ALT-PU-2022-1001-1
Closed vulnerabilities
Published: 2021-08-02
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-3673
A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1989130
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIARALLVVY2362AYFSFULTZKIW6QO5R5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NFQPEPMLAOQNGZG5OHSPZBNONGG4DDJO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGOU2EFE7YK2YDRNFV6QFUWW2SL2GGQA/
- https://bugzilla.redhat.com/show_bug.cgi?id=1989130
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JIARALLVVY2362AYFSFULTZKIW6QO5R5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NFQPEPMLAOQNGZG5OHSPZBNONGG4DDJO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SKGIB52R4XPCPNEW6GF56EHW7ST24IJU/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XGOU2EFE7YK2YDRNFV6QFUWW2SL2GGQA/
Published: 2022-02-24
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-4021
A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
Severity: HIGH (7.5)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
Published: 2022-05-25
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-44974
radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser.
Severity: MEDIUM (4.3)
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Severity: MEDIUM (5.5)
Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
References:
- http://www.openwall.com/lists/oss-security/2022/05/25/1
- https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/
- https://github.com/radareorg/radare2/issues/19478
- http://www.openwall.com/lists/oss-security/2022/05/25/1
- https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/
- https://github.com/radareorg/radare2/issues/19478