Skip to main content

CVE-2025-5914

CVE Details

Visit the official vulnerability details page for CVE-2025-5914 to learn more.

Initial Publication

06/10/2025

Last Update

09/02/2025

Third Party Dependency

libarchive

NIST CVE Summary

A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.

CVE Severity

9.8

Our Official Summary

An integer overflow vulnerability in the archive_read_format_rar_seek_data() function of the libarchive library (versions before 3.8.0) can result in a double‑free, potentially causing memory corruption. Exploitation may lead to denial of service or even arbitrary code execution. Double‑free vulnerabilities can lead to severe consequences such as process crashes, data corruption, or unauthorized code execution

This vulnerability is reported on harbor and multus containers. Unless you are using these components, this is not applicable.

  • In the affected images, multiple security controls are already in place:
  • The images are not accessible externally, limiting exposure.
  • An attacker would require privileged access within the cluster to attempt exploitation.

The containers do not permit arbitrary code execution, further mitigating risk.

As a result, the practical impact of this vulnerability is low, with the containerized deployment model significantly reducing the overall attack surface.

Status

Open

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.7.16⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.6.41⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact

Revision History

DateRevision
08/18/2025Official summary revised: An integer overflow vulnerability in the archive_read_format_rar_seek_data() function of the libarchive library (versions before 3.8.0) can result in a double‑free, potentially causing memory corruption. Exploitation may lead to denial of service or even arbitrary code execution. Double‑free vulnerabilities can lead to severe consequences such as process crashes, data corruption, or unauthorized code executionThis vulnerability is reported on harbor and multus containers. Unless you are using these components, this is not applicable.- In the affected images, multiple security controls are already in place:- The images are not accessible externally, limiting exposure.- An attacker would require privileged access within the cluster to attempt exploitation.The containers do not permit arbitrary code execution, further mitigating risk.As a result, the practical impact of this vulnerability is low, with the containerized deployment model significantly reducing the overall attack surface.
06/26/2025Official summary added
06/21/2025Advisory severity revised to CRITICAL from LOW