Package "libarchive"
| Name: |
libarchive
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Multi-format archive and compression library (development files)
- Multi-format archive and compression library (shared library)
|
| Latest version: |
3.7.2-2ubuntu0.7 |
| Release: |
noble (24.04) |
| Level: |
security |
| Repository: |
main |
Links
Other versions of "libarchive" in Noble
Packages in group
Deleted packages are displayed in grey.
Changelog
|
libarchive (3.7.2-2ubuntu0.7) noble-security; urgency=medium
* SECURITY UPDATE: Heap out-of-bounds read during RAR archive processing
- debian/patches/CVE-2026-4424-1.patch: Reallocate undersized LZSS windows
in libarchive/archive_read_support_format_rar.c
- debian/patches/CVE-2026-4424-2.patch: Cast LZSS mask comparison in
libarchive/archive_read_support_format_rar.c
- CVE-2026-4424
* SECURITY UPDATE: Undefined behavior during zisofs decompression
- debian/patches/CVE-2026-4426.patch: Validate zisofs block size exponent
in libarchive/archive_read_support_format_iso9660.c
- CVE-2026-4426
* SECURITY UPDATE: Integer overflow during zisofs block pointer allocation
- debian/patches/CVE-2026-5121.patch: Add related regression tests in
test/test_read_format_iso_zisofs_overflow.c and
../test_read_format_iso_zisofs_overflow.iso.uu
- CVE-2026-5121
-- Shafayat Hossain Majumder <email address hidden> Tue, 20 May 2026 11:53:00 -0400
|
| Source diff to previous version |
| CVE-2026-4424 |
A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of t |
| CVE-2026-4426 |
A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a fiel |
| CVE-2026-5121 |
A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote at |
|
|
libarchive (3.7.2-2ubuntu0.6) noble-security; urgency=medium
* SECURITY UPDATE: Out-of-bounds read during streamed archive skipping
- debian/patches/CVE-2025-5918-1.patch: Prevent EOF-skipping in
libarchive/archive_read_open_fd.c, libarchive/archive_read_open_file.c,
libarchive/archive_read_open_filename.c, add relevant tests in
libarchive/test/test_read_format_rar.c
- debian/patches/CVE-2025-5918-2.patch: Fix file skip offset handling in
libarchive/archive_read_open_file.c
- CVE-2025-5918
* SECURITY UPDATE: Unbounded memory allocation during bsdtar substitution
processing
- debian/patches/CVE-2025-60753.patch: Advance zero-length matches in
tar/subst.c and add tests in tar/test/test_option_s.c
- CVE-2025-60753
* SECURITY UPDATE: Infinite loop during RAR5 decompression
- debian/patches/CVE-2026-4111.patch: Filter bounds in
libarchive/archive_read_support_format_rar5.c and add loop regression
tests in libarchive/test/test_read_format_rar5_loop_bug.c,
libarchive/test/test_read_format_rar5_loop_bug.rar.uu
- CVE-2026-4111
-- Shafayat Hossain Majumder <email address hidden> Wed, 01 Apr 2026 14:22:39 -0400
|
| Source diff to previous version |
| CVE-2025-5918 |
A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowi |
| CVE-2025-60753 |
An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s subst |
| CVE-2026-4111 |
A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path. |
|
|
libarchive (3.7.2-2ubuntu0.5) noble-security; urgency=medium
* SECURITY UPDATE: double free issue
- debian/patches/CVE-2025-5914.patch: rar: Fix double free with over
4 billion nodes
- CVE-2025-5914
* SECURITY UPDATE: heap-based buffer overflow
- debian/patches/CVE-2025-5915.patch: rar: Fix heap-buffer-overflow
- CVE-2025-5915
* SECURITY UPDATE: integer overflow
- debian/patches/CVE-2025-5916.patch: warc: Prevent signed integer
overflow
- CVE-2025-5916
* SECURITY UPDATE: out-of-bound write overflow
- debian/patches/CVE-2025-5917.patch: Fix overflow in build_ustar_entry
- CVE-2025-5917
-- Nishit Majithia <email address hidden> Wed, 25 Jun 2025 15:20:27 +0530
|
| Source diff to previous version |
| CVE-2025-5914 |
A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involv |
| CVE-2025-5915 |
A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potent |
| CVE-2025-5916 |
A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Arc |
| CVE-2025-5917 |
A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes |
|
|
libarchive (3.7.2-2ubuntu0.4) noble-security; urgency=medium
* SECURITY UPDATE: DoS via null pointer deref
- debian/patches/CVE-2025-1632_25724.patch: check return code of
archive_entry_pathname() in unzip/bsdunzip.c.
- CVE-2025-1632
* SECURITY UPDATE: DoS via crafted TAR archive
- debian/patches/CVE-2025-1632_25724.patch: make sure ltime is valid in
tar/util.c.
- CVE-2025-25724
-- Marc Deslauriers <email address hidden> Thu, 10 Apr 2025 13:28:58 -0400
|
| Source diff to previous version |
| CVE-2025-1632 |
A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. Th |
| CVE-2025-25724 |
list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspeci |
|
|
libarchive (3.7.2-2ubuntu0.3) noble-security; urgency=medium
* SECURITY UPDATE: code execution via negative copy length
- debian/patches/CVE-2024-20696.patch: protect
copy_from_lzss_window_to_unp() in
libarchive/archive_read_support_format_rar.c.
- CVE-2024-20696
-- Marc Deslauriers <email address hidden> Tue, 29 Oct 2024 10:02:44 +0100
|
|
|
About
-
Send Feedback to @ubuntu_updates