CVE-2026-4174

Source
https://cve.org/CVERecord?id=CVE-2026-4174
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-4174.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-4174
Downstream
Published
2026-03-16T14:19:57.890Z
Modified
2026-04-10T05:43:36.011463Z
Severity
  • 3.3 (Low) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L CVSS Calculator
Summary
[none]
Details

A vulnerability has been found in Radare2 5.9.9. This issue affects the function walkexportstrie of the file libr/bin/format/mach0/mach0.c of the component Mach-O File Parser. Such manipulation leads to resource consumption. The attack can only be performed from a local environment. The exploit has been disclosed to the public and may be used. The existence of this vulnerability is still disputed at present. Upgrading to version 6.1.2 is capable of addressing this issue. The name of the patch is 4371ae84c99c46b48cb21badbbef06b30757aba0. You should upgrade the affected component. The code maintainer states that, "[he] wont consider this bug a DoS".

References

Affected packages

Git / github.com/toddawalter/radare2

Affected ranges

Type
GIT
Repo
https://github.com/toddawalter/radare2
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-4174.json"