Control: retitle -1 radare2: CVE-2025-5648 CVE-2025-5647 CVE-2025-5646 
CVE-2025-5645 CVE-2025-5644 CVE-2025-5643 CVE-2025-5642 CVE-2025-5641

hi,

On Thu, Jun 05, 2025 at 05:16:07PM +0200, Moritz Mühlenhoff wrote:
> Source: radare2
> X-Debbugs-CC: t...@security.debian.org
> Severity: normal
> Tags: security
> 
> Hi,
> 
> The following vulnerabilities were published for radare2.
> 
> CVE-2025-5646[0]:
> | A vulnerability has been found in Radare2 5.9.9 and classified as
> | problematic. This vulnerability affects the function
> | r_cons_rainbow_free in the library /libr/cons/pal.c of the component
> | radiff2. The manipulation of the argument -T leads to memory
> | corruption. It is possible to launch the attack on the local host.
> | The complexity of an attack is rather high. The exploitation appears
> | to be difficult. The exploit has been disclosed to the public and
> | may be used. The real existence of this vulnerability is still
> | doubted at the moment. The patch is identified as
> | 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
> | a patch to fix this issue. The documentation explains that the
> | parameter -T is experimental and "crashy". Further analysis has
> | shown "the race is not a real problem unless you use asan". A new
> | warning has been added.
> 
> https://github.com/radareorg/radare2/issues/24235
> https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798
> 
> 
> CVE-2025-5645[1]:
> | A vulnerability, which was classified as problematic, was found in
> | Radare2 5.9.9. This affects the function r_cons_pal_init in the
> | library /libr/cons/pal.c of the component radiff2. The manipulation
> | of the argument -T leads to memory corruption. Attacking locally is
> | a requirement. The complexity of an attack is rather high. The
> | exploitability is told to be difficult. The exploit has been
> | disclosed to the public and may be used. The real existence of this
> | vulnerability is still doubted at the moment. The identifier of the
> | patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended
> | to apply a patch to fix this issue. The documentation explains that
> | the parameter -T is experimental and "crashy". Further analysis has
> | shown "the race is not a real problem unless you use asan". A new
> | warning has been added.
> 
> https://github.com/radareorg/radare2/issues/24234
> https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798
> 
> 
> CVE-2025-5644[2]:
> | A vulnerability, which was classified as problematic, has been found
> | in Radare2 5.9.9. Affected by this issue is the function
> | r_cons_flush in the library /libr/cons/cons.c of the component
> | radiff2. The manipulation of the argument -T leads to use after
> | free. Local access is required to approach this attack. The
> | complexity of an attack is rather high. The exploitation is known to
> | be difficult. The exploit has been disclosed to the public and may
> | be used. The real existence of this vulnerability is still doubted
> | at the moment. The name of the patch is
> | 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
> | a patch to fix this issue. The documentation explains that the
> | parameter -T is experimental and "crashy". Further analysis has
> | shown "the race is not a real problem unless you use asan". A new
> | warning has been added.
> 
> https://github.com/radareorg/radare2/issues/24233
> https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798
> 
> 
> CVE-2025-5643[3]:
> | A vulnerability classified as problematic was found in Radare2
> | 5.9.9. Affected by this vulnerability is the function
> | cons_stack_load in the library /libr/cons/cons.c of the component
> | radiff2. The manipulation of the argument -T leads to memory
> | corruption. An attack has to be approached locally. The complexity
> | of an attack is rather high. The exploitation appears to be
> | difficult. The exploit has been disclosed to the public and may be
> | used. The real existence of this vulnerability is still doubted at
> | the moment. The patch is named
> | 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
> | a patch to fix this issue. The documentation explains that the
> | parameter -T is experimental and "crashy". Further analysis has
> | shown "the race is not a real problem unless you use asan". A new
> | warning has been added.
> 
> https://github.com/radareorg/radare2/issues/24232
> https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798
> 
> 
> CVE-2025-5642[4]:
> | A vulnerability classified as problematic has been found in Radare2
> | 5.9.9. Affected is the function r_cons_pal_init in the library
> | /libr/cons/pal.c of the component radiff2. The manipulation leads to
> | memory corruption. The attack needs to be approached locally. The
> | complexity of an attack is rather high. The exploitability is told
> | to be difficult. The exploit has been disclosed to the public and
> | may be used. The real existence of this vulnerability is still
> | doubted at the moment. The patch is identified as
> | 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
> | a patch to fix this issue. The documentation explains that the
> | parameter -T is experimental and "crashy". Further analysis has
> | shown "the race is not a real problem unless you use asan". A new
> | warning has been added.
> 
> https://github.com/radareorg/radare2/issues/24231
> https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798
> 
> 
> CVE-2025-5641[5]:
> | A vulnerability was found in Radare2 5.9.9. It has been rated as
> | problematic. This issue affects the function r_cons_is_breaked in
> | the library /libr/cons/cons.c of the component radiff2. The
> | manipulation of the argument -T leads to memory corruption. It is
> | possible to launch the attack on the local host. The complexity of
> | an attack is rather high. The exploitation is known to be difficult.
> | The exploit has been disclosed to the public and may be used. The
> | real existence of this vulnerability is still doubted at the moment.
> | The identifier of the patch is
> | 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply
> | a patch to fix this issue. The documentation explains that the
> | parameter -T is experimental and "crashy". Further analysis has
> | shown "the race is not a real problem unless you use asan". An
> | additional warning regarding threading support has been added.
> 
> https://github.com/radareorg/radare2/issues/24230
> https://github.com/radareorg/radare2/commit/5705d99cc1f23f36f9a84aab26d1724010b97798
> 
> 
> If you fix the vulnerabilities please also make sure to include the
> CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
> 
> For further information see:
> 
> [0] https://security-tracker.debian.org/tracker/CVE-2025-5646
>     https://www.cve.org/CVERecord?id=CVE-2025-5646
> [1] https://security-tracker.debian.org/tracker/CVE-2025-5645
>     https://www.cve.org/CVERecord?id=CVE-2025-5645
> [2] https://security-tracker.debian.org/tracker/CVE-2025-5644
>     https://www.cve.org/CVERecord?id=CVE-2025-5644
> [3] https://security-tracker.debian.org/tracker/CVE-2025-5643
>     https://www.cve.org/CVERecord?id=CVE-2025-5643
> [4] https://security-tracker.debian.org/tracker/CVE-2025-5642
>     https://www.cve.org/CVERecord?id=CVE-2025-5642
> [5] https://security-tracker.debian.org/tracker/CVE-2025-5641
>     https://www.cve.org/CVERecord?id=CVE-2025-5641
> 
> Please adjust the affected versions in the BTS as needed.

TWo more issues refer as well to the same upstream change:
CVE-2025-5647 and CVE-2025-5648. Covering them here as well.

Regards,
Salvatore

Reply via email to