libarchive vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the libarchive package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • L
Unchecked Return Value

<0:3.3.3-4.el8_6
  • L
Unchecked Return Value

<0:3.3.3-4.el8_6
  • L
Unchecked Return Value

<0:3.3.3-4.el8_6
  • L
Unchecked Return Value

<0:3.3.3-4.el8_6
  • L
Unchecked Return Value

<0:3.3.3-5.el8
  • L
Unchecked Return Value

<0:3.3.3-5.el8
  • L
Unchecked Return Value

<0:3.3.3-5.el8
  • L
Unchecked Return Value

<0:3.3.3-5.el8
  • L
Unchecked Return Value

<0:3.3.3-5.el8
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • M
Link Following

<0:3.3.3-3.el8_5
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-4.el8_0
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • H
Use After Free

<0:3.3.2-8.el8_1
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Use After Free

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Loop with Unreachable Exit Condition ('Infinite Loop')

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-9.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Out-of-bounds Read

<0:3.3.2-7.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • M
Off-by-one Error

<0:3.3.3-1.el8
  • L
Out-of-bounds Write

*
  • L
Improper Input Validation

*
  • L
NULL Pointer Dereference

*
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Out-of-bounds Read

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8
  • M
Heap-based Buffer Overflow

<0:3.3.3-1.el8