CVE-2022-36227

Source
https://cve.org/CVERecord?id=CVE-2022-36227
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36227.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-36227
Downstream
Related
Published
2022-11-22T00:00:00Z
Modified
2026-05-15T11:53:35.758570716Z
Summary
[none]
Details

In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36227.json",
    "cna_assigner": "mitre"
}
References

Affected packages