Untriaged
Permalink
CVE-2025-5916
3.9 LOW
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): LOW
Libarchive: integer overflow while reading warc files at archive_read_support_format_warc.c
A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.
References
- https://access.redhat.com/security/cve/CVE-2025-5916 x_refsource_REDHAT vdb-entry
- RHBZ#2370872 issue-tracking x_refsource_REDHAT
- https://github.com/libarchive/libarchive/pull/2568
- https://github.com/libarchive/libarchive/releases/tag/v3.8.0
- https://access.redhat.com/security/cve/CVE-2025-5916 x_refsource_REDHAT vdb-entry
- RHBZ#2370872 issue-tracking x_refsource_REDHAT
- https://github.com/libarchive/libarchive/pull/2568
- https://github.com/libarchive/libarchive/releases/tag/v3.8.0
- RHBZ#2370872 issue-tracking x_refsource_REDHAT
- https://github.com/libarchive/libarchive/pull/2568
- https://github.com/libarchive/libarchive/releases/tag/v3.8.0
- https://access.redhat.com/security/cve/CVE-2025-5916 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2025-5916 x_refsource_REDHAT vdb-entry
- RHBZ#2370872 issue-tracking x_refsource_REDHAT
- https://github.com/libarchive/libarchive/pull/2568
- https://github.com/libarchive/libarchive/releases/tag/v3.8.0
- https://github.com/libarchive/libarchive/releases/tag/v3.8.0
- https://access.redhat.com/security/cve/CVE-2025-5916 x_refsource_REDHAT vdb-entry
- RHBZ#2370872 issue-tracking x_refsource_REDHAT
- https://github.com/libarchive/libarchive/pull/2568
- https://github.com/libarchive/libarchive/releases/tag/v3.8.0
- https://access.redhat.com/security/cve/CVE-2025-5916 x_refsource_REDHAT vdb-entry
- RHBZ#2370872 issue-tracking x_refsource_REDHAT
- https://github.com/libarchive/libarchive/pull/2568
- https://github.com/libarchive/libarchive/releases/tag/v3.8.0
- https://access.redhat.com/security/cve/CVE-2025-5916 x_refsource_REDHAT vdb-entry
- RHBZ#2370872 issue-tracking x_refsource_REDHAT
- https://github.com/libarchive/libarchive/pull/2568
- https://github.com/libarchive/libarchive/pull/2568
- https://github.com/libarchive/libarchive/releases/tag/v3.8.0
- https://access.redhat.com/security/cve/CVE-2025-5916 x_refsource_REDHAT vdb-entry
- RHBZ#2370872 issue-tracking x_refsource_REDHAT
- RHBZ#2370872 issue-tracking x_refsource_REDHAT
- https://github.com/libarchive/libarchive/pull/2568
- https://github.com/libarchive/libarchive/releases/tag/v3.8.0
- https://access.redhat.com/security/cve/CVE-2025-5916 x_refsource_REDHAT vdb-entry
Affected products
rhcos
libarchive
- <3.8.0
Matching in nixpkgs
Package maintainers
-
@peterhoeg Peter Hoeg <peter@hoeg.com>
-
@dschrempf Dominik Schrempf <dominik.schrempf@gmail.com>
-
@minijackson Rémi Nicole <minijackson@riseup.net>
-
@cpages Carles Pagès <page@ruiec.cat>
-
@aanderse Aaron Andersen <aaron@fosslib.net>
-
@edwtjo Edward Tjörnhammar <ed@cflags.cc>
-
@nvmd Sergey Kazenyuk <kazenyuk@pm.me>
-
@jcumming Jack Cummings <jack@mudshark.org>