CVE-2026-33055

EUVD-2026-13596
tar-rs is a tar archive reading/writing library for Rust. Versions 0.4.44 and below have conditional logic that skips the PAX size header in cases where the base header size is nonzero. As part of CVE-2025-62518, the astral-tokio-tar project was changed to correctly honor PAX size headers in the case where it was different from the base header. This is almost the inverse of the astral-tokio-tar issue. Any discrepancy in how tar parsers honor file size can be used to create archives that appear differently when unpacked by different archivers. In this case, the tar-rs (Rust tar) crate is an outlier in checking for the header size - other tar parsers (including e.g. Go archive/tar) unconditionally use the PAX size override. This can affect anything that uses the tar crate to parse archives and expects to have a consistent view with other parsers. This issue has been fixed in version 0.4.45.
Type Confusion
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
8.1 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
alexcrichtontar-rs
𝑥
< 0.4.45
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
rust-tar
bookworm
vulnerable
bullseye
vulnerable
forky
0.4.45-1
fixed
sid
0.4.45-2
fixed
trixie
vulnerable
rustc
bookworm
vulnerable
bullseye
vulnerable
forky
vulnerable
sid
1.92.0+dfsg1-2
fixed
trixie
vulnerable
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
rust-tar
focal
needs-triage
jammy
needs-triage
noble
needs-triage
questing
needs-triage