CVE-2025-5914
Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c
CVSS Score
7.8
EPSS Score
0.1%
EPSS Percentile
30th
A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
| CWE | CWE-190 |
| Published | Jun 9, 2025 |
| Last Updated | Apr 20, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new high vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Red Hat / Red Hat Enterprise Linux 10
All versions affected Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected Red Hat / Red Hat Enterprise Linux 8
All versions affected Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9
All versions affected Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.16
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.18
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.19
All versions affected Red Hat / Red Hat OpenShift Container Platform 4.20
All versions affected Red Hat / Red Hat Web Terminal 1.11 on RHEL 9
All versions affected Red Hat / Red Hat Web Terminal 1.11 on RHEL 9
All versions affected Red Hat / Red Hat Web Terminal 1.12 on RHEL 9
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / RHOSS-1.36-RHEL-8
All versions affected Red Hat / cert-manager operator for Red Hat OpenShift 1.16
All versions affected Red Hat / File Integrity Operator 1
All versions affected Red Hat / OpenShift Compliance Operator 1
All versions affected Red Hat / OpenShift Compliance Operator 1
All versions affected Red Hat / OpenShift Compliance Operator 1
All versions affected Red Hat / Red Hat Discovery 2
All versions affected Red Hat / Red Hat Insights proxy 1.5
All versions affected Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected Red Hat / Red Hat OpenShift distributed tracing 3.5.1
All versions affected Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected Red Hat / Red Hat OpenShift sandboxed containers 1.1
All versions affected Red Hat / Red Hat Enterprise Linux 6
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14130 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14135 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14137 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14141 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14142 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14525 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14528 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14594 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14644 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14808 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14810 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14828 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15024 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15397 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15709 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15827 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15828 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:16524 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18217 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18218 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18219 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19041 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19046 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21885 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21913 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0326 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0934 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:1541 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-5914 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2370861 github.com: https://github.com/libarchive/libarchive/pull/2598 github.com: https://github.com/libarchive/libarchive/releases/tag/v3.8.0