CVE-2022-36043

Source
https://nvd.nist.gov/vuln/detail/CVE-2022-36043
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36043.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-36043
Aliases
  • GHSA-rjhv-mj4g-j4p5
Published
2022-09-06T00:00:00Z
Modified
2025-11-28T04:50:50.661492Z
Severity
  • 7.8 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Rizin Double Free in bobj.c when using qnx binary plugin
Details

Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to a double free in bobj.c:rzbinrelocstoragefree() when freeing relocations generated from qnx binary plugin. A user opening a malicious qnx binary could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number a3d50c1ea185f3f642f2d8180715f82d98840784 contains a patch for this issue.

Database specific
{
    "cwe_ids": [
        "CWE-415"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/36xxx/CVE-2022-36043.json",
    "cna_assigner": "GitHub_M"
}
References

Affected packages

Git / github.com/rizinorg/rizin

Affected ranges

Type
GIT
Repo
https://github.com/rizinorg/rizin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

vanir_signatures

[
    {
        "deprecated": false,
        "digest": {
            "line_hashes": [
                "130584938620738421090744432066973751435",
                "232576171358555294871340441755633238374",
                "292562530348488677317546736642562466524",
                "301628167271895032269636563712294494176"
            ],
            "threshold": 0.9
        },
        "signature_version": "v1",
        "id": "CVE-2022-36043-a871c020",
        "source": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784",
        "target": {
            "file": "librz/bin/p/bin_qnx.c"
        },
        "signature_type": "Line"
    },
    {
        "deprecated": false,
        "digest": {
            "function_hash": "296402662548289440242333226039584430712",
            "length": 161.0
        },
        "signature_version": "v1",
        "id": "CVE-2022-36043-d97a80f0",
        "source": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784",
        "target": {
            "function": "relocs",
            "file": "librz/bin/p/bin_qnx.c"
        },
        "signature_type": "Function"
    }
]

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-36043.json"