Package: libarchive
Version: libarchive-3.7.4-1.1
Severity: important
Tags: security patch
Usertags:CVE-2025-1632  
<https://security-tracker.debian.org/tracker/CVE-2025-25724>

Dear Maintainer,

I'm submitting a patch forCVE-2025-  
<https://security-tracker.debian.org/tracker/CVE-2025-25724>1632  in the 
libarchive package.

Vulnerability details:
- CVE ID:CVE-2025-  
<https://security-tracker.debian.org/tracker/CVE-2025-25724>1632
- Description:  (up to version 3.7.7) fix NULL ptr dereference issue inside
- Affected versions: All versions prior to 3.7.7
- Fixed upstream 
in:https://github.com/libarchive/libarchive/pull/2532/commits/0a35ab97fae6fb9acecab46b570c14e3be1646e7
  
<https://github.com/libarchive/libarchive/pull/2532/commits/6636f89f5fe08a20de3b2d034712c781d3a67985>

A vulnerability was found in libarchive up to 3.7.7. It has been classified as 
problematic. This affects the function list of the file bsdunzip.c. The 
manipulation leads to null pointer dereference.   It is possible to launch the 
attack on the local host. The exploit has been disclosed to the public and may 
be used.

Error poc:https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc

My patch by detecting NULL return of archive_entry_pathname()
and replacing it by "INVALID PATH" string.

The patch has been tested on Debian sid and works correctly.

Thank you for considering this contribution.

Best regards,
Bo Liu

Reply via email to