[Bug 1234679] New: VUL-0: CVE-2024-29646: radare2: buffer overflow vulnerability
https://bugzilla.suse.com/show_bug.cgi?id=1234679 Bug ID: 1234679 Summary: VUL-0: CVE-2024-29646: radare2: buffer overflow vulnerability Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.6 Hardware: Other URL: https://smash.suse.de/issue/433238/ OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: smash_bz@suse.de QA Contact: security-team@suse.de CC: abergmann@suse.com Target Milestone: --- Found By: Security Response Team Blocker: --- Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the name, type, or group fields. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-29646 https://www.cve.org/CVERecord?id=CVE-2024-29646 https://gist.github.com/Crispy-fried-chicken/0be4a204e7226fa2cea761c09f02769... https://github.com/radareorg/radare2/pull/22562 https://github.com/radareorg/radare2/pull/22567 https://github.com/radareorg/radare2/pull/22572 https://github.com/radareorg/radare2/pull/22578 https://github.com/radareorg/radare2/pull/22599 https://bugzilla.redhat.com/show_bug.cgi?id=2332927 -- You are receiving this mail because: You are on the CC list for the bug.
https://bugzilla.suse.com/show_bug.cgi?id=1234679 https://bugzilla.suse.com/show_bug.cgi?id=1234679#c1 Alexander Bergmann <abergmann@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |FIXED --- Comment #1 from Alexander Bergmann <abergmann@suse.com> --- Our Backports are already on radare2-5.9.8. openSUSE:Backports:SLE-15-SP5:Update openSUSE:Backports:SLE-15-SP6:Update openSUSE:Backports:SLE-15-SP7 Closing as fixed. -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com