Name | CVE-2024-29646 |
Description | Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the name, type, or group fields. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
radare2 (PTS) | trixie | 5.9.4+dfsg-1 | fixed |
sid | 5.9.8+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
radare2 | source | (unstable) | 5.9.0+dfsg-1 |
https://github.com/radareorg/radare2/pull/22562
https://github.com/radareorg/radare2/commit/38c8e5ded67eed2c8a1f874e536d05fc3939fa29 (5.9.0)
https://github.com/radareorg/radare2/commit/098669591ca0327619fd2df572ca81d2dfe50ec0 (5.9.0)
https://github.com/radareorg/radare2/commit/c75ad89e5f4d1c53bb06f9c4dee174cc73aba30a (5.9.0)
https://github.com/radareorg/radare2/commit/f368c8ccdb03af307d37f1c6899b94b25a0306c7 (5.9.0)
https://gist.github.com/Crispy-fried-chicken/0be4a204e7226fa2cea761c09f027690