Search for packages
| purl | pkg:deb/debian/radare2@5.5.0%2Bdfsg-1?distro=sid |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2hsg-v6h9-e7er | A use after free in r_reg_get_name_idx function in radare2 5.4.2 and 5.4.0. |
CVE-2022-28071
|
| VCID-5kmb-6m89-6uc6 | A heap buffer overflow in r_read_le32 function in radare25.4.2 and 5.4.0. |
CVE-2022-28072
|
| VCID-7jxc-2agn-8kd2 | A null pointer deference in __core_anal_fcn function in radare2 5.4.2 and 5.4.0. |
CVE-2022-28070
|
| VCID-avnf-p1zx-47ce | Radare2 has a division by zero vulnerability in Mach-O parser's rebase_buffer function. This allow attackers to create malicious inputs that can cause denial of service. |
CVE-2021-32494
|
| VCID-ccqg-j1n1-dqb8 | A heap buffer overflow in r_sleb128 function in radare2 5.4.2 and 5.4.0. |
CVE-2022-28068
|
| VCID-dzzp-5yb2-h7fq | A use after free in r_reg_set_value function in radare2 5.4.2 and 5.4.0. |
CVE-2022-28073
|
| VCID-pme4-1y6v-4ybu | A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS. |
CVE-2021-3673
|
| VCID-wxqc-aaxn-3ud4 | In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS. |
CVE-2021-32613
|
| VCID-xuw5-8svs-p3a7 | A heap buffer overflow in vax_opfunction in radare2 5.4.2 and 5.4.0. |
CVE-2022-28069
|
| VCID-yuwd-fh9w-5bc3 | Radare2 has a use-after-free vulnerability in pyc parser's get_none_object function. Attacker can read freed memory afterwards. This will allow attackers to cause denial of service. |
CVE-2021-32495
|