UbuntuUpdates.org

Package "libarchive"

Name: libarchive

Description:

This package is just an umbrella for a group of other packages, it has no description.
Description samples from packages in group:

  • FreeBSD implementations of 'tar' and 'cpio' and other archive tools

Latest version: 3.7.4-1ubuntu0.3
Release: oracular (24.10)
Level: updates
Repository: universe

Links



Other versions of "libarchive" in Oracular

Repository Area Version
base universe 3.7.4-1
base main 3.7.4-1
security main 3.7.4-1ubuntu0.3
security universe 3.7.4-1ubuntu0.3
updates main 3.7.4-1ubuntu0.3

Packages in group

Deleted packages are displayed in grey.


Changelog

Version: 3.7.4-1ubuntu0.3 2025-06-26 10:07:01 UTC

  libarchive (3.7.4-1ubuntu0.3) oracular-security; urgency=medium

  * SECURITY UPDATE: double free issue
    - debian/patches/CVE-2025-5914.patch: rar: Fix double free with over
      4 billion nodes
    - CVE-2025-5914
  * SECURITY UPDATE: heap-based buffer overflow
    - debian/patches/CVE-2025-5915.patch: rar: Fix heap-buffer-overflow
    - CVE-2025-5915
  * SECURITY UPDATE: integer overflow
    - debian/patches/CVE-2025-5916.patch: warc: Prevent signed integer
      overflow
    - CVE-2025-5916
  * SECURITY UPDATE: out-of-bound write overflow
    - debian/patches/CVE-2025-5917.patch: Fix overflow in build_ustar_entry
    - CVE-2025-5917

 -- Nishit Majithia <email address hidden> Wed, 25 Jun 2025 15:19:39 +0530

Source diff to previous version
CVE-2025-5914 A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involv
CVE-2025-5915 A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potent
CVE-2025-5916 A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Arc
CVE-2025-5917 A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes

Version: 3.7.4-1ubuntu0.2 2025-04-24 17:07:57 UTC

  libarchive (3.7.4-1ubuntu0.2) oracular-security; urgency=medium

  * SECURITY UPDATE: DoS via null pointer deref
    - debian/patches/CVE-2025-1632_25724.patch: check return code of
      archive_entry_pathname() in unzip/bsdunzip.c.
    - CVE-2025-1632
  * SECURITY UPDATE: DoS via crafted TAR archive
    - debian/patches/CVE-2025-1632_25724.patch: make sure ltime is valid in
      tar/util.c.
    - CVE-2025-25724

 -- Marc Deslauriers <email address hidden> Thu, 10 Apr 2025 13:28:06 -0400

Source diff to previous version
CVE-2025-1632 A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. Th
CVE-2025-25724 list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspeci

Version: 3.7.4-1ubuntu0.1 2024-10-31 13:07:06 UTC

  libarchive (3.7.4-1ubuntu0.1) oracular-security; urgency=medium

  * SECURITY UPDATE: code execution via negative copy length
    - debian/patches/CVE-2024-20696.patch: protect
      copy_from_lzss_window_to_unp() in
      libarchive/archive_read_support_format_rar.c.
    - CVE-2024-20696

 -- Marc Deslauriers <email address hidden> Tue, 29 Oct 2024 10:00:09 +0100

CVE-2024-20696 Windows libarchive Remote Code Execution Vulnerability



About   -   Send Feedback to @ubuntu_updates