DEBIAN-CVE-2026-26960

Source
https://security-tracker.debian.org/tracker/CVE-2026-26960
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26960.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-26960
Upstream
Published
2026-02-20T02:16:53.883Z
Modified
2026-03-10T10:00:10.365017Z
Severity
  • 7.1 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N CVSS Calculator
Summary
[none]
Details

node-tar is a full-featured Tar for Node.js. When using default options in versions 7.5.7 and below, an attacker-controlled archive can create a hardlink inside the extraction directory that points to a file outside the extraction root, enabling arbitrary file read and write as the extracting user. Severity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive. This issue has been fixed in version 7.5.8.

References

Affected packages

Debian:11 / node-tar

Package

Name
node-tar
Purl
pkg:deb/debian/node-tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.0.5+ds1+~cs11.3.9-1
6.0.5+ds1+~cs11.3.9-1+deb11u1
6.0.5+ds1+~cs11.3.9-1+deb11u2
6.1.0+ds1+~cs11.3.9-1
6.1.7+~cs11.3.10-1
6.1.11+~cs11.2.13-1~bpo11+1
6.1.11+~cs11.3.10-1~bpo11+1
6.1.11+~cs11.3.10-1
6.1.11+ds1+~cs6.0.6-1
6.1.11+ds1+~cs6.0.6-2
6.1.12+~cs6.1.5-1
6.1.13+~cs7.0.5-1
6.1.13+~cs7.0.5-2
6.1.13+~cs7.0.5-3
6.1.13+~cs7.0.5-4
6.2.1+~cs7.0.8-1
6.2.1+ds1+~cs6.1.13-1
6.2.1+ds1+~cs6.1.13-2
6.2.1+ds1+~cs6.1.13-3
6.2.1+ds1+~cs6.1.13-4
6.2.1+ds1+~cs6.1.13-5
6.2.1+ds1+~cs6.1.13-6
6.2.1+ds1+~cs6.1.13-7
6.2.1+ds1+~cs6.1.13-8

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26960.json"

Debian:12 / node-tar

Package

Name
node-tar
Purl
pkg:deb/debian/node-tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.1.13+~cs7.0.5-1
6.1.13+~cs7.0.5-2
6.1.13+~cs7.0.5-3
6.1.13+~cs7.0.5-4
6.2.1+~cs7.0.8-1
6.2.1+ds1+~cs6.1.13-1
6.2.1+ds1+~cs6.1.13-2
6.2.1+ds1+~cs6.1.13-3
6.2.1+ds1+~cs6.1.13-4
6.2.1+ds1+~cs6.1.13-5
6.2.1+ds1+~cs6.1.13-6
6.2.1+ds1+~cs6.1.13-7
6.2.1+ds1+~cs6.1.13-8

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26960.json"

Debian:13 / node-tar

Package

Name
node-tar
Purl
pkg:deb/debian/node-tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

6.*
6.2.1+~cs7.0.8-1
6.2.1+ds1+~cs6.1.13-1
6.2.1+ds1+~cs6.1.13-2
6.2.1+ds1+~cs6.1.13-3
6.2.1+ds1+~cs6.1.13-4
6.2.1+ds1+~cs6.1.13-5
6.2.1+ds1+~cs6.1.13-6
6.2.1+ds1+~cs6.1.13-7
6.2.1+ds1+~cs6.1.13-8

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26960.json"

Debian:14 / node-tar

Package

Name
node-tar
Purl
pkg:deb/debian/node-tar?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.2.1+ds1+~cs6.1.13-8

Affected versions

6.*
6.2.1+~cs7.0.8-1
6.2.1+ds1+~cs6.1.13-1
6.2.1+ds1+~cs6.1.13-2
6.2.1+ds1+~cs6.1.13-3
6.2.1+ds1+~cs6.1.13-4
6.2.1+ds1+~cs6.1.13-5
6.2.1+ds1+~cs6.1.13-6
6.2.1+ds1+~cs6.1.13-7

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-26960.json"