From: Hitendra Prajapati <[email protected]> Pick patch from [1] also mentioned at Debian report in [2]
[1] https://github.com/libarchive/libarchive/commit/c3cb1c568ebf9e8f7f478cfc0356ae54e99712b0 [2] https://security-tracker.debian.org/tracker/CVE-2026-4426 More details: https://nvd.nist.gov/vuln/detail/CVE-2026-4426 Signed-off-by: Hitendra Prajapati <[email protected]> Signed-off-by: Yoann Congal <[email protected]> --- .../libarchive/libarchive/CVE-2026-4426.patch | 58 +++++++++++++++++++ .../libarchive/libarchive_3.7.9.bb | 1 + 2 files changed, 59 insertions(+) create mode 100644 meta/recipes-extended/libarchive/libarchive/CVE-2026-4426.patch diff --git a/meta/recipes-extended/libarchive/libarchive/CVE-2026-4426.patch b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4426.patch new file mode 100644 index 00000000000..c303c2372a5 --- /dev/null +++ b/meta/recipes-extended/libarchive/libarchive/CVE-2026-4426.patch @@ -0,0 +1,58 @@ +From c3cb1c568ebf9e8f7f478cfc0356ae54e99712b0 Mon Sep 17 00:00:00 2001 +From: elhananhaenel <[email protected]> +Date: Sat, 7 Mar 2026 22:14:23 +0200 +Subject: [PATCH] iso9660: validate pz_log2_bs in parse_rockridge_ZF1() + +The zisofs block size exponent (pz_log2_bs) read from the Rock Ridge ZF +extension entry is used directly in shift expressions without validation. +The zisofs specification only permits values 15, 16, or 17 (corresponding +to 32K, 64K, and 128K block sizes). + +When pz_log2_bs >= 64 on 64-bit systems (or >= 32 on 32-bit), the +expression (size_t)1UL << pz_log2_bs is undefined behavior per C11 +6.5.7. On 32-bit systems, a large exponent also causes the block pointer +allocation size computation (ceil + 1) * 4 to overflow to zero, leading +to a heap buffer overflow write after malloc(0). + +Fix: reject any pz_log2_bs outside the range [15, 17] by disabling +zisofs for the entry (file->pz = 0), which prevents the zisofs +decompression path from executing. + +Found by fuzzing with ASAN/UBSAN. + +CVE: CVE-2026-4426 +Upstream-Status: Backport [https://github.com/libarchive/libarchive/commit/c3cb1c568ebf9e8f7f478cfc0356ae54e99712b0] +Signed-off-by: Hitendra Prajapati <[email protected]> +--- + libarchive/archive_read_support_format_iso9660.c | 15 ++++++++++----- + 1 file changed, 10 insertions(+), 5 deletions(-) + +diff --git a/libarchive/archive_read_support_format_iso9660.c b/libarchive/archive_read_support_format_iso9660.c +index 7d3655a..477aae9 100644 +--- a/libarchive/archive_read_support_format_iso9660.c ++++ b/libarchive/archive_read_support_format_iso9660.c +@@ -2756,11 +2756,16 @@ parse_rockridge_ZF1(struct file_info *file, const unsigned char *data, + { + + if (data[0] == 0x70 && data[1] == 0x7a && data_length == 12) { +- /* paged zlib */ +- file->pz = 1; +- file->pz_log2_bs = data[3]; +- file->pz_uncompressed_size = archive_le32dec(&data[4]); +- } ++ /* paged zlib */ ++ file->pz = 1; ++ file->pz_log2_bs = data[3]; ++ if (file->pz_log2_bs < 15 || file->pz_log2_bs > 17) { ++ /* Invalid block size exponent; disable zisofs. */ ++ file->pz = 0; ++ return; ++ } ++ file->pz_uncompressed_size = archive_le32dec(&data[4]); ++ } + } + + static void +-- +2.50.1 + diff --git a/meta/recipes-extended/libarchive/libarchive_3.7.9.bb b/meta/recipes-extended/libarchive/libarchive_3.7.9.bb index bc0d3ba0743..de9682400a8 100644 --- a/meta/recipes-extended/libarchive/libarchive_3.7.9.bb +++ b/meta/recipes-extended/libarchive/libarchive_3.7.9.bb @@ -46,6 +46,7 @@ SRC_URI = "http://libarchive.org/downloads/libarchive-${PV}.tar.gz \ file://CVE-2025-60753-02.patch \ file://CVE-2026-4111-1.patch \ file://CVE-2026-4111-2.patch \ + file://CVE-2026-4426.patch \ " UPSTREAM_CHECK_URI = "http://libarchive.org/"
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#236634): https://lists.openembedded.org/g/openembedded-core/message/236634 Mute This Topic: https://lists.openembedded.org/mt/119210347/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
