First published: Tue Feb 08 2022(Updated: )
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Radare Radare2 | <5.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-0139.
The severity of CVE-2022-0139 is critical with a CVSS score of 9.8.
The GitHub repository radareorg/radare2 prior to version 5.6.0 is affected by CVE-2022-0139.
To fix the Use After Free vulnerability in radareorg/radare2, update to version 5.6.0 or later.
You can find more information about CVE-2022-0139 at the following references: [link1](https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c) and [link2](https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0).