diff options
Diffstat (limited to 'meta/recipes-extended/libarchive/libarchive/CVE-2022-26280.patch')
-rw-r--r-- | meta/recipes-extended/libarchive/libarchive/CVE-2022-26280.patch | 29 |
1 files changed, 29 insertions, 0 deletions
diff --git a/meta/recipes-extended/libarchive/libarchive/CVE-2022-26280.patch b/meta/recipes-extended/libarchive/libarchive/CVE-2022-26280.patch new file mode 100644 index 0000000000..501fcc5848 --- /dev/null +++ b/meta/recipes-extended/libarchive/libarchive/CVE-2022-26280.patch | |||
@@ -0,0 +1,29 @@ | |||
1 | From cfaa28168a07ea4a53276b63068f94fce37d6aff Mon Sep 17 00:00:00 2001 | ||
2 | From: Tim Kientzle <kientzle@acm.org> | ||
3 | Date: Thu, 24 Mar 2022 10:35:00 +0100 | ||
4 | Subject: [PATCH] ZIP reader: fix possible out-of-bounds read in | ||
5 | zipx_lzma_alone_init() | ||
6 | |||
7 | Fixes #1672 | ||
8 | |||
9 | CVE: CVE-2022-26280 | ||
10 | Upstream-Status: Backport [https://github.com/libarchive/libarchive/commit/cfaa28168a07ea4a53276b63068f94fce37d6aff] | ||
11 | Signed-off-by: Andrej Valek <andrej.valek@siemens.com> | ||
12 | |||
13 | --- | ||
14 | libarchive/archive_read_support_format_zip.c | 2 +- | ||
15 | 1 file changed, 1 insertion(+), 1 deletion(-) | ||
16 | |||
17 | diff --git a/libarchive/archive_read_support_format_zip.c b/libarchive/archive_read_support_format_zip.c | ||
18 | index 38ada70b5..9d6c900b2 100644 | ||
19 | --- a/libarchive/archive_read_support_format_zip.c | ||
20 | +++ b/libarchive/archive_read_support_format_zip.c | ||
21 | @@ -1667,7 +1667,7 @@ zipx_lzma_alone_init(struct archive_read *a, struct zip *zip) | ||
22 | */ | ||
23 | |||
24 | /* Read magic1,magic2,lzma_params from the ZIPX stream. */ | ||
25 | - if((p = __archive_read_ahead(a, 9, NULL)) == NULL) { | ||
26 | + if(zip->entry_bytes_remaining < 9 || (p = __archive_read_ahead(a, 9, NULL)) == NULL) { | ||
27 | archive_set_error(&a->archive, ARCHIVE_ERRNO_FILE_FORMAT, | ||
28 | "Truncated lzma data"); | ||
29 | return (ARCHIVE_FATAL); | ||