Your message dated Thu, 09 Sep 2021 16:19:29 +0000
with message-id <[email protected]>
and subject line Bug#993981: fixed in node-tar 6.1.11+~cs11.3.10-1
has caused the Debian Bug report #993981,
regarding node-tar: CVE-2021-37712
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
993981: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=993981
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: node-tar
Version: 6.1.7+~cs11.3.10-1
Severity: important
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for node-tar.

CVE-2021-37712[0]:
| The npm package "tar" (aka node-tar) before versions 4.4.18, 5.0.10,
| and 6.1.9 has an arbitrary file creation/overwrite and arbitrary code
| execution vulnerability. node-tar aims to guarantee that any file
| whose location would be modified by a symbolic link is not extracted.
| This is, in part, achieved by ensuring that extracted directories are
| not symlinks. Additionally, in order to prevent unnecessary stat calls
| to determine whether a given path is a directory, paths are cached
| when directories are created. This logic was insufficient when
| extracting tar files that contained both a directory and a symlink
| with names containing unicode values that normalized to the same
| value. Additionally, on Windows systems, long path portions would
| resolve to the same file system entities as their 8.3 "short path"
| counterparts. A specially crafted tar archive could thus include a
| directory with one form of the path, followed by a symbolic link with
| a different string that resolves to the same file system entity,
| followed by a file using the first form. By first creating a
| directory, and then replacing that directory with a symlink that had a
| different apparent name that resolved to the same entry in the
| filesystem, it was thus possible to bypass node-tar symlink checks on
| directories, essentially allowing an untrusted tar file to symlink
| into an arbitrary location and subsequently extracting arbitrary files
| into that location, thus allowing arbitrary file creation and
| overwrite. These issues were addressed in releases 4.4.18, 5.0.10 and
| 6.1.9. The v3 branch of node-tar has been deprecated and did not
| receive patches for these issues. If you are still using a v3 release
| we recommend you update to a more recent version of node-tar. If this
| is not possible, a workaround is available in the referenced GHSA-
| qq89-hq3f-393p.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-37712
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37712
[1] https://github.com/npm/node-tar/security/advisories/GHSA-qq89-hq3f-393p

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: node-tar
Source-Version: 6.1.11+~cs11.3.10-1
Done: Yadd <[email protected]>

We believe that the bug you reported is fixed in the latest version of
node-tar, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Yadd <[email protected]> (supplier of updated node-tar package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 09 Sep 2021 17:59:33 +0200
Source: node-tar
Architecture: source
Version: 6.1.11+~cs11.3.10-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Javascript Maintainers 
<[email protected]>
Changed-By: Yadd <[email protected]>
Closes: 993981
Changes:
 node-tar (6.1.11+~cs11.3.10-1) unstable; urgency=medium
 .
   * Team upload
   * Declare compliance with policy 4.6.0
   * New upstream version 6.1.11+~cs11.3.10 (Closes: #993981, CVE-2021-37712)
   * Update excluded tests (need tap ≥ 14)
Checksums-Sha1: 
 c4b128fcfccd8273925d4df6af04d97721ea1eda 3489 node-tar_6.1.11+~cs11.3.10-1.dsc
 24db077a0a6c3c707c576aa218cc18adef0d34ac 35270 
node-tar_6.1.11+~cs11.3.10.orig-fs-minipass.tar.gz
 601a95c4cb1d2976072c1720338de85757fc7a74 50240 
node-tar_6.1.11+~cs11.3.10.orig-minipass.tar.gz
 516fc8a8b9661b375ecb00113f1c6165dd43b623 186712 
node-tar_6.1.11+~cs11.3.10.orig-minizlib.tar.gz
 5f953f183e36a15c6ce3f336568f6051b7b183f3 6515 
node-tar_6.1.11+~cs11.3.10.orig-types-tar.tar.gz
 97df3bbe4ff470091c371c7e317f2d8b93f9a32c 225903 
node-tar_6.1.11+~cs11.3.10.orig.tar.gz
 aa5264cb2133a3e6083a7c77bf28107a098f1c92 8640 
node-tar_6.1.11+~cs11.3.10-1.debian.tar.xz
Checksums-Sha256: 
 43b6d06a0e51958c0398ceb9fff254eaadeb29a7096a250c21bd123a97802110 3489 
node-tar_6.1.11+~cs11.3.10-1.dsc
 83cf7dc113dacdbe3a2d05753edde01c37256cc97167ea5a8086ab85a78f2efd 35270 
node-tar_6.1.11+~cs11.3.10.orig-fs-minipass.tar.gz
 496598d78b824ddb3116c4a4fe0123516b318eab820d0ee80cb892ef3ba0c4c9 50240 
node-tar_6.1.11+~cs11.3.10.orig-minipass.tar.gz
 296f5e559312e7a4dd871e1cdad27d50d9d0518a548ae870dffb678ff2ecae7e 186712 
node-tar_6.1.11+~cs11.3.10.orig-minizlib.tar.gz
 3e97385fb828dfc00ff02f9b30a31a20c737404096cdb006cf7083157c7e1a5d 6515 
node-tar_6.1.11+~cs11.3.10.orig-types-tar.tar.gz
 2b5fdf6749268d712dc232b109d94359c42a864a4103a051324150fabbaf4f17 225903 
node-tar_6.1.11+~cs11.3.10.orig.tar.gz
 88b0405c9e31565c57f42eb172c592a6173a0a4fafdd43395fa34bd82d8da1f9 8640 
node-tar_6.1.11+~cs11.3.10-1.debian.tar.xz
Files: 
 48a071b91ee2d62ff5723e95e99e3106 3489 javascript optional 
node-tar_6.1.11+~cs11.3.10-1.dsc
 4885211b9cf2f530a54e6a725cc9556f 35270 javascript optional 
node-tar_6.1.11+~cs11.3.10.orig-fs-minipass.tar.gz
 b49657e3714f92ab73a7deb5aca36f53 50240 javascript optional 
node-tar_6.1.11+~cs11.3.10.orig-minipass.tar.gz
 389dc4b3f49e5c28a485f2243aa021c6 186712 javascript optional 
node-tar_6.1.11+~cs11.3.10.orig-minizlib.tar.gz
 bbd2333b527227358e720aac52e97f93 6515 javascript optional 
node-tar_6.1.11+~cs11.3.10.orig-types-tar.tar.gz
 2416f9f3b0d58e97aeac2a2b9c818e88 225903 javascript optional 
node-tar_6.1.11+~cs11.3.10.orig.tar.gz
 00ef4f081aefa75d26e7d866c8f4814f 8640 javascript optional 
node-tar_6.1.11+~cs11.3.10-1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=0PyA
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to