Linux repositories inspector

libarchive13 - Library to work with several different streaming archive formats

Libarchive is a programming library that can create and read several different streaming archive formats, including most popular tar variants and several cpio formats. It can also write shar archives and read ISO-9660 CDROM images. The bsdtar program is an implementation of tar(1) that is built on top of libarchive. It started as a test harness, but has grown and is now the standard system tar for FreeBSD 5 and 6.

The libarchive library offers a number of features that make it both very flexible and very powerful.
  • Automatic format detection: libarchive can automatically determine

    both the compression and the archive format, regardless of the
    data source. Most tar implementations do not automatically detect
    the compression format, few implementation that can correctly do
    this when reading from stdin or a socket. (The tar program
    included with Gunnar Ritter's heirloom collection also does full
    automatic format detection.)

    • Writes POSIX formats: libarchive writes POSIX-standard formats,

      including "ustar," "pax interchange format," and the POSIX "cpio"
      format.

      • Supports pax interchange format: Pax interchange format (which,

        despite the name, is really an extended tar format) eliminates
        almost all limitations of historic tar formats and provides a
        standard method for incorporating vendor-specific extensions.
        libarchive exploits this extension mechanism to support ACLs and
        file flags, for example. (Joerg Schilling's star archiver is
        another open-source tar program that supports pax interchange
        format.)

        • Reads popular formats: libarchive can read GNU tar, ustar, pax

          interchange format, cpio, and older tar variants. The internal
          architecture is easily extensible. The only requirement for
          support is that it be possible to read the format without seeking
          in the file. (For example, a format that includes a compressed
          size field before the data cannot be correctly written without
          seeking.)

          • High-Level API: the libarchive API makes it fairly simple to build

            an archive from a list of filenames or to extract the entries
            from an archive. However, the API also provides extreme
            flexibility with regards to data sources. For example, there are
            generic hooks that allow you to write an archive to a socket or
            read data from an archive entry into a memory buffer.

            • Extensible. The internal design uses generic interfaces for
            compression, archive format detection and decoding, and archive data I/O. It should be very easy to add new formats, new compression methods, or new ways of reading/writing archives.
Original maintainer
Homepagehttp://www.libarchive.org/
3.4.2
OpenSUSE iconOpenSUSE Leap 15.2
OpenSUSE iconOpenSUSE Tumbleweed
3.4.0
Debian iconDebian 9.0
Ubuntu iconUbuntu 19.10
Ubuntu iconUbuntu 20.04
3.3.3
Debian iconDebian 10.0
Ubuntu iconUbuntu 19.04
3.3.2
OpenSUSE iconOpenSUSE Leap 15.0
OpenSUSE iconOpenSUSE Leap 15.1
3.2.2
Debian iconDebian 9.0
KDE Neon iconKDE Neon Dev stable
KDE Neon iconKDE Neon Dev unstable
KDE Neon iconKDE Neon User
Ubuntu iconUbuntu 17.10
Ubuntu iconUbuntu 18.04 LTS
Ubuntu iconUbuntu 18.10
3.2.1
Ubuntu iconUbuntu 16.04 LTS
3.1.2
OpenSUSE iconOpenSUSE Leap 42.3
Ubuntu iconUbuntu 16.04 LTS
DistributionVersionSincePackageInstalledPackager
Debian iconDebian 10.0 buster/maindeb3.3.3-4+deb10u1Nov 16306 kiB801 kiB
Debian iconDebian 9.0 stretch/maindeb3.2.2-2+deb9u2Feb 08288 kiB774 kiB
Debian iconDebian 9.0 stretch-backports-sloppy/maindeb3.4.0-2~bpo9+1Mar 20327 kiB851 kiB
KDE Neon iconKDE Neon Dev stable xenial/maindeb3.2.2-0neon1+16.04+xenial+build22017-11-10282 kiB736 kiB
KDE Neon iconKDE Neon Dev unstable xenial/maindeb3.2.2-0neon1+16.04+xenial+build42017-12-08282 kiB736 kiB
KDE Neon iconKDE Neon User xenial/maindeb3.2.2-0neon1+16.04+xenial+build72017-11-10282 kiB736 kiB
KDE Neon iconKDE Neon User xenial/maindeb3.2.2-0neon1+16.04+build62017-11-10282 kiB736 kiB
OpenSUSE iconOpenSUSE Leap 15.0 ossrpm3.3.2-lp150.1.92019-01-17305 kiB756 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm3.3.2-lp150.7.12019-06-17306 kiB756 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm3.3.2-lp150.2.3.12019-01-18305 kiB756 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.0 update/ossrpm3.3.2-lp150.10.1Dec 03302 kiB756 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 ossrpm3.3.2-lp151.4.12019-04-09302 kiB756 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.1 update/ossrpm3.3.2-lp151.5.3.1Dec 03302 kiB756 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 15.2 ossrpm3.4.2-lp152.2.1Mar 23331 kiB821 kiBhttps://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 ossrpm3.1.2-19.32019-01-17277 kiB697 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Leap 42.3 update/ossrpm3.1.2-20.3.12019-01-21277 kiB693 kiBhttp://bugs.opensuse.org
OpenSUSE iconOpenSUSE Tumbleweed ossrpm3.4.2-3.1Feb 26336 kiB820 kiBhttps://bugs.opensuse.org
Ubuntu iconUbuntu 17.10 artful/maindeb3.2.2-3.12017-11-10282 kiB754 kiB
Ubuntu iconUbuntu 18.04 LTS bionic/maindeb3.2.2-3.12017-11-10282 kiB754 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-security/maindeb3.2.2-3.1ubuntu0.6Mar 02281 kiB758 kiB
Ubuntu iconUbuntu 18.04 LTS bionic-updates/maindeb3.2.2-3.1ubuntu0.6Mar 02281 kiB758 kiB
Ubuntu iconUbuntu 18.10 cosmic/maindeb3.2.2-52019-01-14291 kiB770 kiB
Ubuntu iconUbuntu 18.10 cosmic-security/maindeb3.2.2-5ubuntu0.22019-02-07291 kiB771 kiB
Ubuntu iconUbuntu 18.10 cosmic-updates/maindeb3.2.2-5ubuntu0.22019-02-07291 kiB771 kiB
Ubuntu iconUbuntu 19.04 disco/maindeb3.3.3-42019-02-06298 kiB789 kiB
Ubuntu iconUbuntu 19.04 disco-security/maindeb3.3.3-4ubuntu0.1Oct 29298 kiB789 kiB
Ubuntu iconUbuntu 19.04 disco-updates/maindeb3.3.3-4ubuntu0.1Oct 29298 kiB789 kiB
Ubuntu iconUbuntu 19.10 eoan/maindeb3.4.0-1Sep 23319 kiB840 kiB
Ubuntu iconUbuntu 19.10 eoan-security/maindeb3.4.0-1ubuntu0.1Mar 02319 kiB840 kiB
Ubuntu iconUbuntu 19.10 eoan-updates/maindeb3.4.0-1ubuntu0.1Mar 02319 kiB840 kiB
Ubuntu iconUbuntu 20.04 focal/maindeb3.4.0-1ubuntu2Mar 05319 kiB841 kiB
Ubuntu iconUbuntu 16.04 LTS xenial/maindeb3.1.2-11build12017-11-10257 kiB701 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-backports/maindeb3.2.1-2~ubuntu16.04.12017-11-10276 kiB732 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-security/maindeb3.1.2-11ubuntu0.16.04.8Mar 02255 kiB674 kiB
Ubuntu iconUbuntu 16.04 LTS xenial-updates/maindeb3.1.2-11ubuntu0.16.04.8Mar 02255 kiB674 kiB

Latest updates

OpenSUSE icon

OpenSUSE Leap 15.2 oss: Updated from 3.4.2-lp152.1.1 to 3.4.2-lp152.2.1

Mar 23
  • Switch back to cmake build now that cmake-mini exists, this will no longer create a build-cycle.
Debian icon

Debian 9.0 stretch-backports-sloppy/main: Version 3.4.0-2~bpo9+1 introduced

Mar 20
  • Rebuild for stretch-backports-sloppy.
Ubuntu icon

Ubuntu 20.04 focal/main: Updated from 3.4.0-1build1 to 3.4.0-1ubuntu2

Mar 05
  • Make autopkgtests cross-test-friendly.
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 3.4.0-1ubuntu2 removed

Mar 05
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Updated from 3.4.0-1ubuntu1 to 3.4.0-1ubuntu2

Mar 05
  • Make autopkgtests cross-test-friendly.
Ubuntu icon

Ubuntu 20.04 focal-proposed/main: Version 3.4.0-1ubuntu1 introduced

Mar 04
  • SECURITY UPDATE: Out-of-read and Denial of service
    • debian/patches/CVE-2019-19221.patch: Bugfix and optimize archive_wstring_append_from_mbs() in libarchive/archive_string.c.
    • CVE-2019-19221
  • SECURITY UPDATE: SIGSEGV denial of service
    • debian/patches/CVE-2020-9308.patch: reject files that declare invalid header flags fix in
      libarchive/archive_read_support_format_rar5.c, libarchive/test/test_read_format_rar5.c,
      libarchive/test/test_read_format_rar5_block_size_is_too_small.rar.uu.
    • CVE-2020-9308
Ubuntu icon

Ubuntu 18.04 LTS bionic-updates/main: Updated from 3.2.2-3.1ubuntu0.5 to 3.2.2-3.1ubuntu0.6

Mar 02
  • SECURITY UPDATE: Out-of-read and Denial of service
    • debian/patches/CVE-2019-19221.patch: Bugfix and optimize archive_wstring_append_from_mbs() in libarchive/archive_string.c.
    • CVE-2019-19221
Ubuntu icon

Ubuntu 16.04 LTS xenial-updates/main: Updated from 3.1.2-11ubuntu0.16.04.7 to 3.1.2-11ubuntu0.16.04.8

Mar 02
  • SECURITY UPDATE: Out-of-read and Denial of service
    • debian/patches/CVE-2019-19221.patch: Bugfix and optimize archive_wstring_append_from_mbs() in libarchive/archive_string.c.
    • CVE-2019-19221
Ubuntu icon

Ubuntu 19.10 eoan-updates/main: Version 3.4.0-1ubuntu0.1 introduced

Mar 02
  • SECURITY UPDATE: Out-of-read and Denial of service
    • debian/patches/CVE-2019-19221.patch: Bugfix and optimize archive_wstring_append_from_mbs() in libarchive/archive_string.c.
    • CVE-2019-19221
  • SECURITY UPDATE: SIGSEGV denial of service
    • debian/patches/CVE-2020-9308.patch: reject files that declare invalid header flags fix in
      libarchive/archive_read_support_format_rar5.c, libarchive/test/test_read_format_rar5.c,
      libarchive/test/test_read_format_rar5_block_size_is_too_small.rar.uu.
    • CVE-2020-9308
Ubuntu icon

Ubuntu 19.10 eoan-security/main: Version 3.4.0-1ubuntu0.1 introduced

Mar 02
  • SECURITY UPDATE: Out-of-read and Denial of service
    • debian/patches/CVE-2019-19221.patch: Bugfix and optimize archive_wstring_append_from_mbs() in libarchive/archive_string.c.
    • CVE-2019-19221
  • SECURITY UPDATE: SIGSEGV denial of service
    • debian/patches/CVE-2020-9308.patch: reject files that declare invalid header flags fix in
      libarchive/archive_read_support_format_rar5.c, libarchive/test/test_read_format_rar5.c,
      libarchive/test/test_read_format_rar5_block_size_is_too_small.rar.uu.
    • CVE-2020-9308
Ubuntu icon

Ubuntu 18.04 LTS bionic-security/main: Updated from 3.2.2-3.1ubuntu0.5 to 3.2.2-3.1ubuntu0.6

Mar 02
  • SECURITY UPDATE: Out-of-read and Denial of service
    • debian/patches/CVE-2019-19221.patch: Bugfix and optimize archive_wstring_append_from_mbs() in libarchive/archive_string.c.
    • CVE-2019-19221
Ubuntu icon

Ubuntu 16.04 LTS xenial-security/main: Updated from 3.1.2-11ubuntu0.16.04.7 to 3.1.2-11ubuntu0.16.04.8

Mar 02
  • SECURITY UPDATE: Out-of-read and Denial of service
    • debian/patches/CVE-2019-19221.patch: Bugfix and optimize archive_wstring_append_from_mbs() in libarchive/archive_string.c.
    • CVE-2019-19221
OpenSUSE icon

OpenSUSE Leap 15.2 oss: Updated from 3.3.2-lp152.6.1 to 3.4.2-lp152.1.1

Mar 02
  • Update to version 3.4.2
    New features:
    • support for atomic file extraction (bsdtar -x --safe-writes) (#1289)
    • support for mbed TLS (PolarSSL) (#1301)
    Important bugfixes:
    • security fixes in RAR5 reader (#1280 #1326)
    • compression buffer fix in XAR writer (#1317)
    • fix uname and gname longer than 32 characters in PAX writer (#1319)
    • fix segfault when archiving hard links in ISO9660 and XAR writers (#1325)
    • fix support for extracting 7z archive entries with Delta filter (#987)
OpenSUSE icon

OpenSUSE Tumbleweed oss: Updated from 3.4.2-2.1 to 3.4.2-3.1

Feb 26
  • Switch back to cmake build now that cmake-mini exists, this will no longer create a build-cycle.
OpenSUSE icon

OpenSUSE Tumbleweed oss: Updated from 3.4.1-1.3 to 3.4.2-2.1

Feb 20
  • Update to version 3.4.2
    New features:
    • support for atomic file extraction (bsdtar -x --safe-writes) (#1289)
    • support for mbed TLS (PolarSSL) (#1301)
    Important bugfixes:
    • security fixes in RAR5 reader (#1280 #1326)
    • compression buffer fix in XAR writer (#1317)
    • fix uname and gname longer than 32 characters in PAX writer (#1319)
    • fix segfault when archiving hard links in ISO9660 and XAR writers (#1325)
    • fix support for extracting 7z archive entries with Delta filter (#987)
OpenSUSE icon

OpenSUSE Tumbleweed oss: Updated from 3.4.1-1.1 to 3.4.1-1.3

Feb 09
  • Revert back to autoconf, cmake introduces a cycle. Leave cmake patches in since they are basically correct and might be useful in the future.
Debian icon

Debian 9.0 stretch-proposed-updates/main: Version 3.2.2-2+deb9u2 removed

Feb 08
Debian icon

Debian 9.0 stretch/main: Updated from 3.2.2-2+deb9u1 to 3.2.2-2+deb9u2

Feb 08
  • Non-maintainer upload by the LTS team.
  • CVE-2019-18408
    Fix use after free in case parts of the archive are corrupt but the archive contains several headers.
  • Fix CVE-2019-1000019
    Out-of-bounds Read vulnerability in 7zip decompression, that can result in a crash (denial of service, CWE-125)
  • Fix CVE-2019-1000020
    vulnerability in ISO9660 parser that can result in DoS by infinite loop (CWE-835)
OpenSUSE icon

OpenSUSE Leap 15.2 oss: Version 3.3.2-lp152.6.1 introduced

Jan 07
  • Added patch:
    • CVE-2019-18408.patch Fixes use-after-free in a certain ARCHIVE_FAILED situation (bsc#1155079)
Ubuntu icon

Ubuntu 20.04 focal/main: Version 3.4.0-1build1 introduced

Jan 07
  • No-change rebuild against libnettle7

Related packages

libarchive13-32bit - Library to work with several different streaming archive formats
libarchive13-32bit-debuginfo - Debug information for package libarchive13
libarchive13-dbgsym - Debug symbols for libarchive13
libarchive13-debuginfo - Debug information for package libarchive13
libarchive13-debuginfo-32bit - Debug information for package libarchive13
⇧ Top