[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4368-1] libarchive security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-4368-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                   Bastien Roucariès
November 11, 2025                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : libarchive
Version        : 3.4.3-2+deb11u3
CVE ID         : CVE-2025-5914 CVE-2025-5916 CVE-2025-5917 CVE-2025-5918
Debian Bug     : 1107621 1107623 1107624 1107626

Multiple vulnerabilties were fixed in libarchive a multi-format archive
and compression library.

CVE-2025-5914

    A vulnerability has been identified in the libarchive library,
    specifically within the archive_read_format_rar_seek_data() function.
    This flaw involves an integer overflow that can ultimately lead to
    a double-free condition. Exploiting a double-free vulnerability can
    result in memory corruption, enabling an attacker to execute
    arbitrary code or cause a denial-of-service condition.

CVE-2025-5916

    This flaw involves an integer overflow that can be triggered
    when processing a Web Archive (WARC) file that claims to have more
    than INT64_MAX - 4 content bytes. An attacker could craft a malicious
    WARC archive to induce this overflow, potentially leading to
    unpredictable program behavior, memory corruption, or a
    denial-of-service condition within applications that process
    such archives using libarchive.

CVE-2025-5917

    This flaw involves an 'off-by-one' miscalculation when
    handling prefixes and suffixes for file names. This can lead to
    a 1-byte write overflow. While seemingly small, such an overflow
    can corrupt adjacent memory, leading to unpredictable program behavior,
    crashes, or in specific circumstances, could be leveraged as
    a building block for more sophisticated exploitation.

CVE-2025-5918

    This flaw can be triggered when file streams are piped into bsdtar,
    potentially allowing for reading past the end of the file.
    This out-of-bounds read can lead to unintended consequences,
    including unpredictable program behavior, memory corruption,
    or a denial-of-service condition.

For Debian 11 bullseye, these problems have been fixed in version
3.4.3-2+deb11u3.

We recommend that you upgrade your libarchive packages.

For the detailed security status of libarchive please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libarchive

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEEXQGHuUCiRbrXsPVqADoaLapBCF8FAmkTnJAACgkQADoaLapB
CF/cUxAAri7zC3cHstbilbexXzVrCnvNd/0CWDeztI6DilabcHXA3Ru8zh4oNVN6
jRBZaiSrooP1y+oQ92B2AP4wMhLZwLH4n2DGNamYmSuFT5ObNXbHyY/RG8DJdTcH
e9xseQRO0OAYTsukiuhtb+R5EMHlxnqFIdbtZ/SByyVr16M2veJIF+umgmfJ3X46
BnXAmHdH2r84GulfXL2g82pSQhopNzjvYpX+D2qTkync57nQs0kXNEPHHuutUtXV
IaC7Ep1dajBEdWajjdAkBva5A1HFWKGnrt982TFJWDlZz9jqY94rkFetPUygBWOY
/FdouYMeGwwIQXYgQrMW24552+Aqzcl/p8+bmG3qPycbi2UyDRShMFVr1w9MsIXD
pmEZUxnt64MrZhnKQh0XVXKLvp0JgAzBuUkmBEAhsSOApBqlkFSnpOSaD/eoXC8G
BZalJynyeAghi+lvec0aR0O1je051774i4eIAx81NOyxNerGN5d6j2Cq4rQ8QOZJ
1sqv1XJzlUHhMVRXDyilOoJBMo+PmN8E+0FBVIvFSA5Gm1VUbC4V5iUXUmjlNDhg
3qPvC1NiIAKunPL8KA5W4FErOuNobAXH02v3Ni6LZ+fdgVTJBtjehg+ravt5+nzi
neeJG8lSd66Bx4QOPF2PDXG9f+9ldIyhm+A5Yj6tx5R32jDPcx4=
=wMxd
-----END PGP SIGNATURE-----


Reply to: