libarchive

Direct Vulnerabilities

Known vulnerabilities in the https://libarchive.org|libarchive package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Out-of-bounds Write

[2.6.0,)
  • H
Incorrect Bitwise Shift of Integer

[0,)
  • H
Out-of-bounds Read

[0,)
  • H
Infinite loop

[,3.8.6)
  • M
Infinite loop

[3.8.2,3.8.4)
  • L
Out-of-bounds Write

[,3.8.0)
  • L
Heap-based Buffer Overflow

[,3.8.0)
  • L
Double Free

[,3.8.0)
  • L
Integer Overflow or Wraparound

[,3.8.0)
  • L
Out-of-bounds Read

[,3.8.0)
  • H
NULL Pointer Dereference

[3.7.5,3.8.0)
  • L
Buffer Overflow

[,3.7.8)
  • M
NULL Pointer Dereference

[,3.7.8)
  • M
Buffer Over-read

[,3.7.8)
  • H
Out-of-bounds Read

[,3.7.5)
  • H
Out-of-bounds Read

[,3.7.5)
  • H
Out-of-bounds Read

[3.7.3,3.7.4)
  • H
Out-of-bounds Write

[,3.7.5)
  • H
Heap-based Buffer Overflow

[,3.7.4)
  • L
Race Condition

[,3.7.0)
  • H
NULL Pointer Dereference

[,3.6.2)
  • M
Symlink Attack

[,3.5.2)
  • M
Arbitrary File Write via Archive Extraction (Zip Slip)

[,3.5.2)
  • M
Out-of-bounds Read

[,3.6.1)
  • M
Out-of-bounds Read

[,3.6.1)
  • M
Memory Leak

[,3.4.0)
  • M
Out-of-bounds Read

[,3.2.0)
  • M
Out-of-Bounds

[0,3.3.0)
  • M
NULL Pointer Dereference

[3.3.0,3.4.0)
  • H
Double Free

[3.1.0,3.4.0)
  • M
NULL Pointer Dereference

[,3.2.0)
  • H
Improper Input Validation

[,3.2.2)
  • M
Integer Overflow or Wraparound

[,3.2.0)
  • M
Out-of-bounds Read

[0,3.3.3)
  • H
Out-of-bounds Read

[0,3.2.2)
  • M
Denial of Service (DoS)

[2.8.0,3.4.0)
  • H
Use After Free

[3.1.0,3.4.0)
  • M
Out-of-bounds Write

[0,3.4.1)
  • H
Out-of-bounds Read

[0,3.3.0)
  • M
Out-of-bounds Read

[0,3.2.2)
  • M
Out-of-bounds Read

[3.0.2,3.4.0)
  • H
Out-of-Bounds

[0,3.2.2)
  • H
Out-of-Bounds

[,3.2.1)
  • M
Out-of-bounds Read

[,3.2.0)
  • M
Improper Input Validation

[,3.2.0)
  • M
Integer Overflow or Wraparound

[,3.2.1)
  • M
Use After Free

[3.4.1,3.5.3)
  • H
Integer Overflow or Wraparound

[,3.2.0)
  • M
Out-of-bounds Read

[,3.2.1)
  • M
NULL Pointer Dereference

[,3.2.0)
  • M
Improper Input Validation

[,3.2.0)
  • H
Out-of-Bounds

[,3.2.1)
  • M
NULL Pointer Dereference

[0,3.3.0)
  • H
Out-of-bounds Read

[0,3.3.3)
  • H
Out-of-bounds Write

[3.4.0,3.4.2)
  • M
Out-of-bounds Read

[0,3.3.3)
  • M
Out-of-Bounds

[,3.2.0)
  • H
Out-of-Bounds

[,3.2.0)
  • M
Out-of-Bounds

[0,3.3.0)
  • H
Use After Free

[,3.4.0)
  • M
Out-of-Bounds

[3.2.0,3.4.0)
  • M
Out-of-bounds Read

[,3.4.1)
  • H
Improper Input Validation

[,3.2.1)
  • M
Out-of-bounds Read

[,3.2.0)
  • M
Out-of-bounds Read

[,3.2.0)
  • M
Denial of Service (DoS)

[,3.2.0)
  • H
Out-of-bounds Read

[,3.2.0)
  • H
Out-of-Bounds

[,3.2.0)
  • M
Resource Management Errors

[,3.2.0)
  • H
Integer Overflow or Wraparound

[,3.2.1)
  • M
Out-of-bounds Read

[0,3.3.3)
  • M
NULL Pointer Dereference

[,3.2.0)
  • H
NULL Pointer Dereference

[,3.2.0)
  • H
Improper Input Validation

[,3.2.0)
  • M
Out-of-bounds Read

[,3.2.0)
  • H
Integer Overflow or Wraparound

[,3.2.1)
  • M
Out-of-bounds Read

[,3.2.0)
  • H
Improper Input Validation

[,3.2.0)
  • M
Directory Traversal

[,3.2.0)