Debian Package Tracker
Register | Log in
Subscribe

libarchive

Choose email to subscribe with

general
  • source: libarchive (main)
  • version: 3.7.4-3
  • maintainer: Peter Pentchev (DMD)
  • arch: any
  • std-ver: 4.7.0
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 3.3.3-4+deb10u1
  • o-o-sec: 3.3.3-4+deb10u3
  • oldstable: 3.4.3-2+deb11u1
  • old-sec: 3.4.3-2+deb11u2
  • stable: 3.6.2-1+deb12u2
  • stable-sec: 3.6.2-1+deb12u2
  • testing: 3.7.4-3
  • unstable: 3.7.4-3
versioned links
  • 3.3.3-4+deb10u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.3.3-4+deb10u3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.4.3-2+deb11u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.4.3-2+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.6.2-1+deb12u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 3.7.4-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libarchive-dev
  • libarchive-tools (1 bugs: 0, 1, 0, 0)
  • libarchive13t64 (1 bugs: 0, 0, 1, 0)
action needed
A new upstream version is available: 3.8.0 high
A new upstream version 3.8.0 is available, you should consider packaging it.
Created: 2024-09-16 Last update: 2025-06-18 15:30
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that the current version of the package is not in its VCS.
Either you need to push your commits and/or your tags, or the information about the package's VCS are out of date. A common cause of the latter issue when using the Git VCS is not specifying the correct branch when the packaging is not in the default one (remote HEAD branch), which is usually "master" but can be modified in salsa.debian.org in the project's general settings with the "Default Branch" field). Alternatively the Vcs-Git field in debian/control can contain a "-b <branch-name>" suffix to indicate what branch is used for the Debian packaging.
Created: 2025-02-17 Last update: 2025-06-14 13:30
5 security issues in trixie high

There are 5 open security issues in trixie.

5 important issues:
  • CVE-2025-5914: A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
  • CVE-2025-5915: A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.
  • CVE-2025-5916: A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.
  • CVE-2025-5917: A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.
  • CVE-2025-5918: A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.
Created: 2025-06-09 Last update: 2025-06-11 01:23
5 security issues in sid high

There are 5 open security issues in sid.

5 important issues:
  • CVE-2025-5914: A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
  • CVE-2025-5915: A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.
  • CVE-2025-5916: A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.
  • CVE-2025-5917: A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.
  • CVE-2025-5918: A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.
Created: 2025-06-09 Last update: 2025-06-11 01:23
5 low-priority security issues in bookworm low

There are 5 open security issues in bookworm.

5 issues left for the package maintainer to handle:
  • CVE-2025-5914: (needs triaging) A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
  • CVE-2025-5915: (needs triaging) A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions.
  • CVE-2025-5916: (needs triaging) A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.
  • CVE-2025-5917: (needs triaging) A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.
  • CVE-2025-5918: (needs triaging) A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.

You can find information about how to handle these issues in the security team's documentation.

Created: 2025-06-09 Last update: 2025-06-11 01:23
debian/patches: 3 patches to forward upstream low

Among the 5 debian patches available in version 3.7.4-3 of the package, we noticed the following issues:

  • 3 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-10-15 Last update: 2025-04-28 06:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.2 instead of 4.7.0).
Created: 2025-02-21 Last update: 2025-04-28 07:00
testing migrations
  • This package will soon be part of the auto-libxml2 transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2025-05-08] libarchive 3.7.4-3 MIGRATED to testing (Debian testing watch)
  • [2025-04-27] Accepted libarchive 3.7.4-3 (source) into unstable (Peter Pentchev)
  • [2025-04-26] Accepted libarchive 3.7.4-2 (source) into unstable (Peter Pentchev)
  • [2024-11-11] Accepted libarchive 3.4.3-2+deb11u2 (source) into oldstable-security (Adrian Bunk)
  • [2024-11-11] Accepted libarchive 3.6.2-1+deb12u2 (source) into proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2024-11-10] libarchive 3.7.4-1.1 MIGRATED to testing (Debian testing watch)
  • [2024-11-09] Accepted libarchive 3.6.2-1+deb12u2 (source) into stable-security (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2024-11-03] Accepted libarchive 3.7.4-1.1 (source) into unstable (Salvatore Bonaccorso)
  • [2024-08-09] libarchive 3.7.4-1 MIGRATED to testing (Debian testing watch)
  • [2024-08-07] Accepted libarchive 3.7.4-1 (source) into unstable (Peter Pentchev)
  • [2024-06-09] Accepted libarchive 3.6.2-1+deb12u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2024-06-06] libarchive 3.7.2-2.1 MIGRATED to testing (Debian testing watch)
  • [2024-06-05] Accepted libarchive 3.6.2-1+deb12u1 (source) into stable-security (Debian FTP Masters) (signed by: Salvatore Bonaccorso)
  • [2024-06-03] Accepted libarchive 3.7.2-2.1 (source) into unstable (Salvatore Bonaccorso)
  • [2024-04-25] libarchive 3.7.2-2 MIGRATED to testing (Debian testing watch)
  • [2024-03-31] Accepted libarchive 3.7.2-2 (source) into unstable (Peter Pentchev)
  • [2024-02-29] Accepted libarchive 3.7.2-1.1 (source) into unstable (Lukas Märdian)
  • [2024-01-31] Accepted libarchive 3.7.2-1.1~exp1 (source) into experimental (Steve Langasek)
  • [2023-10-18] libarchive 3.7.2-1 MIGRATED to testing (Debian testing watch)
  • [2023-10-14] Accepted libarchive 3.7.2-1 (source) into unstable (Peter Pentchev)
  • [2023-01-30] Accepted libarchive 3.3.3-4+deb10u3 (source) into oldstable (Thorsten Alteholz)
  • [2022-12-27] libarchive 3.6.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-27] libarchive 3.6.2-1 MIGRATED to testing (Debian testing watch)
  • [2022-12-24] Accepted libarchive 3.6.2-1 (source) into unstable (Peter Pentchev)
  • [2022-11-22] Accepted libarchive 3.3.3-4+deb10u2 (source) into oldstable (Sylvain Beucler)
  • [2022-04-30] Accepted libarchive 3.2.2-2+deb9u3 (source all amd64) into oldoldstable (Thorsten Alteholz)
  • [2022-04-02] libarchive 3.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2022-03-30] Accepted libarchive 3.6.0-1 (source) into unstable (Peter Pentchev)
  • [2022-03-05] Accepted libarchive 3.4.3-2+deb11u1 (source) into proposed-updates->stable-new, proposed-updates (Debian FTP Masters) (signed by: Peter Pentchev)
  • [2021-12-25] libarchive 3.5.2-1 MIGRATED to testing (Debian testing watch)
  • 1
  • 2
bugs [bug history graph]
  • all: 16
  • RC: 0
  • I&N: 11
  • M&W: 4
  • F&P: 1
  • patch: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.7.7-0ubuntu2.2
  • 3 bugs
  • patches for 3.7.7-0ubuntu2.2

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing