{
  "document": {
    "aggregate_severity": {
      "text": "Medium"
    },
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/centos6els/vex/2026/cve-2026-23950-els_os-centos6els.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-02-26T22:30:41Z",
      "generator": {
        "date": "2026-02-26T22:30:41Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CVE-2026-23950-ELS_OS-CENTOS6ELS",
      "initial_release_date": "2026-01-20T01:15:00Z",
      "revision_history": [
        {
          "date": "2026-01-20T01:15:00Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-02-26T22:30:41Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "Security update on CVE-2026-23950"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Community Enterprise Operating System 6",
                "product": {
                  "name": "Community Enterprise Operating System 6",
                  "product_id": "CentOS-6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:centos:centos:6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Community Enterprise Operating System"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tar-2:1.23-15.el6_8.x86_64",
                "product": {
                  "name": "tar-2:1.23-15.el6_8.x86_64",
                  "product_id": "tar-2:1.23-15.el6_8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/centos/tar@1.23-15.el6_8?arch=x86_64&epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "Red Hat, Inc."
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tar-2:1.23-15.el6_8.tuxcare.els1.x86_64",
                "product": {
                  "name": "tar-2:1.23-15.el6_8.tuxcare.els1.x86_64",
                  "product_id": "tar-2:1.23-15.el6_8.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/tar@1.23-15.el6_8.tuxcare.els1?arch=x86_64&epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tar-2:1.23-15.el6_8.tuxcare.els1.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:tar-2:1.23-15.el6_8.tuxcare.els1.x86_64"
        },
        "product_reference": "tar-2:1.23-15.el6_8.tuxcare.els1.x86_64",
        "relates_to_product_reference": "CentOS-6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tar-2:1.23-15.el6_8.x86_64 as a component of Community Enterprise Operating System 6",
          "product_id": "CentOS-6:tar-2:1.23-15.el6_8.x86_64"
        },
        "product_reference": "tar-2:1.23-15.el6_8.x86_64",
        "relates_to_product_reference": "CentOS-6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-23950",
      "cwe": {
        "id": "CWE-176",
        "name": "Improper Handling of Unicode Encoding"
      },
      "notes": [
        {
          "category": "description",
          "text": "node-tar,a Tar for Node.js, has a race condition vulnerability in versions up to and including 7.5.3. This is due to an incomplete handling of Unicode path collisions in the `path-reservations` system. On case-insensitive or normalization-insensitive filesystems (such as macOS APFS, In which it has been tested), the library fails to lock colliding paths (e.g., `ß` and `ss`), allowing them to be processed in parallel. This bypasses the library's internal concurrency safeguards and permits Symlink Poisoning attacks via race conditions. The library uses a `PathReservations` system to ensure that metadata checks and file operations for the same path are serialized. This prevents race conditions where one entry might clobber another concurrently. This is a Race Condition which enables Arbitrary File Overwrite. This vulnerability affects users and systems using node-tar on macOS (APFS/HFS+). Because of using `NFD` Unicode normalization (in which `ß` and `ss` are different), conflicting paths do not have their order properly preserved under filesystems that ignore Unicode normalization (e.g., APFS (in which `ß` causes an inode collision with `ss`)). This enables an attacker to circumvent internal parallelization locks (`PathReservations`) using conflicting filenames within a malicious tar archive. The patch in version 7.5.4 updates `path-reservations.js` to use a normalization form that matches the target filesystem's behavior (e.g., `NFKD`), followed by first `toLocaleLowerCase('en')` and then `toLocaleUpperCase('en')`. As a workaround, users who cannot upgrade promptly, and who are programmatically using `node-tar` to extract arbitrary tarball data should filter out all `SymbolicLink` entries (as npm does) to defend against arbitrary file writes via this file system entry name collision issue.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "known_affected": [
          "CentOS-6:tar-2:1.23-15.el6_8.tuxcare.els1.x86_64",
          "CentOS-6:tar-2:1.23-15.el6_8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-23950"
        },
        {
          "category": "external",
          "summary": "https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6",
          "url": "https://github.com/isaacs/node-tar/commit/3b1abfae650056edfabcbe0a0df5954d390521e6"
        },
        {
          "category": "external",
          "summary": "https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w",
          "url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-r6q2-hw4h-h46w"
        }
      ],
      "release_date": "2026-01-20T01:15:00Z",
      "remediations": [
        {
          "category": "no_fix_planned",
          "details": "This issue only manifests on case- or normalization-insensitive filesystems such as macOS APFS/HFS+, while standard Linux server filesystems (ext4/xfs/btrfs) are case‑sensitive and do not perform Unicode normalization, so the Unicode path-collision primitive required for the race does not exist. It is further reachable only when a Node.js workload uses node‑tar to extract untrusted archives and permits symbolic links, narrowing exposure to specific application behaviors rather than the OS baseline. Given these strict preconditions and the fact that the impact is limited to integrity (arbitrary file overwrite) without confidentiality or availability effects, this CVE can be safely deprioritized for centrally managed Linux VMs/servers.",
          "product_ids": [
            "CentOS-6:tar-2:1.23-15.el6_8.tuxcare.els1.x86_64",
            "CentOS-6:tar-2:1.23-15.el6_8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CentOS-6:tar-2:1.23-15.el6_8.tuxcare.els1.x86_64",
            "CentOS-6:tar-2:1.23-15.el6_8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    }
  ]
}