In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: "In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution."
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3294-1 libarchive security update
Debian DLA Debian DLA DLA-3950-1 libarchive security update
Ubuntu USN Ubuntu USN USN-7070-1 libarchive vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2025-11-03T21:46:29.036Z

Reserved: 2022-07-18T00:00:00.000Z

Link: CVE-2022-36227

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-11-22T02:15:11.003

Modified: 2025-11-03T22:15:59.710

Link: CVE-2022-36227

cve-icon Redhat

Severity : Low

Publid Date: 2022-07-11T00:00:00Z

Links: CVE-2022-36227 - Bugzilla

cve-icon OpenCVE Enrichment

No data.