http://bugzilla.opensuse.org/show_bug.cgi?id=1206298 Bug ID: 1206298 Summary: VUL-0: CVE-2022-4398: radare2: integer overflow vulnerability Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.5 Hardware: Other URL: https://smash.suse.de/issue/350236/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Security Assignee: daniel@molkentin.de Reporter: thomas.leroy@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- rh#2152390 Integer overflow in realloc and memcpy calls in core_anal_graph_label. In the process of concatenating source lines based on DWARF data, the resulting size (32bit signed int) can overflow. The sizes of the realloc and memcpy calls differ, and potentially can lead to writes in an unintended location. References: https://bugzilla.redhat.com/show_bug.cgi?id=2152390 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4398 https://www.cve.org/CVERecord?id=CVE-2022-4398 https://github.com/radareorg/radare2/commit/b53a1583d05c3a5bfe5fa60da133fe59... https://huntr.dev/bounties/c6f8d3ef-5420-4eba-9a5f-aba5e2b5fea2 -- You are receiving this mail because: You are on the CC list for the bug.