Source: radare2
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerabilities were published for radare2.

CVE-2025-5646[0]:
| A vulnerability has been found in Radare2 5.9.9 and classified as
| problematic. This vulnerability affects the function
| r_cons_rainbow_free in the library /libr/cons/pal.c of the component
| radiff2. The manipulation of the argument -T leads to memory
| corruption. It is possible to launch the attack on the local host.
| The complexity of an attack is rather high. The exploitation appears
| to be difficult. The exploit has been disclosed to the public and
| may be used. The real existence of this vulnerability is still
| doubted at the moment. The patch is identified as
| 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
| a patch to fix this issue. The documentation explains that the
| parameter -T is experimental and "crashy". Further analysis has
| shown "the race is not a real problem unless you use asan". A new
| warning has been added.

https://github.com/radareorg/radare2/issues/24235
https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798


CVE-2025-5645[1]:
| A vulnerability, which was classified as problematic, was found in
| Radare2 5.9.9. This affects the function r_cons_pal_init in the
| library /libr/cons/pal.c of the component radiff2. The manipulation
| of the argument -T leads to memory corruption. Attacking locally is
| a requirement. The complexity of an attack is rather high. The
| exploitability is told to be difficult. The exploit has been
| disclosed to the public and may be used. The real existence of this
| vulnerability is still doubted at the moment. The identifier of the
| patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended
| to apply a patch to fix this issue. The documentation explains that
| the parameter -T is experimental and "crashy". Further analysis has
| shown "the race is not a real problem unless you use asan". A new
| warning has been added.

https://github.com/radareorg/radare2/issues/24234
https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798


CVE-2025-5644[2]:
| A vulnerability, which was classified as problematic, has been found
| in Radare2 5.9.9. Affected by this issue is the function
| r_cons_flush in the library /libr/cons/cons.c of the component
| radiff2. The manipulation of the argument -T leads to use after
| free. Local access is required to approach this attack. The
| complexity of an attack is rather high. The exploitation is known to
| be difficult. The exploit has been disclosed to the public and may
| be used. The real existence of this vulnerability is still doubted
| at the moment. The name of the patch is
| 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
| a patch to fix this issue. The documentation explains that the
| parameter -T is experimental and "crashy". Further analysis has
| shown "the race is not a real problem unless you use asan". A new
| warning has been added.

https://github.com/radareorg/radare2/issues/24233
https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798


CVE-2025-5643[3]:
| A vulnerability classified as problematic was found in Radare2
| 5.9.9. Affected by this vulnerability is the function
| cons_stack_load in the library /libr/cons/cons.c of the component
| radiff2. The manipulation of the argument -T leads to memory
| corruption. An attack has to be approached locally. The complexity
| of an attack is rather high. The exploitation appears to be
| difficult. The exploit has been disclosed to the public and may be
| used. The real existence of this vulnerability is still doubted at
| the moment. The patch is named
| 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
| a patch to fix this issue. The documentation explains that the
| parameter -T is experimental and "crashy". Further analysis has
| shown "the race is not a real problem unless you use asan". A new
| warning has been added.

https://github.com/radareorg/radare2/issues/24232
https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798


CVE-2025-5642[4]:
| A vulnerability classified as problematic has been found in Radare2
| 5.9.9. Affected is the function r_cons_pal_init in the library
| /libr/cons/pal.c of the component radiff2. The manipulation leads to
| memory corruption. The attack needs to be approached locally. The
| complexity of an attack is rather high. The exploitability is told
| to be difficult. The exploit has been disclosed to the public and
| may be used. The real existence of this vulnerability is still
| doubted at the moment. The patch is identified as
| 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
| a patch to fix this issue. The documentation explains that the
| parameter -T is experimental and "crashy". Further analysis has
| shown "the race is not a real problem unless you use asan". A new
| warning has been added.

https://github.com/radareorg/radare2/issues/24231
https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798


CVE-2025-5641[5]:
| A vulnerability was found in Radare2 5.9.9. It has been rated as
| problematic. This issue affects the function r_cons_is_breaked in
| the library /libr/cons/cons.c of the component radiff2. The
| manipulation of the argument -T leads to memory corruption. It is
| possible to launch the attack on the local host. The complexity of
| an attack is rather high. The exploitation is known to be difficult.
| The exploit has been disclosed to the public and may be used. The
| real existence of this vulnerability is still doubted at the moment.
| The identifier of the patch is
| 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
| a patch to fix this issue. The documentation explains that the
| parameter -T is experimental and "crashy". Further analysis has
| shown "the race is not a real problem unless you use asan". An
| additional warning regarding threading support has been added.

https://github.com/radareorg/radare2/issues/24230
https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-5646
    https://www.cve.org/CVERecord?id=CVE-2025-5646
[1] https://security-tracker.debian.org/tracker/CVE-2025-5645
    https://www.cve.org/CVERecord?id=CVE-2025-5645
[2] https://security-tracker.debian.org/tracker/CVE-2025-5644
    https://www.cve.org/CVERecord?id=CVE-2025-5644
[3] https://security-tracker.debian.org/tracker/CVE-2025-5643
    https://www.cve.org/CVERecord?id=CVE-2025-5643
[4] https://security-tracker.debian.org/tracker/CVE-2025-5642
    https://www.cve.org/CVERecord?id=CVE-2025-5642
[5] https://security-tracker.debian.org/tracker/CVE-2025-5641
    https://www.cve.org/CVERecord?id=CVE-2025-5641

Please adjust the affected versions in the BTS as needed.

Reply via email to