Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the r_str_ncpy function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see CWE.
{
"cna_assigner": "@huntrdev",
"cwe_ids": [
"CWE-122"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/1xxx/CVE-2022-1240.json"
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-1240.json"
[
{
"digest": {
"function_hash": "145063074460943694343881143365853227954",
"length": 2497.0
},
"signature_version": "v1",
"target": {
"file": "libr/main/r2pm.c",
"function": "r2pm_setenv"
},
"signature_type": "Function",
"id": "CVE-2022-1240-b84373c8",
"source": "https://github.com/radareorg/radare2/commit/3c9ad151adf52658d814f56b9bb80bc9231da36b",
"deprecated": false
},
{
"digest": {
"line_hashes": [
"174233268195547535776550818523348433867",
"110857393716508268641351500537619892142",
"256171613986678726198978827673555401355",
"39846773422299067065457741506509880629",
"241005996178148118483357125520551727138",
"7345371084092435429530051306604400430",
"93665153460321992513043392253670786010",
"107126595801987420493534474550200559584"
],
"threshold": 0.9
},
"signature_version": "v1",
"target": {
"file": "libr/main/r2pm.c"
},
"signature_type": "Line",
"id": "CVE-2022-1240-d50b7e62",
"source": "https://github.com/radareorg/radare2/commit/3c9ad151adf52658d814f56b9bb80bc9231da36b",
"deprecated": false
}
]