UbuntuUpdates.org

Package "libarchive"

Name: libarchive

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • Multi-format archive and compression library (development files)
  • Multi-format archive and compression library (shared library)

Latest version: 3.7.2-2ubuntu0.7
Release: noble (24.04)
Level: security
Repository: main

Links



Other versions of "libarchive" in Noble

Repository Area Version
base universe 3.7.2-2
base main 3.7.2-2
security universe 3.7.2-2ubuntu0.7
updates main 3.7.2-2ubuntu0.7
updates universe 3.7.2-2ubuntu0.7

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.7.2-2ubuntu0.7 2026-05-21 17:07:36 UTC

  libarchive (3.7.2-2ubuntu0.7) noble-security; urgency=medium

  * SECURITY UPDATE: Heap out-of-bounds read during RAR archive processing
    - debian/patches/CVE-2026-4424-1.patch: Reallocate undersized LZSS windows
      in libarchive/archive_read_support_format_rar.c
    - debian/patches/CVE-2026-4424-2.patch: Cast LZSS mask comparison in
      libarchive/archive_read_support_format_rar.c
    - CVE-2026-4424
  * SECURITY UPDATE: Undefined behavior during zisofs decompression
    - debian/patches/CVE-2026-4426.patch: Validate zisofs block size exponent
      in libarchive/archive_read_support_format_iso9660.c
    - CVE-2026-4426
  * SECURITY UPDATE: Integer overflow during zisofs block pointer allocation
    - debian/patches/CVE-2026-5121.patch: Add related regression tests in
      test/test_read_format_iso_zisofs_overflow.c and
      ../test_read_format_iso_zisofs_overflow.iso.uu
    - CVE-2026-5121

 -- Shafayat Hossain Majumder <email address hidden> Tue, 20 May 2026 11:53:00 -0400

Source diff to previous version
CVE-2026-4424 A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of t
CVE-2026-4426 A flaw was found in libarchive. An Undefined Behavior vulnerability exists in the zisofs decompression logic, caused by improper validation of a fiel
CVE-2026-5121 A flaw was found in libarchive. On 32-bit systems, an integer overflow vulnerability exists in the zisofs block pointer allocation logic. A remote at

Version: 3.7.2-2ubuntu0.6 2026-04-02 23:08:05 UTC

  libarchive (3.7.2-2ubuntu0.6) noble-security; urgency=medium

  * SECURITY UPDATE: Out-of-bounds read during streamed archive skipping
    - debian/patches/CVE-2025-5918-1.patch: Prevent EOF-skipping in
      libarchive/archive_read_open_fd.c, libarchive/archive_read_open_file.c,
      libarchive/archive_read_open_filename.c, add relevant tests in
      libarchive/test/test_read_format_rar.c
    - debian/patches/CVE-2025-5918-2.patch: Fix file skip offset handling in
      libarchive/archive_read_open_file.c
    - CVE-2025-5918
  * SECURITY UPDATE: Unbounded memory allocation during bsdtar substitution
    processing
    - debian/patches/CVE-2025-60753.patch: Advance zero-length matches in
      tar/subst.c and add tests in tar/test/test_option_s.c
    - CVE-2025-60753
  * SECURITY UPDATE: Infinite loop during RAR5 decompression
    - debian/patches/CVE-2026-4111.patch: Filter bounds in
      libarchive/archive_read_support_format_rar5.c and add loop regression
      tests in libarchive/test/test_read_format_rar5_loop_bug.c,
      libarchive/test/test_read_format_rar5_loop_bug.rar.uu
    - CVE-2026-4111

 -- Shafayat Hossain Majumder <email address hidden> Wed, 01 Apr 2026 14:22:39 -0400

Source diff to previous version
CVE-2025-5918 A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowi
CVE-2025-60753 An issue was discovered in libarchive bsdtar before version 3.8.1 in function apply_substitution in file tar/subst.c when processing crafted -s subst
CVE-2026-4111 A flaw was identified in the RAR5 archive decompression logic of the libarchive library, specifically within the archive_read_data() processing path.

Version: 3.7.2-2ubuntu0.5 2025-06-26 07:07:05 UTC

  libarchive (3.7.2-2ubuntu0.5) noble-security; urgency=medium

  * SECURITY UPDATE: double free issue
    - debian/patches/CVE-2025-5914.patch: rar: Fix double free with over
      4 billion nodes
    - CVE-2025-5914
  * SECURITY UPDATE: heap-based buffer overflow
    - debian/patches/CVE-2025-5915.patch: rar: Fix heap-buffer-overflow
    - CVE-2025-5915
  * SECURITY UPDATE: integer overflow
    - debian/patches/CVE-2025-5916.patch: warc: Prevent signed integer
      overflow
    - CVE-2025-5916
  * SECURITY UPDATE: out-of-bound write overflow
    - debian/patches/CVE-2025-5917.patch: Fix overflow in build_ustar_entry
    - CVE-2025-5917

 -- Nishit Majithia <email address hidden> Wed, 25 Jun 2025 15:20:27 +0530

Source diff to previous version
CVE-2025-5914 A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involv
CVE-2025-5915 A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potent
CVE-2025-5916 A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Arc
CVE-2025-5917 A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes

Version: 3.7.2-2ubuntu0.4 2025-04-23 20:07:21 UTC

  libarchive (3.7.2-2ubuntu0.4) noble-security; urgency=medium

  * SECURITY UPDATE: DoS via null pointer deref
    - debian/patches/CVE-2025-1632_25724.patch: check return code of
      archive_entry_pathname() in unzip/bsdunzip.c.
    - CVE-2025-1632
  * SECURITY UPDATE: DoS via crafted TAR archive
    - debian/patches/CVE-2025-1632_25724.patch: make sure ltime is valid in
      tar/util.c.
    - CVE-2025-25724

 -- Marc Deslauriers <email address hidden> Thu, 10 Apr 2025 13:28:58 -0400

Source diff to previous version
CVE-2025-1632 A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. Th
CVE-2025-25724 list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspeci

Version: 3.7.2-2ubuntu0.3 2024-10-31 12:07:03 UTC

  libarchive (3.7.2-2ubuntu0.3) noble-security; urgency=medium

  * SECURITY UPDATE: code execution via negative copy length
    - debian/patches/CVE-2024-20696.patch: protect
      copy_from_lzss_window_to_unp() in
      libarchive/archive_read_support_format_rar.c.
    - CVE-2024-20696

 -- Marc Deslauriers <email address hidden> Tue, 29 Oct 2024 10:02:44 +0100

CVE-2024-20696 Windows libarchive Remote Code Execution Vulnerability



About   -   Send Feedback to @ubuntu_updates