{"id":"CVE-2022-28044","details":"Irzip v0.640 was discovered to contain a heap memory corruption via the component lrzip.c:initialise_control.","modified":"2026-04-11T22:01:42.050396Z","published":"2022-04-15T14:15:07.660Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2022/05/msg00016.html"},{"type":"ADVISORY","url":"https://www.debian.org/security/2022/dsa-5145"},{"type":"FIX","url":"https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46"},{"type":"FIX","url":"https://github.com/ckolivas/lrzip/issues/216"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/ckolivas/lrzip","events":[{"introduced":"0"},{"last_affected":"467fd926054fb3f63e58fb370d316a7f3eabed22"},{"fixed":"5faf80cd53ecfd16b636d653483144cd12004f46"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"0.640"}]}}],"versions":["v0.45","v0.46","v0.47","v0.5","v0.5.1","v0.5.2","v0.520","v0.530","v0.540","v0.541","v0.542","v0.543","v0.544","v0.550","v0.551","v0.552","v0.560","v0.570","v0.600","v0.601","v0.602","v0.603","v0.604","v0.605","v0.606","v0.607","v0.608","v0.610","v0.611","v0.612","v0.613","v0.614","v0.615","v0.616","v0.620","v0.621","v0.630","v0.631","v0.640","v0.641"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-28044.json","vanir_signatures":[{"id":"CVE-2022-28044-02a575bb","signature_version":"v1","source":"https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46","target":{"function":"initialise_control","file":"lrzip.c"},"signature_type":"Function","digest":{"length":1566,"function_hash":"120048619747224409916841126767272423200"},"deprecated":false},{"id":"CVE-2022-28044-0e2298fd","signature_version":"v1","source":"https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46","target":{"file":"lrzip.c"},"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["32634138615718809964073267684721307603","333115761268172430863105423186445599314","282639360963176870613674811544082100536","33453472139807350500083824286263070894"]},"deprecated":false},{"id":"CVE-2022-28044-0f96b237","signature_version":"v1","source":"https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46","target":{"file":"main.c"},"signature_type":"Line","digest":{"threshold":0.9,"line_hashes":["5077610801880557088080381726860767758","337784186053025208768889595787438886142","161444481033092378204180813182909534901","148188151204422471616059364413063341896","110482256496147789852872728738598464162","58876312583648958315126660211030886150","60156686757340159650042981101271527763","54407390705087063506082963213712324866"]},"deprecated":false},{"id":"CVE-2022-28044-b72392ef","signature_version":"v1","source":"https://github.com/ckolivas/lrzip/commit/5faf80cd53ecfd16b636d653483144cd12004f46","target":{"function":"main","file":"main.c"},"signature_type":"Function","digest":{"length":10610,"function_hash":"299357695356841408367873967738251196859"},"deprecated":false}],"vanir_signatures_modified":"2026-04-11T22:01:42Z","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}