Bug ID 1233823
Summary VUL-0: CVE-2024-11858: radare2: command injection when processing malicious Pebble application files due to improper sanitization of user-controlled input
Classification openSUSE
Product openSUSE Distribution
Version Leap 15.6
Hardware Other
URL https://smash.suse.de/issue/430412/
OS Other
Status NEW
Severity Normal
Priority P5 - None
Component Security
Assignee daniel@molkentin.de
Reporter smash_bz@suse.de
QA Contact security-team@suse.de
CC camila.matos@suse.com
Target Milestone ---
Found By Security Response Team
Blocker ---

The vulnerability in Radare2 affects versions up to and including 5.9.8. When
processing malicious Pebble Application files, Radare2 improperly sanitizes
user-controlled input, leading to command injection. This allows arbitrary
shell commands to execute during file handling. The issue was confirmed in
version 5.9.7 on Linux x86-64 and demonstrated with a Base64-encoded test file​

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-11858
https://bugzilla.redhat.com/show_bug.cgi?id=2329102


You are receiving this mail because: