
CVE-2025-5914 – Libarchive: double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c
https://notcve.org/view.php?id=CVE-2025-5914
09 Jun 2025 — A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition. Se ha identificado una vulnerabilidad en la librería libarchive, específicamente en la función archive_read_format_rar_seek_data... • https://access.redhat.com/security/cve/CVE-2025-5914 • CWE-415: Double Free •

CVE-2025-5918 – Libarchive: reading past eof may be triggered for piped file streams
https://notcve.org/view.php?id=CVE-2025-5918
09 Jun 2025 — A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition. Se ha identificado una vulnerabilidad en la librería libarchive. Esta falla puede activarse cuando se canalizan flujos de archivos a bsdtar, lo que podría permitir la... • https://access.redhat.com/security/cve/CVE-2025-5918 • CWE-125: Out-of-bounds Read •

CVE-2025-5917 – Libarchive: off by one error in build_ustar_entry_name() at archive_write_set_format_pax.c
https://notcve.org/view.php?id=CVE-2025-5917
09 Jun 2025 — A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation. Se ha identificado una vulnerabilidad en la librería libarchive. • https://access.redhat.com/security/cve/CVE-2025-5917 • CWE-787: Out-of-bounds Write •

CVE-2025-5916 – Libarchive: integer overflow while reading warc files at archive_read_support_format_warc.c
https://notcve.org/view.php?id=CVE-2025-5916
09 Jun 2025 — A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive. Se ha identificado una vulnerabilidad en ... • https://access.redhat.com/security/cve/CVE-2025-5916 • CWE-190: Integer Overflow or Wraparound •

CVE-2025-5915 – Libarchive: heap buffer over read in copy_from_lzss_window() at archive_read_support_format_rar.c
https://notcve.org/view.php?id=CVE-2025-5915
09 Jun 2025 — A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions. Se ha identificado una vulnerabilidad en la librería libarchive. Est... • https://access.redhat.com/security/cve/CVE-2025-5915 • CWE-122: Heap-based Buffer Overflow •

CVE-2025-5791 – Users: `root` appended to group listings
https://notcve.org/view.php?id=CVE-2025-5791
06 Jun 2025 — A flaw was found in the user's crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list. • https://access.redhat.com/security/cve/CVE-2025-5791 • CWE-266: Incorrect Privilege Assignment •

CVE-2025-0620 – Samba: smbd doesn't pick up group membership changes when re-authenticating an expired smb session
https://notcve.org/view.php?id=CVE-2025-0620
06 Jun 2025 — A flaw was found in Samba. The smbd service daemon does not pick up group membership changes when re-authenticating an expired SMB session. This issue can expose file shares until clients disconnect and then connect again. • https://access.redhat.com/security/cve/CVE-2025-0620 • CWE-552: Files or Directories Accessible to External Parties •

CVE-2025-4598 – Systemd-coredump: race condition that allows a local attacker to crash a suid program and gain read access to the resulting core dump
https://notcve.org/view.php?id=CVE-2025-4598
30 May 2025 — A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process. A SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access... • https://access.redhat.com/security/cve/CVE-2025-4598 • CWE-364: Signal Handler Race Condition •

CVE-2025-5278 – Coreutils: heap buffer under-read in gnu coreutils sort via key specification
https://notcve.org/view.php?id=CVE-2025-5278
27 May 2025 — A flaw was found in GNU Coreutils. The sort utility's begfield() function is vulnerable to a heap buffer under-read. The program may access memory outside the allocated buffer if a user runs a crafted command using the traditional key format. A malicious input could lead to a crash or leak sensitive data. • https://access.redhat.com/security/cve/CVE-2025-5278 • CWE-121: Stack-based Buffer Overflow •

CVE-2025-5222 – Icu: stack buffer overflow in the srbroot::addtag function
https://notcve.org/view.php?id=CVE-2025-5222
27 May 2025 — A stack buffer overflow was found in Internationl components for unicode (ICU ). While running the genrb binary, the 'subtag' struct overflowed at the SRBRoot::addTag function. This issue may lead to memory corruption and local arbitrary code execution. • https://access.redhat.com/security/cve/CVE-2025-5222 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •