Known vulnerabilities in libarchive libarchive 2.8.3

CSH
CYBERSECURITY HELP
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
Vulnerability Intelligence Vulnerability Management Pricing Vulnerability Database Blog
Sign In REGISTER
[] 
Main › Vulnerability Database › libarchive › libarchive › 2.8.3

Known vulnerabilities in libarchive libarchive 2.8.3

Vendor: libarchive
Website: https://www.libarchive.org/
Total Security Bulletins: 9
3.8.5 3.8.4 3.8.3 3.8.2 3.8.1 3.8.0 3.7.9 3.7.8 3.7.7 3.7.6 3.7.5 3.7.4 3.7.3 3.7.2 3.7.1 3.7.0 3.6.2 3.6.1 3.6.0 3.5.3 3.5.2 3.5.1 3.5.0 3.0 3.4.3 3.4.2 3.4.1 3.3.1 2.6.2 2.6.1 2.6.0 3.4.0 3.3.0 2.9.3 2.9.2 2.9.0 3.2.2 3.3.3 3.3.2 3.1.901a 2.6.992 2.7.0 2.7.1 2.7.901 2.7.902a 2.8.0 2.8.1 2.8.2 2.8.3 2.8.4 2.8.5 3.0.0 3.0.1 3.0.2 3.0.3 3.0.4 3.1.0 3.1.1 3.1.2 3.1.900 3.1.901 3.2.0 3.2.1

Security bulletins (9)

Secuity bulletin Severity Status Published
SB2025072515: NULL pointer dereference in libarchive Low
Patched
25.07.2025
SB2025032034: Multiple vulnerabilities in Libarchive High
Patched
20.03.2025
SB2024060524: Multiple vulnerabilities in libarchive High
Patched
05.06.2024
SB2021072064: Denial of service in libarchive Medium
Patched
20.07.2021
SB2019102911: Remote code execution in libarchive High
Patched
29.10.2019
SB2019090214: Denial of service in libarchive Medium
Patched
02.09.2019
SB2016072608: Integer overflow in isoent_gen_joliet_identifier() in libarchive libarchive High
Patched
26.07.2016
SB2012041302: Buffer overflow in libarchive Medium
Patched
13.04.2012
SB2012041303: Buffer overflow in libarchive Medium
Patched
13.04.2012

Terms of Use|Privacy Policy|Contacts

© 2026 Cybersecurity Help s.r.o.


Cookie Settings

We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic.

Necessary

Required for basic site functionality

Google Analytics

Helps us understand how visitors use our site

Learn more in our Privacy Policy

Please verify you're human

Complete the CAPTCHA below or accept cookies to continue browsing.

or