Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-60753

Опубликовано: 05 нояб. 2025
Источник: redhat
CVSS3: 5.5
EPSS Низкий

Описание

An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).

A vulnerability in apply_substitution() function in libarchive's bsdtar allows crafted -s substitution rules to repeatedly match a zero-length substring and append replacements without advancing the input pointer. When the rule uses the global /g flag (or an explicitly empty pattern), this leads to unbounded output allocation and eventual process OOM (Denial of Service). Upgrade to libarchive 3.8.1 or apply a patch that prevents zero-length match loops or rejects empty patterns.

Отчет

This vulnerability is rated Moderate rather than Important because its impact is limited to availability and requires user interaction under specific, non-default conditions. Exploitation is only possible when an attacker can directly supply or influence the -s substitution rule passed to bsdtar, which is uncommon in most deployment scenarios since bsdtar is typically invoked with trusted command-line arguments in controlled environments. The flaw does not enable memory corruption, arbitrary code execution, or privilege escalation—it solely results in an infinite loop and memory exhaustion (OOM) leading to a process crash.

Меры по смягчению последствий

No mitigation is currently available that meets Red Hat Product Security’s standards for usability, deployment, applicability, or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libarchiveFix deferred
Red Hat Enterprise Linux 6libarchiveFix deferred
Red Hat Enterprise Linux 7libarchiveFix deferred
Red Hat Enterprise Linux 8libarchiveFix deferred
Red Hat Enterprise Linux 9libarchiveFix deferred
Red Hat OpenShift Container Platform 4rhcosFix deferred

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-835
https://bugzilla.redhat.com/show_bug.cgi?id=2412648libarchive: bsdtar hangs and OOMs with zero-length pattern matches

EPSS

Процентиль: 24%
0.00082
Низкий

5.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
5 месяцев назад

An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).

CVSS3: 5.5
nvd
5 месяцев назад

An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).

CVSS3: 5.5
msrc
около 1 месяца назад

An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).

CVSS3: 5.5
debian
5 месяцев назад

An issue was discovered in libarchive bsdtar before version 3.8.1 in f ...

CVSS3: 5.5
github
5 месяцев назад

An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s substitution rules. This can cause unbounded memory allocation and lead to denial of service (Out-of-Memory crash).

EPSS

Процентиль: 24%
0.00082
Низкий

5.5 Medium

CVSS3