Описание
Security update for radare2
This update for radare2 fixes the following issues:
Update to version 5.9.8:
- CVE-2024-29645: buffer overflow vulnerability allows an attacker to execute arbitrary code via the parse_die function (boo#1234065).
- For more details, check full release notes: https://github.com/radareorg/radare2/releases/tag/5.9.8 https://github.com/radareorg/radare2/releases/tag/5.9.6 https://github.com/radareorg/radare2/releases/tag/5.9.4 https://github.com/radareorg/radare2/releases/tag/5.9.2 https://github.com/radareorg/radare2/releases/tag/5.9.0 https://github.com/radareorg/radare2/releases/tag/5.8.8
Список пакетов
SUSE Package Hub 15 SP6
radare2-5.9.8-bp156.4.3.1
radare2-devel-5.9.8-bp156.4.3.1
radare2-zsh-completion-5.9.8-bp156.4.3.1
openSUSE Leap 15.6
radare2-5.9.8-bp156.4.3.1
radare2-devel-5.9.8-bp156.4.3.1
radare2-zsh-completion-5.9.8-bp156.4.3.1
Ссылки
- E-Mail link for openSUSE-SU-2024:0397-1
- SUSE Security Ratings
- SUSE Bug 1234065
- SUSE CVE CVE-2024-29645 page
Описание
Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function.
Затронутые продукты
SUSE Package Hub 15 SP6:radare2-5.9.8-bp156.4.3.1
SUSE Package Hub 15 SP6:radare2-devel-5.9.8-bp156.4.3.1
SUSE Package Hub 15 SP6:radare2-zsh-completion-5.9.8-bp156.4.3.1
openSUSE Leap 15.6:radare2-5.9.8-bp156.4.3.1
Ссылки
- CVE-2024-29645
- SUSE Bug 1234065