on them. This vulnerability is considered low-severity as it requires a separate vulnerability against any unrelated tar parser. This issue has been fixed in version 0.6.0.

Project Subscriptions

Vendors Products
Tokio-tar Subscribe
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6gx3-4362-rf54 astral-tokio-tar insufficiently validates PAX extensions during extraction
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-1286
References
Metrics threat_severity

None

cvssV3_1

{'score': 2.5, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N'}

threat_severity

Low


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Astral
Astral tokio-tar
Vendors & Products Astral
Astral tokio-tar

Fri, 20 Mar 2026 00:15:00 +0000

Type Values Removed Values Added
Description astral-tokio-tar is a tar archive reading/writing library for async Rust. In versions 0.5.6 and earlier, malformed PAX extensions were silently skipped when parsing tar archives. This silent skipping (rather than rejection) of invalid PAX extensions could be used as a building block for a parser differential, for example by silently skipping a malformed GNU “long link” extension so that a subsequent parser would misinterpret the extension. In practice, exploiting this behavior in astral-tokio-tar requires a secondary misbehaving tar parser, i.e. one that insufficiently validates malformed PAX extensions and interprets them rather than skipping or erroring on them. This vulnerability is considered low-severity as it requires a separate vulnerability against any unrelated tar parser. This issue has been fixed in version 0.6.0.
Title astral-tokio-tar insufficiently validates PAX extensions during extraction
Weaknesses CWE-436
References
Metrics cvssV4_0

{'score': 1.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T18:09:06.340Z

Reserved: 2026-03-13T18:53:03.533Z

Link: CVE-2026-32766

cve-icon Vulnrichment

Updated: 2026-03-20T16:56:50.716Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-20T00:16:18.100

Modified: 2026-03-20T13:37:50.737

Link: CVE-2026-32766

cve-icon Redhat

Severity : Low

Publid Date: 2026-03-20T00:07:36Z

Links: CVE-2026-32766 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:14:40Z

Weaknesses