ESB-2026.4426
PUBLISHED
CVSS 8.199999809265137 HIGH
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2026.4426
node-tar security update
30 April 2026
===========================================================================
AUSCERT Security Bulletin Summary
---------------------------------
Product: node-tar
Publisher: Debian
Operating System: Debian GNU/Linux
Resolution: Patch/Upgrade
CVE Names: CVE-2024-28863 CVE-2026-26960 CVE-2026-24842
CVE-2026-23745 CVE-2026-31802 CVE-2026-29786
Original Bulletin:
https://lists.debian.org/debian-lts-announce/2026/04/msg00033.html
Comment: CVSS (Max): 8.2 CVE-2026-24842 (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N)
CVSS Source: [GitHub], NIST
Calculator: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N
EPSS (Max): 0.6% (70th) CVE-2024-28863 2026-04-29
- --------------------------BEGIN INCLUDED TEXT--------------------
-------------------------------------------------------------------------
Debian LTS Advisory DLA-4552-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Daniel Leidert
April 29, 2026 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : node-tar
Version : 6.0.5+ds1+~cs11.3.9-1+deb11u3
CVE ID : CVE-2024-28863 CVE-2026-23745 CVE-2026-24842 CVE-2026-26960
CVE-2026-29786 CVE-2026-31802
Multiple vulnerabilities have been discovered in node-tar, a Node.js
module to read and write portable tar archives.
CVE-2024-28863
Generating a large number of sub-folders can consume memory on the
system and even crash the Node.js client within a few seconds using
a path with too many sub-folders inside.
CVE-2026-23745
When preservePaths is false, the linkpath of Link (hardlink) and
SymbolicLink entries fail to be sanitized, allowing malicious
archives to bypass the extraction root restriction, leading to
arbitrary file overwrites via hardlinks and symlink poisoning via
absolute symlink targets.
The fix for this issue introduces multiple of the following
vulnerabilties.
CVE-2026-24842
The security check for hardlink entries allows an attacker to craft
a malicious TAR archive that bypasses path traversal protections and
creates hardlinks to arbitrary files outside the extraction
directory.
CVE-2026-26960
An attacker-controlled archive can create a hardlink inside the
extraction directory that points to a file outside the extraction
root, enabling arbitrary file read and write as the extracting user.
CVE-2026-29786
An attacker-controlled archive can create a hardlink that points
outside the extraction directory by using a drive-relative link
target.
CVE-2026-31802
An attacker-controlled archive can create a hardlink that points
outside the extraction directory by using a drive-relative link
target.
For Debian 11 bullseye, these problems have been fixed in version
6.0.5+ds1+~cs11.3.9-1+deb11u3.
We recommend that you upgrade your node-tar packages.
For the detailed security status of node-tar please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/node-tar
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- --------------------------END INCLUDED TEXT----------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AUSCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AUSCERT's members. As
AUSCERT did not write the document quoted above, AUSCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AUSCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://portal.auscert.org.au/bulletins/
===========================================================================
AUSCERT
The University of Queensland, Brisbane QLD 4072 Australia
e: auscert@auscert.org.au
t: +61 (0)7 3365 4417
Allies in Cyber Security
===========================================================================