Debian Package Tracker
Register | Log in
Subscribe

node-tar

read and write portable tar archives module for Node.js

Choose email to subscribe with

general
  • source: node-tar (main)
  • version: 6.2.1+ds1+~cs6.1.13-7
  • maintainer: Debian Javascript Maintainers (archive) (DMD)
  • uploaders: Jérémy Lal [DMD]
  • arch: all
  • std-ver: 4.7.3
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 6.0.5+ds1+~cs11.3.9-1+deb11u2
  • o-o-sec: 6.0.5+ds1+~cs11.3.9-1+deb11u2
  • oldstable: 6.1.13+~cs7.0.5-1
  • stable: 6.2.1+~cs7.0.8-1
  • testing: 6.2.1+ds1+~cs6.1.13-7
  • unstable: 6.2.1+ds1+~cs6.1.13-7
versioned links
  • 6.0.5+ds1+~cs11.3.9-1+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.1.13+~cs7.0.5-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.2.1+~cs7.0.8-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 6.2.1+ds1+~cs6.1.13-7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • node-tar
action needed
A new upstream version is available: 7.5.9+~cs7.0.87 high
A new upstream version 7.5.9+~cs7.0.87 is available, you should consider packaging it.
Created: 2026-01-18 Last update: 2026-02-22 09:32
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2026-23745: node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
  • CVE-2026-26960: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
Created: 2026-01-17 Last update: 2026-02-20 10:01
3 security issues in bullseye high

There are 3 open security issues in bullseye.

2 important issues:
  • CVE-2026-23745: node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
  • CVE-2026-26960: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
1 issue postponed or untriaged:
  • CVE-2024-28863: (needs triaging) node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.
Created: 2026-01-17 Last update: 2026-02-20 10:01
3 security issues in bookworm high

There are 3 open security issues in bookworm.

2 important issues:
  • CVE-2026-23745: node-tar is a Tar for Node.js. The node-tar library (<= 7.5.2) fails to sanitize the linkpath of Link (hardlink) and SymbolicLink entries when preservePaths is false (the default secure behavior). This allows malicious archives to bypass the extraction root restriction, leading to Arbitrary File Overwrite via hardlinks and Symlink Poisoning via absolute symlink targets. This vulnerability is fixed in 7.5.3.
  • CVE-2026-26960: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
1 issue left for the package maintainer to handle:
  • CVE-2024-28863: (needs triaging) node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders.

You can find information about how to handle this issue in the security team's documentation.

Created: 2024-03-22 Last update: 2026-02-20 10:01
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2026-26960: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
Created: 2026-02-20 Last update: 2026-02-20 10:01
1 security issue in forky high

There is 1 open security issue in forky.

1 important issue:
  • CVE-2026-26960: node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.
Created: 2026-02-20 Last update: 2026-02-20 10:01
lintian reports 3 warnings normal
Lintian reports 3 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2026-01-18 Last update: 2026-02-17 04:46
news
[rss feed]
  • [2026-01-24] node-tar 6.2.1+ds1+~cs6.1.13-7 MIGRATED to testing (Debian testing watch)
  • [2026-01-22] Accepted node-tar 6.2.1+ds1+~cs6.1.13-7 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2026-01-21] node-tar 6.2.1+ds1+~cs6.1.13-6 MIGRATED to testing (Debian testing watch)
  • [2026-01-17] Accepted node-tar 6.2.1+ds1+~cs6.1.13-6 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2026-01-01] node-tar 6.2.1+ds1+~cs6.1.13-5 MIGRATED to testing (Debian testing watch)
  • [2025-12-28] Accepted node-tar 6.2.1+ds1+~cs6.1.13-5 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-12-28] node-tar 6.2.1+ds1+~cs6.1.13-4 MIGRATED to testing (Debian testing watch)
  • [2025-12-25] Accepted node-tar 6.2.1+ds1+~cs6.1.13-4 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-12-25] Accepted node-tar 6.2.1+ds1+~cs6.1.13-3 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-12-25] node-tar 6.2.1+ds1+~cs6.1.13-2 MIGRATED to testing (Debian testing watch)
  • [2025-12-22] Accepted node-tar 6.2.1+ds1+~cs6.1.13-2 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2025-12-03] node-tar 6.2.1+ds1+~cs6.1.13-1 MIGRATED to testing (Debian testing watch)
  • [2025-12-01] Accepted node-tar 6.2.1+ds1+~cs6.1.13-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-08-14] node-tar 6.2.1+~cs7.0.8-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-12] Accepted node-tar 6.2.1+~cs7.0.8-1 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-08-09] Accepted node-tar 6.1.13+~cs7.0.5-4 (source) into unstable (Bastien Roucariès) (signed by: Bastien ROUCARIÈS)
  • [2024-04-05] node-tar 6.1.13+~cs7.0.5-3 MIGRATED to testing (Debian testing watch)
  • [2024-04-03] Accepted node-tar 6.1.13+~cs7.0.5-3 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2024-03-22] Accepted node-tar 6.1.13+~cs7.0.5-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-12-25] node-tar 6.1.13+~cs7.0.5-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-17] Accepted node-tar 6.1.13+~cs7.0.5-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-12-12] Accepted node-tar 4.4.6+ds1-3+deb10u2 (source) into oldstable (Guilhem Moulin)
  • [2022-11-11] node-tar 6.1.12+~cs6.1.5-1 MIGRATED to testing (Debian testing watch)
  • [2022-11-04] Accepted node-tar 6.1.12+~cs6.1.5-1 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-04-16] node-tar 6.1.11+ds1+~cs6.0.6-2 MIGRATED to testing (Debian testing watch)
  • [2022-04-14] Accepted node-tar 6.1.11+ds1+~cs6.0.6-2 (source) into unstable (Yadd) (signed by: Xavier Guimard)
  • [2022-03-07] Accepted node-tar 6.1.11+~cs11.3.10-1~bpo11+1 (source all) into bullseye-backports, bullseye-backports (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2022-03-07] Accepted node-tar 6.1.11+~cs11.2.13-1~bpo11+1 (source all) into bullseye-backports, bullseye-backports (Debian FTP Masters) (signed by: Xavier Guimard)
  • [2022-02-26] node-tar 6.1.11+ds1+~cs6.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2022-02-26] node-tar 6.1.11+ds1+~cs6.0.6-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian (0, 3)
  • buildd: logs, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 6.2.1+ds1+~cs6.1.13-7

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing