Package: libarchive / 3.7.4-4
Metadata
| Package | Version | Patches format |
|---|---|---|
| libarchive | 3.7.4-4 | 3.0 (quilt) |
Patch series
view the series file| Patch | File delta | Description |
|---|---|---|
| typos.patch | (download) |
CMakeLists.txt |
4 2 + 2 - 0 ! |
correct some typographical errors. |
| fix OOB in rar delta filter 2148.patch | (download) |
libarchive/archive_read_support_format_rar.c |
8 8 + 0 - 0 ! |
fix: oob in rar delta filter (#2148) |
| fix OOB in rar audio filter 2149.patch | (download) |
libarchive/archive_read_support_format_rar.c |
7 7 + 0 - 0 ! |
fix: oob in rar audio filter (#2149) |
| rar4 reader protect copy_from_lzss_window_to_unp 217.patch | (download) |
libarchive/archive_read_support_format_rar.c |
28 18 + 10 - 0 ! |
rar4 reader: protect copy_from_lzss_window_to_unp() (#2172) |
| CVE 2025 1632 25724.patch | (download) |
tar/util.c |
5 4 + 1 - 0 ! |
fix cve-2025-1632 and cve-2025-25724 |
| CVE 2025 5914.patch | (download) |
libarchive/archive_read_support_format_rar.c |
6 3 + 3 - 0 ! |
rar: fix double free with over 4 billion nodes (#2598) If a system is capable of handling 4 billion nodes in memory, a double free could occur because of an unsigned integer overflow leading to a realloc call with size argument of 0. Eventually, the client will release that memory again, triggering a double free. Bug-Debian: https://bugs.debian.org/1107621 |
| CVE 2025 5915.patch | (download) |
Makefile.am |
2 2 + 0 - 0 ! |
rar: fix heap-buffer-overflow (#2599) A filter block size must not be larger than the lzss window, which is defined by dictionary size, which in turn can be derived from unpacked file size. . While at it, improve error messages and fix lzss window wrap around logic. . Fixes https://github.com/libarchive/libarchive/issues/2565 Bug-Debian: https://bugs.debian.org/1107622 |
| CVE 2025 5916.patch | (download) |
Makefile.am |
1 1 + 0 - 0 ! |
warc: prevent signed integer overflow (#2568) If a warc archive claims to have more than INT64_MAX - 4 content bytes, the inevitable failure to skip all these bytes could lead to parsing data which should be ignored instead. . The test case contains a conversation entry with that many bytes and if the entry is not properly skipped, the warc implementation would read the conversation data as a new file entry. Bug-Debian: https://bugs.debian.org/1107623 |
| CVE 2025 5917.patch | (download) |
libarchive/archive_write_set_format_pax.c |
4 2 + 2 - 0 ! |
fix overflow in build_ustar_entry (#2588) The calculations for the suffix and prefix can increment the endpoint for a trailing slash. Hence the limits used should be one lower than the maximum number of bytes. . Without this patch, when this happens for both the prefix and the suffix, we end up with 156 + 100 bytes, and the write of the null at the end will overflow the 256 byte buffer. This can be reproduced by running ``` mkdir -p foo/bar bsdtar cvf test.tar foo////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////bar ``` when bsdtar is compiled with Address Sanitiser, although I originally noticed this by accident with a genuine filename on a CHERI capability system, which faults immediately on the buffer overflow. Bug-Debian: https://bugs.debian.org/1107626 |
