Untriaged
Permalink
CVE-2025-5916
3.9 LOW
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): LOW
Libarchive: integer overflow while reading warc files at archive_read_support_format_warc.c
A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.
References
Affected products
rhcos
libarchive
- <3.8.0
Matching in nixpkgs
Package maintainers
-
@dschrempf Dominik Schrempf <dominik.schrempf@gmail.com>
-
@sephalon Stefan Wiehler <me@sephalon.net>
-
@peterhoeg Peter Hoeg <peter@hoeg.com>
-
@edwtjo Edward Tjörnhammar <ed@cflags.cc>
-
@minijackson Rémi Nicole <minijackson@riseup.net>
-
@nvmd Sergey Kazenyuk <kazenyuk@pm.me>
-
@aanderse Aaron Andersen <aaron@fosslib.net>
-
@cpages Carles Pagès <page@ruiec.cat>
-
@jcumming Jack Cummings <jack@mudshark.org>
-
@dan4ik605743 Danil Danevich <6057430gu@gmail.com>