Impact
The vulnerability resides in Python's tarfile module, where it incorrectly normalizes AREGTYPE (\x00) blocks to DIRTYPE during processing of GNUTYPE_LONGNAME or GNUTYPE_LONGLINK entries. This flaw means a crafted tar archive could be misinterpreted by the module when compared to other implementations, potentially resulting in unexpected file extraction paths or data corruption. The weakness aligns with CWE-20 (Improper Input Validation), CWE-434 (Unrestricted Upload of File with Dangerous Type), and CWE-74 (URL Manipulation). As no remote code execution or denial‑of‑service impact is explicitly noted, the primary consequence is incorrect extraction behavior, which may expose files to unintended locations or overwrite existing data.
Affected Systems
Affected product: Python Software Foundation CPython (specifically the tarfile module). The exposure applies to any Python installation that includes the tarfile module before the fix present in the referenced commit (42d754e). No specific version range is listed in the data; thus any CPython release prior to the patch that processes these GNU tar types is potentially impacted.
Risk and Exploitability
The CVSS score is 2.0, indicating low severity. The EPSS score is less than 1%, reflecting a low likelihood of exploitation in the wild, and the vulnerability is not listed in CISA's KEV catalog. Likely attack vectors involve an attacker supplying a malicious tar archive to a Python application that unconditionally extracts archives, relying on the incorrect normalization to cause misplacement of extracted files. No additional exploitation chain is described in the data, and the vulnerability does not appear to allow privilege escalation or remote code execution.
OpenCVE Enrichment