{"id":"AZL-11470","summary":"CVE-2022-36227 affecting package libarchive for versions less than 3.6.1-2","details":"In libarchive before 3.6.2, the software does not check for an error after calling calloc function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. NOTE: the discoverer cites this CWE-476 remark but third parties dispute the code-execution impact: \"In rare circumstances, when NULL is equivalent to the 0x0 memory address and privileged code can access it, then writing or reading memory is possible, which may lead to code execution.\"","modified":"2026-04-01T05:07:02.536565Z","published":"2022-11-22T02:15:11Z","upstream":["CVE-2022-36227"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36227"}],"affected":[{"package":{"name":"libarchive","ecosystem":"Azure Linux:2","purl":"pkg:rpm/azure-linux/libarchive"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.6.1-2"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-11470.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}