CVE-2024-29646

NameCVE-2024-29646
DescriptionBuffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the name, type, or group fields.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
radare2 (PTS)trixie5.9.4+dfsg-1fixed
sid5.9.8+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
radare2source(unstable)5.9.0+dfsg-1

Notes

https://github.com/radareorg/radare2/pull/22562
https://github.com/radareorg/radare2/commit/38c8e5ded67eed2c8a1f874e536d05fc3939fa29 (5.9.0)
https://github.com/radareorg/radare2/commit/098669591ca0327619fd2df572ca81d2dfe50ec0 (5.9.0)
https://github.com/radareorg/radare2/commit/c75ad89e5f4d1c53bb06f9c4dee174cc73aba30a (5.9.0)
https://github.com/radareorg/radare2/commit/f368c8ccdb03af307d37f1c6899b94b25a0306c7 (5.9.0)
https://gist.github.com/Crispy-fried-chicken/0be4a204e7226fa2cea761c09f027690

Search for package or bug name: Reporting problems