An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
{ "binaries": [ { "binary_version": "0.9.6-3.1ubuntu1", "binary_name": "libradare2-0.9.6" }, { "binary_version": "0.9.6-3.1ubuntu1", "binary_name": "libradare2-common" }, { "binary_version": "0.9.6-3.1ubuntu1", "binary_name": "libradare2-dev" }, { "binary_version": "0.9.6-3.1ubuntu1", "binary_name": "radare2" }, { "binary_version": "0.9.6-3.1ubuntu1", "binary_name": "radare2-plugins" } ] }
{ "binaries": [ { "binary_version": "2.3.0+dfsg-2", "binary_name": "libradare2-2.3" }, { "binary_version": "2.3.0+dfsg-2", "binary_name": "libradare2-common" }, { "binary_version": "2.3.0+dfsg-2", "binary_name": "libradare2-dev" }, { "binary_version": "2.3.0+dfsg-2", "binary_name": "radare2" } ] }
{ "binaries": [ { "binary_version": "4.2.1+dfsg-2", "binary_name": "libradare2-4.2.1" }, { "binary_version": "4.2.1+dfsg-2", "binary_name": "libradare2-common" }, { "binary_version": "4.2.1+dfsg-2", "binary_name": "libradare2-dev" }, { "binary_version": "4.2.1+dfsg-2", "binary_name": "radare2" } ] }