Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-5916: Integer Overflow or Wraparound

0
Low
VulnerabilityCVE-2025-5916cvecve-2025-5916
Published: Mon Jun 09 2025 (06/09/2025, 19:49:07 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Enterprise Linux 10

Description

CVE-2025-5916 is an integer overflow vulnerability in the libarchive library affecting versions prior to 3. 8. 0. It occurs when processing a maliciously crafted Web Archive (WARC) file that claims to contain more than INT64_MAX - 4 content bytes, causing an integer overflow or wraparound. This can lead to unpredictable program behavior, memory corruption, or denial-of-service (DoS) conditions in applications using libarchive for WARC processing. The vulnerability requires local access with low privileges and user interaction to trigger, with a low CVSS score of 3. 9. No known exploits are currently in the wild. The flaw primarily impacts Red Hat Enterprise Linux 10 and similar systems using vulnerable libarchive versions. European organizations relying on these systems for data archiving or processing WARC files should apply updates once available and restrict untrusted WARC file handling.

AI-Powered Analysis

AILast updated: 01/15/2026, 04:44:21 UTC

Technical Analysis

CVE-2025-5916 is an integer overflow vulnerability identified in the libarchive library, specifically triggered when processing Web Archive (WARC) files that claim to contain more than INT64_MAX - 4 content bytes. The flaw arises because the library does not properly handle extremely large content length values, leading to an integer overflow or wraparound during internal calculations. This can cause unpredictable program behavior such as memory corruption or denial-of-service conditions when applications attempt to process these crafted WARC archives. The vulnerability affects libarchive versions prior to 3.8.0 and has been reported in Red Hat Enterprise Linux 10. Exploitation requires local access with low privileges and user interaction, such as opening or processing a malicious WARC file. The CVSS v3.1 base score is 3.9, reflecting low severity due to limited impact on confidentiality and integrity, and the requirement for user interaction and privileges. No known exploits are currently reported in the wild. The vulnerability is significant for applications that rely on libarchive for handling WARC files, commonly used in web archiving and digital preservation contexts. Without proper validation, attackers could craft WARC files that trigger the overflow, potentially causing application crashes or memory corruption, which might be leveraged for further attacks depending on the application context.

Potential Impact

For European organizations, the primary impact of CVE-2025-5916 lies in potential denial-of-service conditions or application instability when processing malicious WARC files. Organizations involved in web archiving, digital libraries, or data preservation that utilize libarchive for WARC processing are at risk. While the vulnerability does not directly compromise confidentiality or integrity, memory corruption could theoretically be exploited in complex attack chains. The requirement for local access and user interaction limits remote exploitation, reducing the risk for many enterprise environments. However, organizations that allow users to upload or process untrusted WARC files could face service disruptions or application crashes. This could impact availability of critical archival systems or services. Additionally, organizations relying on Red Hat Enterprise Linux 10 or similar distributions with vulnerable libarchive versions should be aware of this risk. The low CVSS score indicates limited severity, but the potential for denial-of-service and stability issues warrants timely patching and mitigation in sensitive environments.

Mitigation Recommendations

1. Upgrade libarchive to version 3.8.0 or later where the integer overflow issue is fixed. 2. Apply all relevant security updates provided by Red Hat for Red Hat Enterprise Linux 10 as soon as they become available. 3. Implement strict input validation and sanitization for WARC files before processing, especially if files originate from untrusted sources. 4. Restrict user permissions to limit who can process or upload WARC files, minimizing exposure to malicious archives. 5. Employ application-level sandboxing or containerization for processes handling WARC files to contain potential crashes or memory corruption. 6. Monitor application logs and system behavior for signs of crashes or abnormal processing related to WARC files. 7. Educate users about the risks of opening untrusted archive files and enforce policies to prevent inadvertent processing of malicious content. 8. Consider disabling WARC file processing in libarchive if not required by the organization’s workflows.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-06-09T08:10:51.733Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f561b0bd07c3938a581

Added to database: 6/10/2025, 6:54:14 PM

Last enriched: 1/15/2026, 4:44:21 AM

Last updated: 2/2/2026, 8:45:28 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

High
VulnerabilityMon Feb 02 2026

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

High
VulnerabilityMon Feb 02 2026

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

High
VulnerabilityMon Feb 02 2026

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

High
VulnerabilityMon Feb 02 2026

CVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933

Unknown
VulnerabilityMon Feb 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats