First published: Tue Aug 22 2023(Updated: )
A use after free in r_reg_get_name_idx function in radare2 5.4.2 and 5.4.0.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Radare Radare2 | =5.4.0 | |
Radare Radare2 | =5.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-28071 is a vulnerability in radare2 version 5.4.2 and 5.4.0 that allows for a use after free in the r_reg_get_name_idx function.
CVE-2022-28071 has a severity rating of 7.5 (high) on the CVSS scale.
Radare2 versions 5.4.2 and 5.4.0 are affected by CVE-2022-28071.
To fix CVE-2022-28071, update radare2 to a version that is not affected (i.e., newer than 5.4.2 or 5.4.0) by applying the necessary patches or upgrading to a patched version.
More information about CVE-2022-28071 can be found at the following link: [https://github.com/radareorg/radare2/commit/65448811e5b9582a19cf631e03cfcaa025a92ef5](https://github.com/radareorg/radare2/commit/65448811e5b9582a19cf631e03cfcaa025a92ef5).