Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in radare2
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in radare2
ID: FEDORA-2021-f3ebd7554c
Distribution: Fedora
Plattformen: Fedora 33
Datum: Di, 23. März 2021, 07:27
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16269
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-17487
Applikationen: Radare2

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2021-f3ebd7554c
2021-03-23 01:31:48.603963
-------------------------------------------------------------------------------
-

Name : radare2
Product : Fedora 33
Version : 5.1.1
Release : 1.fc33
URL : https://radare.org/
Summary : The reverse engineering framework
Description :
The radare2 is a reverse-engineering framework that is multi-architecture,
multi-platform, and highly scriptable. Radare2 provides a hexadecimal
editor, wrapped I/O, file system support, debugger support, diffing
between two functions or binaries, and code analysis at opcode,
basic block, and function levels.

-------------------------------------------------------------------------------
-
Update Information:

Update to version 5.1.1. Security fix for CVE-CVE-2020-16269 and CVE-2020-17487
-------------------------------------------------------------------------------
-
ChangeLog:

* Mon Feb 15 2021 Henrik Nordstrom <henrik@henriknordstrom.net> - 5.1.1-1
- Rebase to upstream version 5.1.1
* Wed Jan 27 2021 Fedora Release Engineering <releng@fedoraproject.org> -
4.5.0-2.2
- Rebuilt for https://fedoraproject.org/wiki/Fedora_34_Mass_Rebuild
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1864842 - CVE-2020-16269 radare2: segmentation fault in
parse_typedef function in type_dwarf.c via a malformed DW_AT_name in the .debug_info section
https://bugzilla.redhat.com/show_bug.cgi?id=1864842
[ 2 ] Bug #1869623 - CVE-2020-17487 radare2: misparsing signature information
in PE files could lead to DoS
https://bugzilla.redhat.com/show_bug.cgi?id=1869623
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2021-f3ebd7554c' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung