CVE-2026-24842 node-tar: Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal#648
CVE-2026-24842 node-tar: Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal#648sbouchet wants to merge 9 commits intoche-incubator:mainfrom
Conversation
3b28b84 to
4262a4d
Compare
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
3 similar comments
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
RomanNikitenko
left a comment
There was a problem hiding this comment.
The problem is fixed from the security point of view.
I just noticed that gulp-untar@0.0.7 requires tar@2.2.2,
but we override it to 7.5.7
2.2.2 => 7.5.7 = too big difference = some risk
At the same time gulp-untar@0.0.7 was published 8 years ago, so no chance to get it updated to fix the problem. So, only replacing gulp-untar by another dependency could be an alternative solution...
one possible solution might be to use https://www.npmjs.com/package/gulp-decompress |
|
@sbouchet |
via Hardlink Path Traversal Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
so i'll rework this PR to bump to at least |
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
138f824 to
43252f8
Compare
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
|
forgot to add rebase rules for source code. please wait for PR to be ready for review |
Signed-off-by: Stephane Bouchet <sbouchet@redhat.com>
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
|
Pull Request images published ✨ Editor amd64: quay.io/che-incubator-pull-requests/che-code:pr-648-amd64 |
| "gulp-azure-storage": "^0.12.1", | ||
| "gulp-bom": "^3.0.0", | ||
| "gulp-buffer": "0.0.2", | ||
| "gulp-decompress": "^3.0.0", |
There was a problem hiding this comment.
rebasing rule should be added for this change
| "gulp-replace": "^0.5.4", | ||
| "gulp-sourcemaps": "^3.0.0", | ||
| "gulp-svgmin": "^4.1.0", | ||
| "gulp-untar": "^0.0.7", |
There was a problem hiding this comment.
no rebasing rule for this change
What does this PR do?
This PR fixes GHSA-34x7-hfp2-rc4v : Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal.
tarversion is updated to7.5.8What issues does this PR fix?
https://issues.redhat.com/browse/CRW-10039
https://issues.redhat.com/browse/CRW-10249
also
fixes https://github.com/che-incubator/che-code/security/dependabot/6
fixes https://github.com/che-incubator/che-code/security/dependabot/58
fixes https://github.com/che-incubator/che-code/security/dependabot/62
fixes https://github.com/che-incubator/che-code/security/dependabot/7
fixes https://github.com/che-incubator/che-code/security/dependabot/4
fixes https://github.com/che-incubator/che-code/security/dependabot/54
fixes https://github.com/che-incubator/che-code/security/dependabot/5
fixes https://github.com/che-incubator/che-code/security/dependabot/57
fixes https://github.com/che-incubator/che-code/security/dependabot/45
fixes https://github.com/che-incubator/che-code/security/dependabot/44
How to test this PR?
Does this PR contain changes that override default upstream Code-OSS behavior?
git rebasewere added to the .rebase folder