First published: Tue Nov 22 2022(Updated: )
In libarchive 3.6.1, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference or, in some cases, even arbitrary code execution. Upstream patch: <a href="https://github.com/libarchive/libarchive/commit/fd180c36036df7181a64931264732a10ad8cd024">https://github.com/libarchive/libarchive/commit/fd180c36036df7181a64931264732a10ad8cd024</a>
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libarchive Libarchive | >=3.0.0<3.6.2 | |
Debian Debian Linux | =10.0 | |
Fedoraproject Fedora | =37 | |
Splunk Universal Forwarder | >=8.2.0<8.2.12 | |
Splunk Universal Forwarder | >=9.0.0<9.0.6 | |
Splunk Universal Forwarder | =9.1.0 | |
F5 BIG-IP | >=17.1.0<=17.1.1 | |
F5 BIG-IP | >=16.1.0<=16.1.5 | |
F5 BIG-IP | >=15.1.0<=15.1.10 | |
F5 BIG-IQ Centralized Management | >=8.2.0<=8.3.0 | |
F5 Traffix SDC | =5.2.0 | |
debian/libarchive | <=3.4.3-2+deb11u1 | 3.6.2-1+deb12u1 3.7.4-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-36227 is a vulnerability in the libarchive software before version 3.6.2 that can result in a NULL pointer dereference.
CVE-2022-36227 has a severity rating of 9.8 (critical).
Versions of libarchive before 3.6.2 are affected by CVE-2022-36227.
CVE-2022-36227 is classified under CWE-476 (NULL Pointer Dereference).
Yes, you can find references for CVE-2022-36227 at the following links: [Link 1](https://bugs.gentoo.org/882521), [Link 2](https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215), [Link 3](https://github.com/libarchive/libarchive/issues/1754).