Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-36227

Опубликовано: 11 июл. 2022
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."

A flaw was found in libarchive. A missing check of the return value of the calloc function can cause a NULL pointer dereference in an out-of-memory condition or when a memory allocation limit is reached, resulting in the program linked with libarchive to crash.

Отчет

This vulnerability can only be exploited in an out-of-memory condition or when a memory allocation limit is reached. Additionally, the only known security impact of this issue is a denial of service. Due to these conditions, this flaw was rated as having a low severity. The out-of-memory condition is triggered when all physical memory, including swap space, is being used. Furthermore, depending on the configuration, this event can cause the out-of-memory killer (OOM-Killer) to be activated, terminating the application and preventing the NULL pointer dereference from being exploited.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6libarchiveOut of support scope
Red Hat Enterprise Linux 7libarchiveOut of support scope
Red Hat Enterprise Linux 8libarchiveFixedRHSA-2023:301816.05.2023
Red Hat Enterprise Linux 8.6 Extended Update SupportlibarchiveFixedRHSA-2024:014610.01.2024
Red Hat Enterprise Linux 9libarchiveFixedRHSA-2023:253209.05.2023
Red Hat Enterprise Linux 9libarchiveFixedRHSA-2023:253209.05.2023

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-252->CWE-476
https://bugzilla.redhat.com/show_bug.cgi?id=2144972libarchive: NULL pointer dereference in archive_write.c

EPSS

Процентиль: 62%
0.00433
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 3 года назад

In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."

CVSS3: 9.8
nvd
почти 3 года назад

In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."

CVSS3: 9.8
msrc
почти 3 года назад

Описание отсутствует

CVSS3: 9.8
debian
почти 3 года назад

In libarchive before 3.6.2, the software does not check for an error a ...

suse-cvrf
почти 3 года назад

Security update for libarchive

EPSS

Процентиль: 62%
0.00433
Низкий

5.9 Medium

CVSS3