{"id":"CVE-2022-36227","details":"In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: \"In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution.\"","modified":"2026-04-16T04:38:48.964608963Z","published":"2022-11-22T02:15:11.003Z","related":["ALSA-2023:2532","ALSA-2023:3018","CGA-4m9v-5g4p-xp2m","SUSE-SU-2022:4202-1","SUSE-SU-2022:4209-1","SUSE-SU-2022:4296-1","openSUSE-SU-2024:12588-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/11/msg00007.html"},{"type":"ADVISORY","url":"https://github.com/libarchive/libarchive/blob/v3.0.0a/libarchive/archive_write.c#L215"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/01/msg00034.html"},{"type":"ADVISORY","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V67OO2UUQAUJS3IK4JZPF6F3LUCBU6IS/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-14"},{"type":"FIX","url":"https://bugs.gentoo.org/882521"},{"type":"FIX","url":"https://github.com/libarchive/libarchive/issues/1754"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/libarchive/libarchive","events":[{"introduced":"ff922b50705f5e5570356267afd21668c6aefab3"},{"fixed":"ba80276ccc3c941c4918ec6e2460059f0c525c43"}],"database_specific":{"versions":[{"introduced":"3.0.0"},{"fixed":"3.6.2"}]}}],"versions":["v3.0.0a","v3.0.1b","v3.1.900a","v3.2.0","v3.2.1","v3.2.2","v3.3.0","v3.3.1","v3.3.2","v3.3.3","v3.4.0","v3.4.1","v3.4.2","v3.4.3","v3.5.0","v3.5.1","v3.5.2","v3.6.0","v3.6.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-36227.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"10.0"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"8.2.0"},{"fixed":"8.2.12"}]},{"events":[{"introduced":"9.0.0"},{"fixed":"9.0.6"}]},{"events":[{"introduced":"0"},{"last_affected":"9.1.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}