Skip to content

fix(root): exclude tar vulnerability#8249

Merged
ravibitgo merged 1 commit intomasterfrom
WP-8127-fix-high-severity-tar-vulnerability-ghsa-qffp-2-rhf-9-h-96-blocking-sdk-release-audit
Mar 5, 2026
Merged

fix(root): exclude tar vulnerability#8249
ravibitgo merged 1 commit intomasterfrom
WP-8127-fix-high-severity-tar-vulnerability-ghsa-qffp-2-rhf-9-h-96-blocking-sdk-release-audit

Conversation

@lokesh-bitgo
Copy link
Contributor

Ticket: WP-8127

Slack ref - https://bitgo.slack.com/archives/C010AEXLLCR/p1772693119445179?thread_ts=1772573311.968949&cid=C010AEXLLCR

Root Cause

The fix for GHSA-qffp-2rhf-9h96 is in tar@7.5.7+. However, lerna requires tar v6 — forcing an upgrade to v7.x breaks lerna's packDirectory API. This is the same constraint that caused 4 prior tar advisories to be excluded in .iyarc:

Why It Is Safe to Exclude

GHSA-qffp-2rhf-9h96 is the same vulnerability class (tar extraction: hardlink/symlink path traversal when extracting malicious archives) as all 4 previously excluded advisories.

BitGo's usage of lerna/yeoman's tar is PACKING only (e.g. lerna publish), never extraction of untrusted archives.

lerna and yeoman-generator are dev-time tools only — not used in production.

The exploitable attack surface (extracting a maliciously crafted archive) does not exist in this repo's use case.

Fix

Add GHSA-qffp-2rhf-9h96 to .iyarc with justification matching the existing tar exclusions:

# Excluded because:
# - Transitive dependency through lerna and yeoman-generator requiring tar < 7.5.7
# - This CVE affects tar's extraction process (hardlink path traversal in crafted archives)
# - Our usage is limited to archive PACKING operations only, not extraction
# - Forcing tar v7.5.7+ breaks lerna's packDirectory API (same constraint as GHSA-8qq5-rm4j-mr97)
GHSA-qffp-2rhf-9h96

@ravibitgo ravibitgo merged commit fef9d50 into master Mar 5, 2026
21 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants