Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to a double free in bobj.c:rzbinrelocstoragefree() when freeing relocations generated from qnx binary plugin. A user opening a malicious qnx binary could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number a3d50c1ea185f3f642f2d8180715f82d98840784 contains a patch for this issue.
{
"cwe_ids": [
"CWE-415"
],
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36043.json",
"cna_assigner": "GitHub_M"
}[
{
"deprecated": false,
"digest": {
"line_hashes": [
"130584938620738421090744432066973751435",
"232576171358555294871340441755633238374",
"292562530348488677317546736642562466524",
"301628167271895032269636563712294494176"
],
"threshold": 0.9
},
"signature_version": "v1",
"id": "CVE-2022-36043-a871c020",
"source": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784",
"target": {
"file": "librz/bin/p/bin_qnx.c"
},
"signature_type": "Line"
},
{
"deprecated": false,
"digest": {
"function_hash": "296402662548289440242333226039584430712",
"length": 161.0
},
"signature_version": "v1",
"id": "CVE-2022-36043-d97a80f0",
"source": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784",
"target": {
"function": "relocs",
"file": "librz/bin/p/bin_qnx.c"
},
"signature_type": "Function"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36043.json"