A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.
The product calls free() twice on the same memory address, potentially leading to modification of unexpected memory locations.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Libarchive | Libarchive | * | 3.8.0 (excluding) |
Libarchive | Ubuntu | devel | * |
Libarchive | Ubuntu | esm-infra-legacy/trusty | * |
Libarchive | Ubuntu | esm-infra/bionic | * |
Libarchive | Ubuntu | esm-infra/focal | * |
Libarchive | Ubuntu | esm-infra/xenial | * |
Libarchive | Ubuntu | jammy | * |
Libarchive | Ubuntu | noble | * |
Libarchive | Ubuntu | oracular | * |
Libarchive | Ubuntu | plucky | * |