Advisory Database
  • Advisories
  • Dependency Scanning
  1. conan
  2. ›
  3. libarchive
  4. ›
  5. CVE-2022-36227

CVE-2022-36227: NULL Pointer Dereference

November 22, 2022 (updated November 7, 2023)

In libarchive 3.6.1, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: “In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution.”

References

  • bugs.gentoo.org/882521
  • github.com/libarchive/libarchive/issues/1754
  • nvd.nist.gov/vuln/detail/CVE-2022-36227

Code Behaviors & Features

Detect and mitigate CVE-2022-36227 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.0.0 before 3.6.2

Fixed versions

  • 3.6.2

Solution

Upgrade to version 3.6.2 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-476: NULL Pointer Dereference

Source file

conan/libarchive/CVE-2022-36227.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:33 +0000.