{"id":"CVE-2025-5914","details":"A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.","modified":"2026-04-09T10:56:45.867107Z","published":"2025-06-09T20:15:26.123Z","related":["ALSA-2025:14130","ALSA-2025:14135","ALSA-2025:14137","MGASA-2025-0200","SUSE-SU-2025:02522-1","SUSE-SU-2025:02522-2","SUSE-SU-2025:02566-1","SUSE-SU-2025:02718-1","SUSE-SU-2025:02718-2","SUSE-SU-2025:20560-1","SUSE-SU-2025:20594-1"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:15024"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:0934"},{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2025-5914"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:1541"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14130"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:15397"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:18218"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21913"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14644"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14828"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:15709"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:15828"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14594"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:15827"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:19046"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14141"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14810"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:19041"},{"type":"ADVISORY","url":"https://github.com/libarchive/libarchive/releases/tag/v3.8.0"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:0326"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14135"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14137"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14528"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14808"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:16524"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:18219"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14142"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:14525"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:18217"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:21885"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370861"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/pull/2598"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"0"},{"fixed":"70ff28fcf04ec129a1d064f96e49aa57fcc90e37"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"3.8.0"}]}}],"versions":["v3.0.0a","v3.0.1b","v3.1.900a","v3.2.0","v3.2.1","v3.2.2","v3.3.0","v3.3.1","v3.3.2","v3.3.3","v3.4.0","v3.4.1","v3.4.2","v3.4.3","v3.5.0","v3.5.1","v3.5.2","v3.6.0","v3.6.1","v3.6.2","v3.7.0","v3.7.1","v3.7.2","v3.7.3","v3.7.4","v3.7.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-5914.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}