๐Ÿ” CVE Alert

CVE-2025-5914

HIGH 7.8

Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c

CVSS Score
7.8
EPSS Score
0.1%
EPSS Percentile
30th

A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.

CWE CWE-190
Published Jun 9, 2025
Last Updated Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.16
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.18
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.19
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.20
All versions affected
Red Hat / Red Hat Web Terminal 1.11 on RHEL 9
All versions affected
Red Hat / Red Hat Web Terminal 1.11 on RHEL 9
All versions affected
Red Hat / Red Hat Web Terminal 1.12 on RHEL 9
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / cert-manager operator for Red Hat OpenShift 1.16
All versions affected
Red Hat / File Integrity Operator 1
All versions affected
Red Hat / OpenShift Compliance Operator 1
All versions affected
Red Hat / OpenShift Compliance Operator 1
All versions affected
Red Hat / OpenShift Compliance Operator 1
All versions affected
Red Hat / Red Hat Discovery 2
All versions affected
Red Hat / Red Hat Insights proxy 1.5
All versions affected
Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected
Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected
Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected
Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected
Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected
Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected
Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected
Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected
Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected
Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected
Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected
Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected
Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected
Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected
Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected
Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14130 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14135 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14137 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14141 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14142 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14525 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14528 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14594 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14644 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14808 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14810 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14828 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15024 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15397 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15709 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15827 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15828 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:16524 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18217 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18218 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18219 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19041 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19046 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21885 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21913 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0326 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0934 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1541 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-5914 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2370861 github.com: https://github.com/libarchive/libarchive/pull/2598 github.com: https://github.com/libarchive/libarchive/releases/tag/v3.8.0