Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the r_str_ncpy function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see CWE.
[
{
"id": "CVE-2022-1240-fc1ba656",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"target": {
"file": "libr/bin/format/mach0/mach0.c"
},
"digest": {
"line_hashes": [
"161828278200281398868133491852319055833",
"205039608821184489972863283820120780378",
"243947348467918127835772681603744836927",
"124829447876606044522057134775873539834"
],
"threshold": 0.9
},
"source": "https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4"
}
]