Rizin is a UNIX-like reverse engineering framework and command-line toolset. Versions 0.4.0 and prior are vulnerable to a double free in bobj.c:rzbinrelocstoragefree() when freeing relocations generated from qnx binary plugin. A user opening a malicious qnx binary could be affected by this vulnerability, allowing an attacker to execute code on the user's machine. Commit number a3d50c1ea185f3f642f2d8180715f82d98840784 contains a patch for this issue.
{
"cwe_ids": [
"CWE-415"
]
}[
{
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"130584938620738421090744432066973751435",
"232576171358555294871340441755633238374",
"292562530348488677317546736642562466524",
"301628167271895032269636563712294494176"
]
},
"target": {
"file": "librz/bin/p/bin_qnx.c"
},
"signature_version": "v1",
"id": "CVE-2022-36043-a871c020",
"deprecated": false,
"source": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784"
},
{
"signature_type": "Function",
"digest": {
"function_hash": "296402662548289440242333226039584430712",
"length": 161.0
},
"target": {
"file": "librz/bin/p/bin_qnx.c",
"function": "relocs"
},
"signature_version": "v1",
"id": "CVE-2022-36043-d97a80f0",
"deprecated": false,
"source": "https://github.com/rizinorg/rizin/commit/a3d50c1ea185f3f642f2d8180715f82d98840784"
}
]