CVE-2026-24842 node-tar: Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal#648
CVE-2026-24842 node-tar: Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal#648sbouchet wants to merge 7 commits intoche-incubator:mainfrom
Conversation
3b28b84 to
4262a4d
Compare
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
3 similar comments
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
RomanNikitenko
left a comment
There was a problem hiding this comment.
The problem is fixed from the security point of view.
I just noticed that gulp-untar@0.0.7 requires tar@2.2.2,
but we override it to 7.5.7
2.2.2 => 7.5.7 = too big difference = some risk
At the same time gulp-untar@0.0.7 was published 8 years ago, so no chance to get it updated to fix the problem. So, only replacing gulp-untar by another dependency could be an alternative solution...
one possible solution might be to use https://www.npmjs.com/package/gulp-decompress |
|
@sbouchet |
via Hardlink Path Traversal Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
so i'll rework this PR to bump to at least 7.5.8 |
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
138f824 to
43252f8
Compare
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
|
forgot to add rebase rules for source code. please wait for PR to be ready for review |
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
What does this PR do?
This PR fixes GHSA-34x7-hfp2-rc4v : Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal.
tarversion is updated to7.5.7What issues does this PR fix?
https://issues.redhat.com/browse/CRW-10039
How to test this PR?
Does this PR contain changes that override default upstream Code-OSS behavior?
git rebasewere added to the .rebase folder