]> git.ipfire.org Git - thirdparty/openembedded/openembedded-core.git/commitdiff
libarchive: fix CVE-2025-60753 regression
authorPeter Marko <peter.marko@siemens.com>
Sat, 10 Jan 2026 13:06:07 +0000 (14:06 +0100)
committerPaul Barker <paul@pbarker.dev>
Mon, 26 Jan 2026 09:00:05 +0000 (09:00 +0000)
Pick patch from PR mentioned in v3.8.5 release notes.

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Yoann Congal <yoann.congal@smile.fr>
Signed-off-by: Paul Barker <paul@pbarker.dev>
meta/recipes-extended/libarchive/libarchive/CVE-2025-60753-01.patch [moved from meta/recipes-extended/libarchive/libarchive/CVE-2025-60753.patch with 100% similarity]
meta/recipes-extended/libarchive/libarchive/CVE-2025-60753-02.patch [new file with mode: 0644]
meta/recipes-extended/libarchive/libarchive_3.6.2.bb

diff --git a/meta/recipes-extended/libarchive/libarchive/CVE-2025-60753-02.patch b/meta/recipes-extended/libarchive/libarchive/CVE-2025-60753-02.patch
new file mode 100644 (file)
index 0000000..525ee24
--- /dev/null
@@ -0,0 +1,46 @@
+From cfb02de558d843dc5355c4aa2aeb4af49f88bdb9 Mon Sep 17 00:00:00 2001
+From: Martin Matuska <martin@matuska.de>
+Date: Mon, 8 Dec 2025 21:40:46 +0100
+Subject: [PATCH] tar: fix off-bounds read resulting from #2787 (3150539ed)
+
+CVE: CVE-2025-60753
+Upstream-Status: Backport [https://github.com/libarchive/libarchive/commit/cfb02de558d843dc5355c4aa2aeb4af49f88bdb9]
+Signed-off-by: Peter Marko <peter.marko@siemens.com>
+---
+ tar/subst.c | 16 ++++++++--------
+ 1 file changed, 8 insertions(+), 8 deletions(-)
+
+diff --git a/tar/subst.c b/tar/subst.c
+index a466f653..53497ad0 100644
+--- a/tar/subst.c
++++ b/tar/subst.c
+@@ -239,7 +239,7 @@ apply_substitution(struct bsdtar *bsdtar, const char *name, char **result,
+               char isEnd = 0;
+               do {
+-            isEnd = *name == '\0';
++                      isEnd = *name == '\0';
+                       if (regexec(&rule->re, name, 10, matches, 0))
+                               break;
+@@ -294,13 +294,13 @@ apply_substitution(struct bsdtar *bsdtar, const char *name, char **result,
+                       realloc_strcat(result, rule->result + j);
+                       if (matches[0].rm_eo > 0) {
+-                name += matches[0].rm_eo;
+-            } else {
+-                // We skip a character because the match is 0-length
+-                // so we need to add it to the output
+-                realloc_strncat(result, name, 1);
+-                name += 1;
+-            }
++                              name += matches[0].rm_eo;
++                      } else if (!isEnd) {
++                              // We skip a character because the match is 0-length
++                              // so we need to add it to the output
++                              realloc_strncat(result, name, 1);
++                              name += 1;
++                      }
+               } while (rule->global && !isEnd); // Testing one step after because sed et al. run 0-length patterns a last time on the empty string at the end
+       }
index 66f30ec89b340bc8471f30a395b27cae0b8eb843..e74326b40fdedb78da0e2f551434f1a8710ed8be 100644 (file)
@@ -48,7 +48,8 @@ SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz \
            file://0001-Merge-pull-request-2749-from-KlaraSystems-des-tempdi.patch \
            file://0001-Merge-pull-request-2753-from-KlaraSystems-des-temp-f.patch \
            file://0001-Merge-pull-request-2768-from-Commandoss-master.patch \
-           file://CVE-2025-60753.patch \
+           file://CVE-2025-60753-01.patch \
+           file://CVE-2025-60753-02.patch \
            "
 UPSTREAM_CHECK_URI = "http://libarchive.org/"