Bug ID | 1234065 |
---|---|
Summary | VUL-0: CVE-2024-29645: radare2: buffer overflow vulnerability allows an attacker to execute arbitrary code via the parse_die function |
Classification | openSUSE |
Product | openSUSE Distribution |
Version | Leap 15.6 |
Hardware | Other |
URL | https://smash.suse.de/issue/430859/ |
OS | Other |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Security |
Assignee | security-team@suse.de |
Reporter | smash_bz@suse.de |
QA Contact | security-team@suse.de |
CC | abergmann@suse.com |
Target Milestone | --- |
Found By | Security Response Team |
Blocker | --- |
Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-29645 https://www.cve.org/CVERecord?id=CVE-2024-29645 https://gist.github.com/Crispy-fried-chicken/83f0f5e8a475284d64bf99fb342e9027 https://github.com/radareorg/radare2/commit/72bf3a486fa851797aa21887a40ba0e3d3a6d620 https://github.com/radareorg/radare2/pull/22561 https://github.com/CVEProject/cvelistV5/blob/main//cves/2024/29xxx/CVE-2024-29645.json