Interpretation Conflict Affecting astral-tokio-tar package, versions <0.6.0


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RUST-ASTRALTOKIOTAR-15679875
  • published18 Mar 2026
  • disclosed17 Mar 2026
  • creditSergei Zimmerman

Introduced: 17 Mar 2026

NewCVE-2026-32766  (opens in a new tab)
CWE-436  (opens in a new tab)

How to fix?

Upgrade astral-tokio-tar to version 0.6.0 or higher.

Overview

Affected versions of this package are vulnerable to Interpretation Conflict in the extraction process. An attacker can cause a parser differential by crafting a tar archive with malformed PAX extensions that are silently skipped, potentially leading a secondary misbehaving tar parser to misinterpret the archive contents. This is only exploitable if a secondary tar parser is used that does not properly validate malformed PAX extensions and interprets them instead of skipping or erroring on them.

References

CVSS Base Scores

version 4.0
version 3.1