{"id":"USN-7070-1","summary":"libarchive vulnerabilities","details":"It was discovered that libarchive mishandled certain memory checks,\nwhich could result in a NULL pointer dereference. An attacker could\npotentially use this issue to cause a denial of service. This issue\nonly affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS,\nUbuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-36227)\n\nIt was discovered that libarchive mishandled certain memory operations,\nwhich could result in an out-of-bounds memory access. An attacker could\npotentially use this issue to cause a denial of service. This issue only\naffected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS.\n(CVE-2024-48957, CVE-2024-48958)\n","modified":"2026-04-22T10:53:21.176609Z","published":"2024-10-16T04:36:11Z","related":["UBUNTU-CVE-2022-36227","UBUNTU-CVE-2024-48957","UBUNTU-CVE-2024-48958"],"upstream":["CVE-2022-36227","CVE-2024-48957","CVE-2024-48958","UBUNTU-CVE-2022-36227","UBUNTU-CVE-2024-48957","UBUNTU-CVE-2024-48958"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7070-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-36227"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-48957"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-48958"}],"affected":[{"package":{"name":"libarchive","ecosystem":"Ubuntu:Pro:14.04:LTS","purl":"pkg:deb/ubuntu/libarchive@3.1.2-7ubuntu2.8+esm3?arch=source&distro=trusty/esm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.2-7ubuntu2.8+esm3"}]}],"versions":["3.1.2-5ubuntu1","3.1.2-7ubuntu1","3.1.2-7ubuntu2","3.1.2-7ubuntu2.1","3.1.2-7ubuntu2.2","3.1.2-7ubuntu2.3","3.1.2-7ubuntu2.4","3.1.2-7ubuntu2.6","3.1.2-7ubuntu2.7","3.1.2-7ubuntu2.8","3.1.2-7ubuntu2.8+esm1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"bsdcpio","binary_version":"3.1.2-7ubuntu2.8+esm3"},{"binary_name":"bsdtar","binary_version":"3.1.2-7ubuntu2.8+esm3"},{"binary_name":"libarchive13","binary_version":"3.1.2-7ubuntu2.8+esm3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7070-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:14.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-36227"}]}}},{"package":{"name":"libarchive","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/libarchive@3.1.2-11ubuntu0.16.04.8+esm1?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.1.2-11ubuntu0.16.04.8+esm1"}]}],"versions":["3.1.2-11build1","3.1.2-11ubuntu0.16.04.1","3.1.2-11ubuntu0.16.04.2","3.1.2-11ubuntu0.16.04.3","3.1.2-11ubuntu0.16.04.4","3.1.2-11ubuntu0.16.04.5","3.1.2-11ubuntu0.16.04.6","3.1.2-11ubuntu0.16.04.7","3.1.2-11ubuntu0.16.04.8"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"bsdcpio","binary_version":"3.1.2-11ubuntu0.16.04.8+esm1"},{"binary_name":"bsdtar","binary_version":"3.1.2-11ubuntu0.16.04.8+esm1"},{"binary_name":"libarchive13","binary_version":"3.1.2-11ubuntu0.16.04.8+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7070-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-36227"}]}}},{"package":{"name":"libarchive","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/libarchive@3.2.2-3.1ubuntu0.7+esm1?arch=source&distro=esm-infra/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.2.2-3.1ubuntu0.7+esm1"}]}],"versions":["3.2.2-3.1","3.2.2-3.1ubuntu0.1","3.2.2-3.1ubuntu0.2","3.2.2-3.1ubuntu0.3","3.2.2-3.1ubuntu0.4","3.2.2-3.1ubuntu0.5","3.2.2-3.1ubuntu0.6","3.2.2-3.1ubuntu0.7"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro","binaries":[{"binary_name":"bsdcpio","binary_version":"3.2.2-3.1ubuntu0.7+esm1"},{"binary_name":"bsdtar","binary_version":"3.2.2-3.1ubuntu0.7+esm1"},{"binary_name":"libarchive-tools","binary_version":"3.2.2-3.1ubuntu0.7+esm1"},{"binary_name":"libarchive13","binary_version":"3.2.2-3.1ubuntu0.7+esm1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7070-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-36227"}]}}},{"package":{"name":"libarchive","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/libarchive@3.4.0-2ubuntu1.3?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.4.0-2ubuntu1.3"}]}],"versions":["3.4.0-1","3.4.0-1build1","3.4.0-1ubuntu2","3.4.0-2ubuntu1","3.4.0-2ubuntu1.1","3.4.0-2ubuntu1.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libarchive-tools","binary_version":"3.4.0-2ubuntu1.3"},{"binary_name":"libarchive13","binary_version":"3.4.0-2ubuntu1.3"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7070-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-36227"}]}}},{"package":{"name":"libarchive","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/libarchive@3.6.0-1ubuntu1.2?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.0-1ubuntu1.2"}]}],"versions":["3.4.3-2","3.4.3-2build1","3.5.2-1","3.5.2-1ubuntu1","3.6.0-1ubuntu1","3.6.0-1ubuntu1.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libarchive-tools","binary_version":"3.6.0-1ubuntu1.2"},{"binary_name":"libarchive13","binary_version":"3.6.0-1ubuntu1.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7070-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"low","type":"Ubuntu"}],"id":"CVE-2022-36227"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-48957"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-48958"}]}}},{"package":{"name":"libarchive","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/libarchive@3.7.2-2ubuntu0.2?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.7.2-2ubuntu0.2"}]}],"versions":["3.6.2-1ubuntu1","3.7.2-1ubuntu1","3.7.2-1ubuntu2","3.7.2-1.1ubuntu2","3.7.2-2","3.7.2-2ubuntu0.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"libarchive-tools","binary_version":"3.7.2-2ubuntu0.2"},{"binary_name":"libarchive13t64","binary_version":"3.7.2-2ubuntu0.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7070-1.json","cves_map":{"ecosystem":"Ubuntu:24.04:LTS","cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-48957"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-48958"}]}}}],"schema_version":"1.7.5"}