A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
Workaround:
The product calls free() twice on the same memory address.
Link | Tags |
---|---|
https://access.redhat.com/security/cve/CVE-2025-5914 | third party advisory vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2370861 | third party advisory issue tracking |
https://github.com/libarchive/libarchive/pull/2598 | issue tracking exploit patch |
https://github.com/libarchive/libarchive/releases/tag/v3.8.0 | release notes |