A use after free in r_reg_get_name_idx function in radare2 5.4.2 and 5.4.0.
References
Link | Resource |
---|---|
https://github.com/radareorg/radare2/commit/65448811e5b9582a19cf631e03cfcaa025a92ef5 | Patch Third Party Advisory |
https://github.com/radareorg/radare2/commit/65448811e5b9582a19cf631e03cfcaa025a92ef5 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:56
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/radareorg/radare2/commit/65448811e5b9582a19cf631e03cfcaa025a92ef5 - Patch, Third Party Advisory |
24 Aug 2023, 22:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Radare radare2
Radare |
|
CPE | cpe:2.3:a:radare:radare2:5.4.0:*:*:*:*:*:*:* cpe:2.3:a:radare:radare2:5.4.2:*:*:*:*:*:*:* |
|
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://github.com/radareorg/radare2/commit/65448811e5b9582a19cf631e03cfcaa025a92ef5 - Patch, Third Party Advisory |
22 Aug 2023, 20:10
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-22 19:16
Updated : 2024-11-21 06:56
NVD link : CVE-2022-28071
Mitre link : CVE-2022-28071
CVE.ORG link : CVE-2022-28071
JSON object : View
Products Affected
radare
- radare2
CWE
CWE-416
Use After Free