Mageia 2022-0440: radare2/rizin security update | LinuxSecurity.com
MGASA-2022-0440 - Updated radare2/rizin packages fix security vulnerability

Publication date: 27 Nov 2022
URL: https://advisories.mageia.org/MGASA-2022-0440.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2021-3673,
     CVE-2021-4021,
     CVE-2021-32613,
     CVE-2021-44974,
     CVE-2021-44975,
     CVE-2022-0173,
     CVE-2022-0419,
     CVE-2022-0476,
     CVE-2022-0518,
     CVE-2022-0519,
     CVE-2022-0520,
     CVE-2022-0521,
     CVE-2022-0522,
     CVE-2022-0523,
     CVE-2022-0559,
     CVE-2022-0676,
     CVE-2022-0695,
     CVE-2022-0712,
     CVE-2022-0713

In radare2 through 5.3.0 there is a double free vulnerability in the pyc
parse via a crafted file which can lead to DoS. (CVE-2021-32613)

A vulnerability was found in Radare2 in version 5.3.1. Improper input
validation when reading a crafted LE binary can lead to resource
exhaustion and DoS. (CVE-2021-3673)

A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0,
5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64
binary for MIPS architecture can lead to uncontrolled resource consumption
and DoS. (CVE-2021-4021)

radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference
via libr/bin/p/bin_symbols.c binary symbol parser. (CVE-2021-44974)

radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via
/libr/core/anal_objc.c mach-o parser. (CVE-2021-44975)

radare2 is vulnerable to Out-of-bounds Read. (CVE-2022-0173)

NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to
5.6.0. (CVE-2022-0419)

Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.
(CVE-2022-0476)

Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to
5.6.2. (CVE-2022-0518)

Buffer Access with Incorrect Length Value in GitHub repository
radareorg/radare2 prior to 5.6.2. (CVE-2022-0519)

Use After Free in NPM radare2.js prior to 5.6.2. (CVE-2022-0520)

Access of Memory Location After End of Buffer in GitHub repository
radareorg/radare2 prior to 5.6.2. (CVE-2022-0521)

Access of Memory Location Before Start of Buffer in NPM radare2.js prior
to 5.6.2. (CVE-2022-0522)

Expired Pointer Dereference in GitHub repository radareorg/radare2 prior
to 5.6.2. (CVE-2022-0523)

Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
(CVE-2022-0559)

Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to
5.6.4. (CVE-2022-0676)

Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.
(CVE-2022-0695)

NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to
5.6.4. (CVE-2022-0712)

Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to
5.6.4. (CVE-2022-0713)

References:
- https://bugs.mageia.org/show_bug.cgi?id=29163
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/V2UL4V4XKSFJVNNUMFV443UJXGDBYGS4/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/JIARALLVVY2362AYFSFULTZKIW6QO5R5/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/
- https://www.openwall.com/lists/oss-security/2022/05/25/1
- https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3673
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4021
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32613
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44974
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44975
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0173
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0419
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0476
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0518
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0519
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0520
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0521
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0522
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0523
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0559
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0676
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0695
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0712
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0713

SRPMS:
- 8/core/radare2-5.6.4-1.mga8
- 8/core/radare2-cutter-2.0.4-2.mga8
- 8/core/rizin-0.3.1-1.mga8

Mageia 2022-0440: radare2/rizin security update

In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS

Summary

In radare2 through 5.3.0 there is a double free vulnerability in the pyc parse via a crafted file which can lead to DoS. (CVE-2021-32613)
A vulnerability was found in Radare2 in version 5.3.1. Improper input validation when reading a crafted LE binary can lead to resource exhaustion and DoS. (CVE-2021-3673)
A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS. (CVE-2021-4021)
radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser. (CVE-2021-44974)
radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser. (CVE-2021-44975)
radare2 is vulnerable to Out-of-bounds Read. (CVE-2022-0173)
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0. (CVE-2022-0419)
Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4. (CVE-2022-0476)
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2. (CVE-2022-0518)
Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2. (CVE-2022-0519)
Use After Free in NPM radare2.js prior to 5.6.2. (CVE-2022-0520)
Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2. (CVE-2022-0521)
Access of Memory Location Before Start of Buffer in NPM radare2.js prior to 5.6.2. (CVE-2022-0522)
Expired Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.2. (CVE-2022-0523)
Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. (CVE-2022-0559)
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4. (CVE-2022-0676)
Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4. (CVE-2022-0695)
NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4. (CVE-2022-0712)
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4. (CVE-2022-0713)

References

- https://bugs.mageia.org/show_bug.cgi?id=29163

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/V2UL4V4XKSFJVNNUMFV443UJXGDBYGS4/

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/JIARALLVVY2362AYFSFULTZKIW6QO5R5/

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/IQIRJ72UALGMSWH6MYPVJQQLXFGZ23RS/

- https://lists.fedoraproject.org/archives/list/[email protected]/thread/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/

- https://www.openwall.com/lists/oss-security/2022/05/25/1

- https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3673

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4021

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32613

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44974

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44975

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0173

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0419

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0476

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0518

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0519

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0520

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0521

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0522

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0523

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0559

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0676

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0695

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0712

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0713

Resolution

MGASA-2022-0440 - Updated radare2/rizin packages fix security vulnerability

SRPMS

- 8/core/radare2-5.6.4-1.mga8

- 8/core/radare2-cutter-2.0.4-2.mga8

- 8/core/rizin-0.3.1-1.mga8

Severity
Publication date: 27 Nov 2022
URL: https://advisories.mageia.org/MGASA-2022-0440.html
Type: security
CVE: CVE-2021-3673, CVE-2021-4021, CVE-2021-32613, CVE-2021-44974, CVE-2021-44975, CVE-2022-0173, CVE-2022-0419, CVE-2022-0476, CVE-2022-0518, CVE-2022-0519, CVE-2022-0520, CVE-2022-0521, CVE-2022-0522, CVE-2022-0523, CVE-2022-0559, CVE-2022-0676, CVE-2022-0695, CVE-2022-0712, CVE-2022-0713

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.