DEBIAN-CVE-2026-23745

Source
https://security-tracker.debian.org/tracker/CVE-2026-23745
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23745.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2026-23745
Upstream
Published
2026-01-16T22:16:26.830Z
Modified
2026-03-11T07:38:15.039885Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N CVSS Calculator
Summary
[none]
Details

node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.

References

Affected packages

Debian:11 / node-tar

Package

Name
node-tar
Purl
pkg:deb/debian/node-tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.0.5+ds1+~cs11.3.9-1
6.0.5+ds1+~cs11.3.9-1+deb11u1
6.0.5+ds1+~cs11.3.9-1+deb11u2
6.1.0+ds1+~cs11.3.9-1
6.1.7+~cs11.3.10-1
6.1.11+~cs11.2.13-1~bpo11+1
6.1.11+~cs11.3.10-1~bpo11+1
6.1.11+~cs11.3.10-1
6.1.11+ds1+~cs6.0.6-1
6.1.11+ds1+~cs6.0.6-2
6.1.12+~cs6.1.5-1
6.1.13+~cs7.0.5-1
6.1.13+~cs7.0.5-2
6.1.13+~cs7.0.5-3
6.1.13+~cs7.0.5-4
6.2.1+~cs7.0.8-1
6.2.1+ds1+~cs6.1.13-1
6.2.1+ds1+~cs6.1.13-2
6.2.1+ds1+~cs6.1.13-3
6.2.1+ds1+~cs6.1.13-4
6.2.1+ds1+~cs6.1.13-5
6.2.1+ds1+~cs6.1.13-6
6.2.1+ds1+~cs6.1.13-7
6.2.1+ds1+~cs6.1.13-8

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23745.json"

Debian:12 / node-tar

Package

Name
node-tar
Purl
pkg:deb/debian/node-tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.1.13+~cs7.0.5-1
6.1.13+~cs7.0.5-2
6.1.13+~cs7.0.5-3
6.1.13+~cs7.0.5-4
6.2.1+~cs7.0.8-1
6.2.1+ds1+~cs6.1.13-1
6.2.1+ds1+~cs6.1.13-2
6.2.1+ds1+~cs6.1.13-3
6.2.1+ds1+~cs6.1.13-4
6.2.1+ds1+~cs6.1.13-5
6.2.1+ds1+~cs6.1.13-6
6.2.1+ds1+~cs6.1.13-7
6.2.1+ds1+~cs6.1.13-8

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23745.json"

Debian:13 / node-tar

Package

Name
node-tar
Purl
pkg:deb/debian/node-tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.2.1+~cs7.0.8-1
6.2.1+ds1+~cs6.1.13-1
6.2.1+ds1+~cs6.1.13-2
6.2.1+ds1+~cs6.1.13-3
6.2.1+ds1+~cs6.1.13-4
6.2.1+ds1+~cs6.1.13-5
6.2.1+ds1+~cs6.1.13-6
6.2.1+ds1+~cs6.1.13-7
6.2.1+ds1+~cs6.1.13-8

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23745.json"

Debian:14 / node-tar

Package

Name
node-tar
Purl
pkg:deb/debian/node-tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.2.1+ds1+~cs6.1.13-6

Affected versions

6.*
6.2.1+~cs7.0.8-1
6.2.1+ds1+~cs6.1.13-1
6.2.1+ds1+~cs6.1.13-2
6.2.1+ds1+~cs6.1.13-3
6.2.1+ds1+~cs6.1.13-4
6.2.1+ds1+~cs6.1.13-5

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23745.json"