ELA-1575-1 libarchive security update

multiple vulnerabilities

2025-11-11
Packagelibarchive
Version3.2.2-2+deb9u6 (stretch), 3.3.3-4+deb10u5 (buster)
Related CVEs CVE-2025-5914 CVE-2025-5916 CVE-2025-5917 CVE-2025-5918


Multiple vulnerabilties were fixed in libarchive a multi-format archive and compression library.

CVE-2025-5914

A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.

CVE-2025-5916

This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive.

CVE-2025-5917

This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation.

CVE-2025-5918

This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.


For Debian 10 buster, these problems have been fixed in version 3.3.3-4+deb10u5.

For Debian 9 stretch, these problems have been fixed in version 3.2.2-2+deb9u6.

We recommend that you upgrade your libarchive packages.

Further information about Extended LTS security advisories can be found in the dedicated section of our website.