Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/radare2@6.0.4%2Bdfsg-1?distro=sid
purl pkg:deb/debian/radare2@6.0.4%2Bdfsg-1?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (15)
Vulnerability Summary Aliases
VCID-1h97-tkwz-8kfr A vulnerability was found in Radare2 5.9.9. It has been rated as problematic. This issue affects the function r_cons_is_breaked in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". An additional warning regarding threading support has been added. CVE-2025-5641
VCID-2r7v-s8mc-e7gr radare2 v5.9.8 and before contains a memory leak in the function r2r_subprocess_init. CVE-2025-60360
VCID-2y64-np9y-zyfz A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5648
VCID-378y-5cww-y7eb radare2 v5.9.8 and before contains a memory leak in the function bochs_open. CVE-2025-60361
VCID-6bbs-9d9s-mfeq A vulnerability was found in Radare2 5.9.9 and classified as problematic. This issue affects the function r_cons_context_break_pop in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5647
VCID-9zrm-xdkz-fbfb A vulnerability has been found in Radare2 5.9.9 and classified as problematic. This vulnerability affects the function r_cons_rainbow_free in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5646
VCID-awv9-a65t-gfax A vulnerability classified as problematic was found in Radare2 5.9.9. Affected by this vulnerability is the function cons_stack_load in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is named 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5643
VCID-bws2-var3-a3au radare2 v.5.9.8 and before contains a memory leak in the function _load_relocations. CVE-2025-60358
VCID-dpfc-t7cc-uqef Out-of-bounds Write vulnerability in radareorg radare2 allows heap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9. CVE-2025-1744
VCID-ev6a-h3yd-5udh Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in radareorg radare2 allows Overflow Buffers.This issue affects radare2: before <5.9.9. CVE-2025-1864
VCID-gebx-34kc-xuh6 radare2 v5.9.8 and before contains a memory leak in the function r_bin_object_new. CVE-2025-60359
VCID-gqsh-nqdu-3qex A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component. CVE-2025-1378
VCID-gy1s-hmrp-fbdg A vulnerability, which was classified as problematic, has been found in Radare2 5.9.9. Affected by this issue is the function r_cons_flush in the library /libr/cons/cons.c of the component radiff2. The manipulation of the argument -T leads to use after free. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The name of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5644
VCID-sua7-jxfv-tfhe A vulnerability classified as problematic has been found in Radare2 5.9.9. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation leads to memory corruption. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The patch is identified as 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5642
VCID-v7dw-jebk-xybc A vulnerability, which was classified as problematic, was found in Radare2 5.9.9. This affects the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The identifier of the patch is 5705d99cc1f23f36f9a84aab26d1724010b97798. It is recommended to apply a patch to fix this issue. The documentation explains that the parameter -T is experimental and "crashy". Further analysis has shown "the race is not a real problem unless you use asan". A new warning has been added. CVE-2025-5645

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:31:52.847687+00:00 Debian Importer Fixing VCID-6bbs-9d9s-mfeq https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:20:44.454989+00:00 Debian Importer Fixing VCID-awv9-a65t-gfax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:18:39.138899+00:00 Debian Importer Fixing VCID-gebx-34kc-xuh6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:10:47.714833+00:00 Debian Importer Fixing VCID-gy1s-hmrp-fbdg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:38:32.208044+00:00 Debian Importer Fixing VCID-1h97-tkwz-8kfr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:11.920586+00:00 Debian Importer Fixing VCID-bws2-var3-a3au https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:56.103213+00:00 Debian Importer Fixing VCID-sua7-jxfv-tfhe https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:28:40.440942+00:00 Debian Importer Fixing VCID-gqsh-nqdu-3qex https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:19:04.775879+00:00 Debian Importer Fixing VCID-378y-5cww-y7eb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:10:39.890329+00:00 Debian Importer Fixing VCID-2r7v-s8mc-e7gr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:36:39.500909+00:00 Debian Importer Fixing VCID-v7dw-jebk-xybc https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:10:43.917200+00:00 Debian Importer Fixing VCID-dpfc-t7cc-uqef https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:56:28.895413+00:00 Debian Importer Fixing VCID-9zrm-xdkz-fbfb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:22:28.875927+00:00 Debian Importer Fixing VCID-ev6a-h3yd-5udh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:45:08.467253+00:00 Debian Importer Fixing VCID-2y64-np9y-zyfz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:20:24.861176+00:00 Debian Importer Fixing VCID-6bbs-9d9s-mfeq https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:11:55.734394+00:00 Debian Importer Fixing VCID-awv9-a65t-gfax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:13.570064+00:00 Debian Importer Fixing VCID-gebx-34kc-xuh6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:04:06.125256+00:00 Debian Importer Fixing VCID-gy1s-hmrp-fbdg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:39:45.728868+00:00 Debian Importer Fixing VCID-1h97-tkwz-8kfr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:31.522803+00:00 Debian Importer Fixing VCID-bws2-var3-a3au https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:13.404365+00:00 Debian Importer Fixing VCID-sua7-jxfv-tfhe https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:49:17.936924+00:00 Debian Importer Fixing VCID-gqsh-nqdu-3qex https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:42:05.682702+00:00 Debian Importer Fixing VCID-378y-5cww-y7eb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:35:51.700259+00:00 Debian Importer Fixing VCID-2r7v-s8mc-e7gr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:10:15.321244+00:00 Debian Importer Fixing VCID-v7dw-jebk-xybc https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:50:22.530833+00:00 Debian Importer Fixing VCID-dpfc-t7cc-uqef https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:39:24.340322+00:00 Debian Importer Fixing VCID-9zrm-xdkz-fbfb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:15:37.629127+00:00 Debian Importer Fixing VCID-ev6a-h3yd-5udh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:52:48.994385+00:00 Debian Importer Fixing VCID-2y64-np9y-zyfz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:51:43.064778+00:00 Debian Importer Fixing VCID-378y-5cww-y7eb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:43.043833+00:00 Debian Importer Fixing VCID-2r7v-s8mc-e7gr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:43.023208+00:00 Debian Importer Fixing VCID-gebx-34kc-xuh6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.999813+00:00 Debian Importer Fixing VCID-bws2-var3-a3au https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.979078+00:00 Debian Importer Fixing VCID-2y64-np9y-zyfz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.954897+00:00 Debian Importer Fixing VCID-6bbs-9d9s-mfeq https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.930284+00:00 Debian Importer Fixing VCID-9zrm-xdkz-fbfb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.906092+00:00 Debian Importer Fixing VCID-v7dw-jebk-xybc https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.882046+00:00 Debian Importer Fixing VCID-gy1s-hmrp-fbdg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.858120+00:00 Debian Importer Fixing VCID-awv9-a65t-gfax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.834223+00:00 Debian Importer Fixing VCID-sua7-jxfv-tfhe https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.810437+00:00 Debian Importer Fixing VCID-1h97-tkwz-8kfr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.785810+00:00 Debian Importer Fixing VCID-ev6a-h3yd-5udh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.761299+00:00 Debian Importer Fixing VCID-dpfc-t7cc-uqef https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:42.735295+00:00 Debian Importer Fixing VCID-gqsh-nqdu-3qex https://security-tracker.debian.org/tracker/data/json 38.1.0