stable

radare2-5.8.2-2.el9

FEDORA-EPEL-2023-06f86f0ae3 created by rebus a year ago for Fedora EPEL 9

fix sdb generation from messon


update to 5.8.2, fixes several CVE issues

This update has been submitted for testing by rebus.

a year ago

This update's test gating status has been changed to 'ignored'.

a year ago

This update has obsoleted radare2-5.8.2-1.el9, and has inherited its bugs and notes.

a year ago

This update has been pushed to testing.

a year ago

This update has been submitted for stable by bodhi.

a year ago

This update has been pushed to stable.

a year ago

Please login to add feedback.

Metadata
Type
security
Severity
low
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
a year ago
in testing
a year ago
in stable
a year ago
approved
a year ago
BZ#2086386 CVE-2022-1714 radare2: Heap-based Buffer Overflow 4 byte oob read in msp430 disassembler [epel-all]
0
0
BZ#2089714 CVE-2022-1809 radare2: use of uninitialized function pointer [epel-all]
0
0
BZ#2092820 CVE-2021-44974 radare2: NULL pointer dereference when parsing binary symbols in bin_symbols.c [epel-all]
0
0
BZ#2092822 CVE-2021-44975 radare2: Buffer Overflow while parsing mach-o executables via /libr/core/anal_objc.c [epel-all]
0
0
BZ#2092972 CVE-2022-1899 radare2: out of bounds read in string_scan_range [epel-all]
0
0
BZ#2105005 CVE-2022-1437 radare2: Heap-based Buffer Overflow in radare2 prior to 5.7.0 [epel-all]
0
0
BZ#2111326 CVE-2022-34502 radare2: heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c [epel-all]
0
0
BZ#2113988 CVE-2022-34520 radare2: NULL pointer dereference [epel-8]
0
0
BZ#2152391 CVE-2022-4398 radare2: dev-util/radare2: integer overflow vulnerability [epel-all]
0
0
BZ#2170036 syscall detection is broken
0
0

Automated Test Results