First published: Tue Mar 22 2022(Updated: )
Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
Radare2 | <5.6.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-1031 is a vulnerability which allows for a use after free in op_is_set_bp in GitHub repository radareorg/radare2 prior to version 5.6.6.
CVE-2022-1031 has a severity rating of 7.8 (high).
The vulnerability affects versions of Radare Radare2 prior to version 5.6.6.
To fix CVE-2022-1031, it is recommended to update Radare2 to version 5.6.6 or later.
You can find more information about CVE-2022-1031 at the following references: [GitHub Commit](https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb) and [Huntr Bounty](https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457).