Source: radare2
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for radare2.

CVE-2021-44975[0]:
| radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via
| /libr/core/anal_objc.c mach-o parser.

https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/
Fixed in 5.6.0

CVE-2021-44974[1]:
| radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer
| Dereference via libr/bin/p/bin_symbols.c binary symbol parser.

https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/
Fixed in 5.5.4

CVE-2021-4021[2]:
| A vulnerability was found in Radare2 in versions prior to 5.6.2,
| 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an
| ELF64 binary for MIPS architecture can lead to uncontrolled resource
| consumption and DoS.

https://github.com/radareorg/radare2/issues/19436
https://github.com/radareorg/radare2/commit/3fed0e322d9374891a3412811e5270dc535cea02

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-44975
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44975
[1] https://security-tracker.debian.org/tracker/CVE-2021-44974
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44974
[2] https://security-tracker.debian.org/tracker/CVE-2021-4021
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4021

Please adjust the affected versions in the BTS as needed.

Reply via email to