Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/radare2@3.1.2%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@3.1.2%2Bdfsg-1?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (5)
Vulnerability Summary Aliases
VCID-1peb-3y84-tfft In radare2 prior to 3.1.2, the parseOperands function in libr/asm/arch/arm/armass64.c allows attackers to cause a denial-of-service (application crash caused by stack-based buffer overflow) by crafting an input file. CVE-2018-20460
VCID-2m2p-3v1v-3ueq In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash via a stack-based buffer overflow) by crafting an input file, a related issue to CVE-2018-20456. CVE-2018-20455
VCID-7j2z-8s5s-6ugb In radare2 prior to 3.1.1, core_anal_bytes in libr/core/cmd_anal.c allows attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting a binary file. CVE-2018-20461
VCID-tww2-m12z-sbbv In radare2 prior to 3.1.1, r_bin_dyldcache_extract in libr/bin/format/mach0/dyldcache.c may allow attackers to cause a denial-of-service (application crash caused by out-of-bounds read) by crafting an input file. CVE-2018-20458
VCID-wgf3-z9qx-y7gc In radare2 prior to 3.1.1, the parseOperand function inside libr/asm/p/asm_x86_nz.c may allow attackers to cause a denial of service (application crash in libr/util/strbuf.c via a stack-based buffer over-read) by crafting an input file, a related issue to CVE-2018-20455. CVE-2018-20456

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T12:03:42.862112+00:00 Debian Importer Fixing VCID-1peb-3y84-tfft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:28:28.082107+00:00 Debian Importer Fixing VCID-7j2z-8s5s-6ugb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:00.606931+00:00 Debian Importer Fixing VCID-wgf3-z9qx-y7gc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:32.160708+00:00 Debian Importer Fixing VCID-tww2-m12z-sbbv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:19:46.194434+00:00 Debian Importer Fixing VCID-2m2p-3v1v-3ueq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:14:30.735383+00:00 Debian Importer Fixing VCID-1peb-3y84-tfft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:04:05.849264+00:00 Debian Importer Fixing VCID-7j2z-8s5s-6ugb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:07.891390+00:00 Debian Importer Fixing VCID-wgf3-z9qx-y7gc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:37:04.721737+00:00 Debian Importer Fixing VCID-tww2-m12z-sbbv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:13:58.581107+00:00 Debian Importer Fixing VCID-2m2p-3v1v-3ueq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:51:40.770159+00:00 Debian Importer Fixing VCID-7j2z-8s5s-6ugb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.749711+00:00 Debian Importer Fixing VCID-1peb-3y84-tfft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.706414+00:00 Debian Importer Fixing VCID-tww2-m12z-sbbv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.660545+00:00 Debian Importer Fixing VCID-wgf3-z9qx-y7gc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:40.637768+00:00 Debian Importer Fixing VCID-2m2p-3v1v-3ueq https://security-tracker.debian.org/tracker/data/json 38.1.0