Summary: | <dev-util/radare2-5.7.4: multiple vulnerabilities | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | John Helmert III <ajak> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | trivial | CC: | davidroman96, proxy-maint |
Priority: | Normal | Keywords: | PullRequest |
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
See Also: | https://github.com/gentoo/gentoo/pull/25703 | ||
Whiteboard: | ~3 [noglsa] | ||
Package list: | Runtime testing required: | --- |
Description
John Helmert III
![]() ![]() ![]() ![]() CVE-2022-1649 (https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1): https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449 Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html). This is obviously not a buffer overflow, but a null pointer dereference DoS. CVE-2022-1714 (https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0): https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. CVE-2022-1809 (https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17): https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0. CVE-2022-1899 (https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04): https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=6fd32965aba1d1c11af8c7df5ba828dfb5d0ad60 commit 6fd32965aba1d1c11af8c7df5ba828dfb5d0ad60 Author: David Roman <davidroman96@gmail.com> AuthorDate: 2022-05-31 17:51:43 +0000 Commit: John Helmert III <ajak@gentoo.org> CommitDate: 2022-07-16 16:51:02 +0000 dev-util/radare2: add 5.7.4 Bug: https://bugs.gentoo.org/841023 Signed-off-by: David Roman <davidroman96@gmail.com> Closes: https://github.com/gentoo/gentoo/pull/25703 Signed-off-by: John Helmert III <ajak@gentoo.org> dev-util/radare2/Manifest | 4 + .../radare2/files/radare2-5.7.0-vector35.patch | 22 ++++ dev-util/radare2/radare2-5.7.4.ebuild | 119 +++++++++++++++++++++ 3 files changed, 145 insertions(+) Please cleanup CVE-2022-34520 (https://github.com/radareorg/radare2/issues/20354): Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c. This vulnerability allows attackers to cause a Denial of Service (DOS) via a crafted binary file. CVE-2022-34502 (https://github.com/radareorg/radare2/issues/20336): Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file. Also fixed in 5.7.4. Tree is clean. |