First published: Tue Nov 22 2022(Updated: )
In libarchive 3.6.1, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference or, in some cases, even arbitrary code execution. Upstream patch: <a href="https://github.com/libarchive/libarchive/commit/fd180c36036df7181a64931264732a10ad8cd024">https://github.com/libarchive/libarchive/commit/fd180c36036df7181a64931264732a10ad8cd024</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Oracle Libarchive |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2144972 is critical due to the potential for arbitrary code execution resulting from a NULL pointer dereference.
To fix REDHAT-BUG-2144972, update to the latest version of libarchive where the error handling for the calloc function is properly implemented.
The affected software for REDHAT-BUG-2144972 is libarchive version 3.6.1.
REDHAT-BUG-2144972 is a NULL pointer dereference vulnerability that may lead to arbitrary code execution.
As of now, there are no publicly known exploits specifically targeting REDHAT-BUG-2144972.