Package "libarchive13"
| Name: |
libarchive13
|
Description: |
Multi-format archive and compression library (shared library)
|
| Latest version: |
3.6.0-1ubuntu1.5 |
| Release: |
jammy (22.04) |
| Level: |
updates |
| Repository: |
main |
| Head package: |
libarchive |
| Homepage: |
https://www.libarchive.org/ |
Links
Download "libarchive13"
Other versions of "libarchive13" in Jammy
Changelog
|
libarchive (3.6.0-1ubuntu1.5) jammy-security; urgency=medium
* SECURITY UPDATE: double free issue
- debian/patches/CVE-2025-5914.patch: rar: Fix double free with over
4 billion nodes
- CVE-2025-5914
* SECURITY UPDATE: heap-based buffer overflow
- debian/patches/CVE-2025-5915.patch: rar: Fix heap-buffer-overflow
- CVE-2025-5915
* SECURITY UPDATE: integer overflow
- debian/patches/CVE-2025-5916.patch: warc: Prevent signed integer
overflow
- CVE-2025-5916
* SECURITY UPDATE: out-of-bound write overflow
- debian/patches/CVE-2025-5917.patch: Fix overflow in build_ustar_entry
- CVE-2025-5917
-- Nishit Majithia <email address hidden> Wed, 25 Jun 2025 15:21:03 +0530
|
| Source diff to previous version |
| CVE-2025-5914 |
A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involv |
| CVE-2025-5915 |
A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potent |
| CVE-2025-5916 |
A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Arc |
| CVE-2025-5917 |
A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes |
|
|
libarchive (3.6.0-1ubuntu1.4) jammy-security; urgency=medium
* SECURITY UPDATE: DoS via crafted TAR archive
- debian/patches/CVE-2025-25724.patch: make sure ltime is valid in
tar/util.c.
- CVE-2025-25724
-- Marc Deslauriers <email address hidden> Thu, 10 Apr 2025 13:35:36 -0400
|
| Source diff to previous version |
| CVE-2025-25724 |
list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspeci |
|
|
libarchive (3.6.0-1ubuntu1.3) jammy-security; urgency=medium
* SECURITY UPDATE: code execution via negative copy length
- debian/patches/CVE-2024-20696.patch: protect
copy_from_lzss_window_to_unp() in
libarchive/archive_read_support_format_rar.c.
- CVE-2024-20696
-- Marc Deslauriers <email address hidden> Tue, 29 Oct 2024 10:03:06 +0100
|
| Source diff to previous version |
|
|
|
libarchive (3.6.0-1ubuntu1.2) jammy-security; urgency=medium
* SECURITY UPDATE: NULL pointer dereference
- debian/patches/CVE-2022-36227.patch: Add NULL check in archive_write
functions
- CVE-2022-36227
* SECURITY UPDATE: Out of bounds access
- debian/patches/CVE-2024-48957.patch: check dst isn't less than or
equal to src in execute_filter_audio
- CVE-2024-48957
* SECURITY UPDATE: Out of bounds access
- debian/patches/CVE-2024-48958.patch: check dst isn't less than or
equal to src in execute_filter_delta
- CVE-2024-48958
-- Bruce Cable <email address hidden> Mon, 14 Oct 2024 12:03:12 +1100
|
| Source diff to previous version |
| CVE-2022-36227 |
In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the functio |
| CVE-2024-48957 |
execute_filter_audio in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because s |
| CVE-2024-48958 |
execute_filter_delta in archive_read_support_format_rar.c in libarchive before 3.7.5 allows out-of-bounds access via a crafted archive file because s |
|
|
libarchive (3.6.0-1ubuntu1.1) jammy-security; urgency=medium
* SECURITY UPDATE: Remove code execution
- debian/patches/CVE-2024-26256.patch: fix OOB in rar e8 filter
in libarchive/archive_read_support_format_rar.c.
- CVE-2024-26256
-- Leonidas Da Silva Barbosa <email address hidden> Thu, 30 May 2024 16:05:48 -0300
|
|
|
About
-
Send Feedback to @ubuntu_updates