tinyproxy: patch CVE-2025-63938

Details: https://nvd.nist.gov/vuln/detail/CVE-2025-63938

Pick the patch that is referenced by the NVD advisory.

Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
This commit is contained in:
Gyorgy Sarvari 2026-01-06 08:33:25 +01:00
parent 292baf6ad8
commit fa7d1a059e
2 changed files with 42 additions and 0 deletions

View File

@ -0,0 +1,41 @@
From 0e4906a4d4dd12f78870c418f0b68812a329a16a Mon Sep 17 00:00:00 2001
From: rofl0r <rofl0r@users.noreply.github.com>
Date: Fri, 17 Oct 2025 22:57:39 +0000
Subject: [PATCH] reqs: fix integer overflow in port number processing
closes #586
CVE: CVE-2025-63938
Upstream-Status: Backport [https://github.com/tinyproxy/tinyproxy/commit/3c0fde94981b025271ffa1788ae425257841bf5a]
Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com>
---
src/reqs.c | 9 ++++++---
1 file changed, 6 insertions(+), 3 deletions(-)
diff --git a/src/reqs.c b/src/reqs.c
index cfa87ed..e4c0c77 100644
--- a/src/reqs.c
+++ b/src/reqs.c
@@ -174,7 +174,7 @@ static int strip_return_port (char *host)
{
char *ptr1;
char *ptr2;
- int port;
+ unsigned port;
ptr1 = strrchr (host, ':');
if (ptr1 == NULL)
@@ -186,8 +186,11 @@ static int strip_return_port (char *host)
return 0;
*ptr1++ = '\0';
- if (sscanf (ptr1, "%d", &port) != 1) /* one conversion required */
- return 0;
+
+ port = atoi(ptr1);
+ /* check that port string is in the valid range 1-0xffff) */
+ if(strlen(ptr1) > 5 || (port & 0xffff0000)) return 0;
+
return port;
}

View File

@ -8,6 +8,7 @@ SRC_URI = "https://github.com/${BPN}/${BPN}/releases/download/${PV}/${BP}.tar.gz
file://tinyproxy.service \
file://tinyproxy.conf \
file://CVE-2022-40468.patch \
file://CVE-2025-63938.patch \
"
SRC_URI[md5sum] = "658db5558ffb849414341b756a546a99"