Description
The "tarfile" module would still apply normalization of AREGTYPE (\x00) blocks to DIRTYPE, even while processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a crafted tar archive being misinterpreted by the tarfile module compared to other implementations.
Published: 2026-03-12
Score: 2 Low
EPSS: < 1% Very Low
KEV: No
Impact: Improper tar archive extraction leading to potential directory misinterpretation
Action: Assess
AI Analysis

Impact

The vulnerability resides in Python's tarfile module, where it incorrectly normalizes AREGTYPE (\x00) blocks to DIRTYPE during processing of GNUTYPE_LONGNAME or GNUTYPE_LONGLINK entries. This flaw means a crafted tar archive could be misinterpreted by the module when compared to other implementations, potentially resulting in unexpected file extraction paths or data corruption. The weakness aligns with CWE-20 (Improper Input Validation), CWE-434 (Unrestricted Upload of File with Dangerous Type), and CWE-74 (URL Manipulation). As no remote code execution or denial‑of‑service impact is explicitly noted, the primary consequence is incorrect extraction behavior, which may expose files to unintended locations or overwrite existing data.

Affected Systems

Affected product: Python Software Foundation CPython (specifically the tarfile module). The exposure applies to any Python installation that includes the tarfile module before the fix present in the referenced commit (42d754e). No specific version range is listed in the data; thus any CPython release prior to the patch that processes these GNU tar types is potentially impacted.

Risk and Exploitability

The CVSS score is 2.0, indicating low severity. The EPSS score is less than 1%, reflecting a low likelihood of exploitation in the wild, and the vulnerability is not listed in CISA's KEV catalog. Likely attack vectors involve an attacker supplying a malicious tar archive to a Python application that unconditionally extracts archives, relying on the incorrect normalization to cause misplacement of extracted files. No additional exploitation chain is described in the data, and the vulnerability does not appear to allow privilege escalation or remote code execution.

Generated by OpenCVE AI on March 18, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the Python version you are running against the fix commit (42d754e) and any releases that incorporate it.
  • If a patched Python release is available, upgrade to that version or apply the relevant security update.
  • In the interim, restrict the extraction of tar archives to files from trusted sources and validate member names before extraction to prevent directory traversal or accidental overwrites.

Generated by OpenCVE AI on March 18, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 19 Mar 2026 18:15:00 +0000


Fri, 13 Mar 2026 19:30:00 +0000


Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Python
Python cpython
Vendors & Products Python
Python cpython

Thu, 12 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-20
CWE-434
CWE-74
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Description The "tarfile" module would still apply normalization of AREGTYPE (\x00) blocks to DIRTYPE, even while processing a multi-block member such as GNUTYPE_LONGNAME or GNUTYPE_LONGLINK. This could result in a crafted tar archive being misinterpreted by the tarfile module compared to other implementations.
Title tarfile: Skip DIRTYPE normalization during GNU LONGNAME/LONGLINK handling
References
Metrics cvssV4_0

{'score': 2, 'vector': 'CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: PSF

Published:

Updated: 2026-03-19T18:05:48.721Z

Reserved: 2025-11-19T22:05:07.578Z

Link: CVE-2025-13462

cve-icon Vulnrichment

Updated: 2026-03-12T19:08:36.509Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T18:16:21.397

Modified: 2026-03-19T18:16:14.297

Link: CVE-2025-13462

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:48:39Z

Weaknesses