Change logs for libarchive source package in Trusty

  • libarchive (3.1.2-7ubuntu2.8) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2019-1000019.patch: fix in
          libarchive/archive_read_support_format_7zip.c.
        - CVE-2019-1000019
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2019-1000020.patch: fix in
          libarchive/archive_read_support_format_iso9660.c.
        - CVE-2019-1000020
    
     -- <email address hidden> (Leonidas S. Barbosa)  Wed, 06 Feb 2019 08:48:45 -0300
  • libarchive (3.1.2-7ubuntu2.7) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Out-of-bounds read
        - debian/patches/CVE-2017-14502.patch: fix in
          libarchive/archive_read_support_format_rar.c.
        - CVE-2017-14502
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2018-1000877.patch: fix in
          libarchive/archive_read_support_format_rar.c.
        - CVE-2018-1000877
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2018-1000878.patch: fix in
          libarchive/archive_read_support_format_rar.c.
        - CVE-2018-1000878
    
     -- <email address hidden> (Leonidas S. Barbosa)  Mon, 14 Jan 2019 09:08:38 -0300
  • libarchive (3.1.2-7ubuntu2.6) trusty-security; urgency=medium
    
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2016-10209.patch: fix in
          libarchive/archive_string.c.
        - CVE-2016-10209
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2016-10349-and-CVE-2016-10350.patch: fix in
          libarchive/archive_read_support_format_cab.c.
        - CVE-2016-10349
        - CVE-2016-10350
      * SECURITY UPDATE: Denial of service
        - debian/patches/CVE-2017-14166.patch: fix in
          libarchive/archive_read_support_format_xar.c.
        - CVE-2017-14166
      * SECURITY UPDATE: Out-of-bounds read
        - debian/patches/CVE-2017-14501.patch: fix in
          libarchive/archive_read_support_format_iso9660.c.
        - CVE-2017-14501
      * SECURITY UPDATE: Out-of-bounds read
        - debian/patches/CVE-2017-14503.patch: fix in
          libarchive/archive_read_support_format_lha.c.
        - CVE-2017-14503
    
     -- <email address hidden> (Leonidas S. Barbosa)  Wed, 08 Aug 2018 13:42:39 -0300
  • libarchive (3.1.2-7ubuntu2.4) trusty-security; urgency=medium
    
      * SECURITY UPDATE: arbitrary file write via hardlink entries
        - debian/patches/CVE-2016-5418-1.patch: enforce sandbox with very long
          pathnames in libarchive/archive_write_disk_posix.c.
        - debian/patches/CVE-2016-5418-2.patch: fix path handling in
          libarchive/archive_write_disk_posix.c.
        - debian/patches/CVE-2016-5418-3.patch: add test cases to Makefile.am,
          libarchive/test/CMakeLists.txt, libarchive/test/main.c,
          libarchive/test/test.h, libarchive/test/test_write_disk_secure744.c,
          libarchive/test/test_write_disk_secure745.c,
          libarchive/test/test_write_disk_secure746.c.
        - debian/patches/CVE-2016-5418-4.patch: fix testcases in
          libarchive/test/test_write_disk_secure745.c,
          libarchive/test/test_write_disk_secure746.c.
        - debian/patches/CVE-2016-5418-5.patch: correct PATH_MAX usage in
          libarchive/archive_write_disk_posix.c.
        - CVE-2016-5418
      * SECURITY UPDATE: denial of service and possible code execution when
        writing an ISO9660 archive
        - debian/patches/CVE-2016-6250.patch: check for overflow in
          libarchive/archive_write_set_format_iso9660.c.
        - CVE-2016-6250
      * SECURITY UPDATE: denial of service via recursive decompression
        - debian/patches/CVE-2016-7166.patch: limit number of filters in
          libarchive/archive_read.c, added test to Makefile.am,
          libarchive/test/CMakeLists.txt,
          libarchive/test/test_read_too_many_filters.c,
          libarchive/test/test_read_too_many_filters.gz.uu.
        - CVE-2016-7166
      * SECURITY UPDATE: denial of service via non-printable multibyte
        character in a filename
        - debian/patches/CVE-2016-8687.patch: expand buffer size in tar/util.c.
        - CVE-2016-8687
      * SECURITY UPDATE: denial of service via multiple long lines
        - debian/patches/CVE-2016-8688.patch: fix bounds in
          libarchive/archive_read_support_format_mtree.c, added test to
          Makefile.am, libarchive/test/CMakeLists.txt,
          libarchive/test/test_read_format_mtree_crash747.c,
          libarchive/test/test_read_format_mtree_crash747.mtree.bz2.uu.
        - CVE-2016-8688
      * SECURITY UPDATE: denial of service via multiple EmptyStream attributes
        - debian/patches/CVE-2016-8689.patch: reject files with multiple
          markers in libarchive/archive_read_support_format_7zip.c.
        - CVE-2016-8689
      * SECURITY UPDATE: denial of service via invalid compressed file size
        - debian/patches/CVE-2017-5601.patch: add check to
          libarchive/archive_read_support_format_lha.c.
        - CVE-2017-5601
    
     -- Marc Deslauriers <email address hidden>  Thu, 09 Mar 2017 11:23:19 -0500
  • libarchive (3.1.2-7ubuntu2.3) trusty-security; urgency=medium
    
      * SECURITY UPDATE: denial of service via malformed rar or cab files
        - debian/patches/CVE-2015-8916.patch: ignore entries with empty
          filenames in tar/read.c.
        - CVE-2015-8916
        - CVE-2015-8917
      * SECURITY UPDATE: denial of service via malformed lzh file
        - debian/patches/CVE-2015-8919.patch: recognize empty dir name in
          libarchive/archive_read_support_format_lha.c.
        - CVE-2015-8919
      * SECURITY UPDATE: buffer underflow parsing ar header
        - debian/patches/CVE-2015-8920.patch: check for empty filenames in
          libarchive/archive_read_support_format_ar.c.
        - CVE-2015-8920
      * SECURITY UPDATE: read past end of string parsing
        - debian/patches/CVE-2015-8921.patch: properly calculate string length
          in libarchive/archive_entry.c.
        - CVE-2015-8921
      * SECURITY UPDATE: segfault on malformed 7z archive
        - debian/patches/CVE-2015-8922.patch: reject some malformed files in
          libarchive/archive_read_support_format_7zip.c, added tests to
          Makefile.am, libarchive/test/test_read_format_7zip_malformed.7z.uu,
          libarchive/test/test_read_format_7zip_malformed.c,
          libarchive/test/test_read_format_7zip_malformed2.7z.uu,
          libarchive/test/CMakeLists.txt.
        - CVE-2015-8922
      * SECURITY UPDATE: segfault on malformed Zip archive
        - debian/patches/CVE-2015-8923.patch: properly handle sizes in
          libarchive/archive_read_support_format_zip.c, added tests to
          Makefile.am, libarchive/test/CMakeLists.txt,
          libarchive/test/test_read_format_zip_malformed.c,
          libarchive/test/test_read_format_zip_malformed1.zip.uu.
        - CVE-2015-8923
      * SECURITY UPDATE: buffer overflow when processing tar files
        - debian/patches/CVE-2015-8924.patch: properly handle empty filenames
          in libarchive/archive_read_support_format_tar.c.
        - CVE-2015-8924
      * SECURITY UPDATE: improper newline parsing
        - debian/patches/CVE-2015-8925.patch: fix escaped newline parsing in
          libarchive/archive_read_support_format_mtree.c, added tests to
          libarchive/test/test_read_format_mtree.c,
          libarchive/test/test_read_format_mtree.mtree.uu.
        - CVE-2015-8925
      * SECURITY UPDATE: segfault on invalid rar archive
        - debian/patches/CVE-2015-8926.patch: properly handle return code in
          libarchive/archive_read_support_format_rar.c.
        - CVE-2015-8926
      * SECURITY UPDATE: out-of-bounds read in mtree
        - debian/patches/CVE-2015-8928.patch: properly handle filename parsing
          in libarchive/archive_read_support_format_mtree.c.
        - CVE-2015-8928
      * SECURITY UPDATE: segfault via dir loop in malformed ISO
        - debian/patches/CVE-2015-8930.patch: limit recursion in
          libarchive/archive_read_support_format_iso9660.c.
        - CVE-2015-8930
      * SECURITY UPDATE: integer overflow parsing time values
        - debian/patches/CVE-2015-8931.patch: fix time handling in
          libarchive/archive_read_support_format_mtree.c.
        - CVE-2015-8931
      * SECURITY UPDATE: crash via invalid compressed data
        - debian/patches/CVE-2015-8932.patch: add more checks to
          libarchive/archive_read_support_filter_compress.c, added tests to
          Makefile.am, libarchive/test/CMakeLists.txt,
          libarchive/test/test_read_filter_compress.c.
        - CVE-2015-8932
      * SECURITY UPDATE: integer overflow via negative-sized sparse blocks
        - debian/patches/CVE-2015-8933.patch: add check to
          libarchive/archive_read_support_format_tar.c.
        - CVE-2015-8933
      * SECURITY UPDATE: heap overflow parsing malformed tar archives
        - debian/patches/CVE-2015-8934.patch: properly check reading from lzss
          decompression buffer in libarchive/archive_read_support_format_rar.c,
          added tests to Makefile.am, libarchive/test/CMakeLists.txt,
          libarchive/test/test_read_format_rar_invalid1.c,
          libarchive/test/test_read_format_rar_invalid1.rar.uu.
        - CVE-2015-8934
      * SECURITY UPDATE: overflow reading 7-Zip with large number of substreams
        - debian/patches/CVE-2016-4300.patch: add another limit to
          libarchive/archive_read_support_format_7zip.c.
        - CVE-2016-4300
      * SECURITY UPDATE: crash via rar files with zero dictionary size
        - debian/patches/CVE-2016-4302.patch: handle zero-sized disctionary in
          libarchive/archive_ppmd7.c,
          libarchive/archive_read_support_format_rar.c.
        - CVE-2016-4302
      * SECURITY UPDATE: memory allocation issues with large cpio symlinks
        - debian/patches/CVE-2016-4809.patch: reject large symlinks in
          libarchive/archive_read_support_format_cpio.c.
        - CVE-2016-4809
      * SECURITY UPDATE: integer overflow when computing volume descriptor
        - debian/patches/CVE-2016-5844.patch: fix multiplications in
          libarchive/archive_read_support_format_iso9660.c.
        - CVE-2016-5844
    
     -- Marc Deslauriers <email address hidden>  Wed, 13 Jul 2016 11:23:39 -0400
  • libarchive (3.1.2-7ubuntu2.2) trusty-security; urgency=medium
    
      * SECURITY UPDATE: code execution via incorrect compressed size
        - debian/patches/CVE-2016-1541.patch: check sizes in
          libarchive/archive_read_support_format_zip.c.
        - CVE-2016-1541
      * SECURITY UPDATE: denial of service via malformed cpio archive
        - debian/patches/issue502.patch: fix implicit cast in
          libarchive/archive_read_support_format_cpio.c, reject attempts to
          move the file pointer by a negative amount in
          libarchive/archive_read.c.
        - CVE number pending.
    
     -- Marc Deslauriers <email address hidden>  Fri, 13 May 2016 10:08:06 -0400
  • libarchive (3.1.2-7ubuntu2.1) trusty-security; urgency=medium
    
      * SECURITY UPDATE: absolute path traversal vulnerability in bsdcpio
        - debian/patches/CVE-2015-2304.patch: don't allow absolute paths by
          default in cpio/cpio.c, libarchive/archive.h,
          libarchive/archive_write_disk_posix.c, added test to
          libarchive/test/test_write_disk_secure.c, updated documentation in
          cpio/bsdcpio.1, libarchive/archive_write_disk.3.
        - CVE-2015-2304
     -- Marc Deslauriers <email address hidden>   Tue, 24 Mar 2015 12:43:54 -0400
  • libarchive (3.1.2-7ubuntu2) trusty; urgency=medium
    
      * Build using dh-autoreconf.
     -- Matthias Klose <email address hidden>   Sat, 14 Dec 2013 13:40:40 +0100
  • libarchive (3.1.2-7ubuntu1) trusty; urgency=low
    
      * debian/tests/minitar:
        - Fix minitar dep8 test to check for application/gzip rather than
          application/x-gzip
     -- Michael Terry <email address hidden>   Wed, 11 Dec 2013 11:36:08 -0500
  • libarchive (3.1.2-7) unstable; urgency=low
    
    
      * Upload to unstable.
    
     -- Andres Mejia <email address hidden>  Sat, 25 May 2013 16:07:06 -0400
  • libarchive (3.1.2-5ubuntu1) raring; urgency=low
    
      * Drop build dependency on lrzip (universe only). LP: #1163280.
      * Configure with --disable-silent-rules.
     -- Matthias Klose <email address hidden>   Thu, 04 Apr 2013 14:47:10 +0200