3.9 LOW
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): NONE
- Availability impact (A): LOW
Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c
A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
References
Affected products
- *
- *
- <3.8.0
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
- *
Matching in nixpkgs
Package maintainers
-
@dschrempf Dominik Schrempf <dominik.schrempf@gmail.com>
-
@sephalon Stefan Wiehler <me@sephalon.net>
-
@peterhoeg Peter Hoeg <peter@hoeg.com>
-
@edwtjo Edward Tjörnhammar <ed@cflags.cc>
-
@minijackson Rémi Nicole <minijackson@riseup.net>
-
@nvmd Sergey Kazenyuk <kazenyuk@pm.me>
-
@aanderse Aaron Andersen <aaron@fosslib.net>
-
@cpages Carles Pagès <page@ruiec.cat>
-
@jcumming Jack Cummings <jack@mudshark.org>
-
@dan4ik605743 Danil Danevich <6057430gu@gmail.com>