Public bug reported:

Please sync libarchive 3.2.0-2 (main) from Debian unstable (main)

Explanation of the Ubuntu delta and why it can be dropped:
  * SECURITY UPDATE: code execution via incorrect compressed size
    - debian/patches/CVE-2016-1541.patch: check sizes in
      libarchive/archive_read_support_format_zip.c.
    - CVE-2016-1541
  * SECURITY UPDATE: denial of service via malformed cpio archive
    - debian/patches/issue502.patch: fix implicit cast in
      libarchive/archive_read_support_format_cpio.c, reject attempts to
      move the file pointer by a negative amount in
      libarchive/archive_read.c.
    - CVE number pending.
I verified in the code that both of the above security fixes are present in the 
new upstream release in unstable.

Changelog entries since current yakkety version 3.1.2-11ubuntu1:

libarchive (3.2.0-2) unstable; urgency=medium

  * Add CVE identifiers to previous changelog entry.
  * Upload to unstable.

 -- Andreas Henriksson <andr...@fatal.se>  Wed, 01 Jun 2016 07:34:12
+0200

libarchive (3.2.0-1) experimental; urgency=medium

  * CVE-2016-1541: heap-based buffer overflow due to improper input
     validation (Closes: #823893)
  * New upstream test release (3.1.901a).
  * Add liblz4-dev build-dependency to enable lz4 support.
  * Enable new bsdcat utility in separate package
  * Drop all patches, now included in release.
  * Add pkg-config build-dependency
  * Have dh-autoreconf use upstream build/autogen.sh
  * New upstream release (3.2.0).

 -- Andreas Henriksson <andr...@fatal.se>  Fri, 06 May 2016 10:08:56
+0200

** Affects: libarchive (Ubuntu)
     Importance: Wishlist
         Status: New

** Changed in: libarchive (Ubuntu)
   Importance: Undecided => Wishlist

-- 
You received this bug notification because you are a member of Ubuntu
Touch seeded packages, which is subscribed to libarchive in Ubuntu.
https://bugs.launchpad.net/bugs/1590235

Title:
  Sync libarchive 3.2.0-2 (main) from Debian unstable (main)

Status in libarchive package in Ubuntu:
  New

Bug description:
  Please sync libarchive 3.2.0-2 (main) from Debian unstable (main)

  Explanation of the Ubuntu delta and why it can be dropped:
    * SECURITY UPDATE: code execution via incorrect compressed size
      - debian/patches/CVE-2016-1541.patch: check sizes in
        libarchive/archive_read_support_format_zip.c.
      - CVE-2016-1541
    * SECURITY UPDATE: denial of service via malformed cpio archive
      - debian/patches/issue502.patch: fix implicit cast in
        libarchive/archive_read_support_format_cpio.c, reject attempts to
        move the file pointer by a negative amount in
        libarchive/archive_read.c.
      - CVE number pending.
  I verified in the code that both of the above security fixes are present in 
the new upstream release in unstable.

  Changelog entries since current yakkety version 3.1.2-11ubuntu1:

  libarchive (3.2.0-2) unstable; urgency=medium

    * Add CVE identifiers to previous changelog entry.
    * Upload to unstable.

   -- Andreas Henriksson <andr...@fatal.se>  Wed, 01 Jun 2016 07:34:12
  +0200

  libarchive (3.2.0-1) experimental; urgency=medium

    * CVE-2016-1541: heap-based buffer overflow due to improper input
       validation (Closes: #823893)
    * New upstream test release (3.1.901a).
    * Add liblz4-dev build-dependency to enable lz4 support.
    * Enable new bsdcat utility in separate package
    * Drop all patches, now included in release.
    * Add pkg-config build-dependency
    * Have dh-autoreconf use upstream build/autogen.sh
    * New upstream release (3.2.0).

   -- Andreas Henriksson <andr...@fatal.se>  Fri, 06 May 2016 10:08:56
  +0200

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libarchive/+bug/1590235/+subscriptions

-- 
Mailing list: https://launchpad.net/~touch-packages
Post to     : touch-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~touch-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to