Summary: | [Tracker] Multiple vulnerabilities in radare2/rizin | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | ||
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7 | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | 831057, 836002 | ||
Bug Blocks: |
Description
John Helmert III
![]() ![]() ![]() ![]() Two more: CVE-2022-1240 (https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc): Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). CVE-2022-1244 (https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82): heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service. |