Debian Patches
Status for libarchive/3.6.2-1+deb12u3
Patch | Description | Author | Forwarded | Bugs | Origin | Last update |
---|---|---|---|---|---|---|
typos.patch | Correct some typographical errors. | Peter Pentchev <roam@ringlet.net> | yes | 2022-03-29 | ||
iconv-pkgconfig.patch | Do not add "iconv" to pkg-config unless it is needed | Peter Pentchev <roam@ringlet.net> | yes | 2022-12-24 | ||
robust-error-reporting.patch | tar: make error reporting more robust and use correct errno | Ed Maste <emaste@freebsd.org> | no | upstream, https://github.com/libarchive/libarchive/commit/6110e9c82d8ba830c3440f36b990483ceaaea52c | 2024-03-30 | |
fix-OOB-in-rar-e8-filter-2135.patch | fix: OOB in rar e8 filter (#2135) This patch fixes an out-of-bound error in rar e8 filter. |
Wei-Cheng Pan <legnaleurc@gmail.com> | yes | debian upstream | https://github.com/libarchive/libarchive/commit/eb7939b24a681a04648a59cdebd386b1e9dc9237 | 2024-04-22 |
fix-OOB-in-rar-delta-filter-2148.patch | fix: OOB in rar delta filter (#2148) Ensure that `src` won't move ahead of `dst`, so `src` will not OOB. Since `dst` won't move in this function, and we are only increasing `src` position, this check should be enough. It should be safe to early return because this function does not allocate resources. |
Wei-Cheng Pan <legnaleurc@gmail.com> | no | https://github.com/libarchive/libarchive/commit/a1cb648d52f5b6d3f31184d9b6a7cbca628459b7 | 2024-04-29 | |
fix-OOB-in-rar-audio-filter-2149.patch | fix: OOB in rar audio filter (#2149) This patch ensures that `src` won't move ahead of `dst`, so `src` will not OOB. Similar situation like in a1cb648. |
Wei-Cheng Pan <legnaleurc@gmail.com> | no | https://github.com/libarchive/libarchive/commit/3006bc5d02ad3ae3c4f9274f60c1f9d2d834734b | 2024-04-29 | |
rar4-reader-protect-copy_from_lzss_window_to_unp-217.patch | rar4 reader: protect copy_from_lzss_window_to_unp() (#2172) copy_from_lzss_window_to_unp unnecessarily took an `int` parameter where both of its callers were holding a `size_t`. A lzss opcode chain could be constructed that resulted in a negative copy length, which when passed into memcpy would result in a very, very large positive number. Switching copy_from_lzss_window_to_unp to take a `size_t` allows it to properly bounds-check length. In addition, this patch also ensures that `length` is not itself larger than the destination buffer. |
"Dustin L. Howett" <dustin@howett.net> | yes | debian upstream | https://github.com/libarchive/libarchive/commit/eac15e252010c1189a5c0f461364dbe2cd2a68b1 | 2024-05-09 |
CVE-2025-5914.patch | [PATCH] rar: Fix double free with over 4 billion nodes If a system is capable of handling 4 billion nodes in memory, a double free could occur because of an unsigned integer overflow leading to a realloc call with size argument of 0. Eventually, the client will release that memory again, triggering a double free. |
Tobias Stoeckmann <tobias@stoeckmann.org> | no | 2025-05-10 | ||
CVE-2025-5915.patch | [PATCH 1/4] A test case for Issue #2565. This just takes the PoC from that issue and wraps it into a standard test. I've not yet used this to reproduce the issue, much less to diagnose the root cause. |
Tim Kientzle <kientzle@acm.org> | no | 2025-04-06 | ||
CVE-2025-5916.patch | [PATCH] warc: Prevent signed integer overflow If a warc archive claims to have more than INT64_MAX - 4 content bytes, the inevitable failure to skip all these bytes could lead to parsing data which should be ignored instead. The test case contains a conversation entry with that many bytes and if the entry is not properly skipped, the warc implementation would read the conversation data as a new file entry. |
Tobias Stoeckmann <tobias@stoeckmann.org> | no | 2025-04-06 | ||
CVE-2025-5917.patch | [PATCH] Fix overflow in build_ustar_entry The calculations for the suffix and prefix can increment the endpoint for a trailing slash. Hence the limits used should be one lower than the maximum number of bytes. |
Brian Campbell <Brian.Campbell@ed.ac.uk> | no | 2025-04-24 |
All known versions for source package 'libarchive'
- 3.7.4-4 (trixie, sid, forky)
- 3.6.2-1+deb12u3 (bookworm)
- 3.6.2-1+deb12u2 (bookworm-security)