{"id":"JLSEC-2025-247","summary":"A vulnerability has been identified in the libarchive library","details":"A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. This bug affects libarchive versions prior to 3.8.0.","modified":"2026-04-20T17:00:54.780574Z","published":"2025-11-25T22:03:17.636Z","upstream":["CVE-2025-5917"],"database_specific":{"license":"CC-BY-4.0","sources":[{"database_specific":{"status":"Modified"},"published":"2025-06-09T20:15:27.330Z","modified":"2025-12-12T01:15:46.527Z","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-5917","id":"CVE-2025-5917","imported":"2026-04-20T16:47:56.014Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-5917"}]},"references":[{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-5917"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2370874"},{"type":"WEB","url":"https://github.com/libarchive/libarchive/pull/2588"},{"type":"WEB","url":"https://github.com/libarchive/libarchive/releases/tag/v3.8.0"}],"affected":[{"package":{"name":"LibArchive_jll","ecosystem":"Julia","purl":"pkg:julia/LibArchive_jll?uuid=1e303b3e-d4db-56ce-88c4-91e52606a1a8"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"3.8.0+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-247.json"}}],"schema_version":"1.7.5"}