Package "libarchive"
Name: |
libarchive
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- FreeBSD implementations of 'tar' and 'cpio' and other archive tools
|
Latest version: |
3.7.4-1ubuntu0.3 |
Release: |
oracular (24.10) |
Level: |
updates |
Repository: |
universe |
Links
Other versions of "libarchive" in Oracular
Packages in group
Deleted packages are displayed in grey.
Changelog
libarchive (3.7.4-1ubuntu0.3) oracular-security; urgency=medium
* SECURITY UPDATE: double free issue
- debian/patches/CVE-2025-5914.patch: rar: Fix double free with over
4 billion nodes
- CVE-2025-5914
* SECURITY UPDATE: heap-based buffer overflow
- debian/patches/CVE-2025-5915.patch: rar: Fix heap-buffer-overflow
- CVE-2025-5915
* SECURITY UPDATE: integer overflow
- debian/patches/CVE-2025-5916.patch: warc: Prevent signed integer
overflow
- CVE-2025-5916
* SECURITY UPDATE: out-of-bound write overflow
- debian/patches/CVE-2025-5917.patch: Fix overflow in build_ustar_entry
- CVE-2025-5917
-- Nishit Majithia <email address hidden> Wed, 25 Jun 2025 15:19:39 +0530
|
Source diff to previous version |
CVE-2025-5914 |
A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involv |
CVE-2025-5915 |
A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potent |
CVE-2025-5916 |
A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Arc |
CVE-2025-5917 |
A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes |
|
libarchive (3.7.4-1ubuntu0.2) oracular-security; urgency=medium
* SECURITY UPDATE: DoS via null pointer deref
- debian/patches/CVE-2025-1632_25724.patch: check return code of
archive_entry_pathname() in unzip/bsdunzip.c.
- CVE-2025-1632
* SECURITY UPDATE: DoS via crafted TAR archive
- debian/patches/CVE-2025-1632_25724.patch: make sure ltime is valid in
tar/util.c.
- CVE-2025-25724
-- Marc Deslauriers <email address hidden> Thu, 10 Apr 2025 13:28:06 -0400
|
Source diff to previous version |
CVE-2025-1632 |
A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. Th |
CVE-2025-25724 |
list_item_verbose in tar/util.c in libarchive through 3.7.7 does not check an strftime return value, which can lead to a denial of service or unspeci |
|
libarchive (3.7.4-1ubuntu0.1) oracular-security; urgency=medium
* SECURITY UPDATE: code execution via negative copy length
- debian/patches/CVE-2024-20696.patch: protect
copy_from_lzss_window_to_unp() in
libarchive/archive_read_support_format_rar.c.
- CVE-2024-20696
-- Marc Deslauriers <email address hidden> Tue, 29 Oct 2024 10:00:09 +0100
|
|
About
-
Send Feedback to @ubuntu_updates