CVE-2022-0519

Name
CVE-2022-0519
Description
Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5
CONFIRM https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/
Mailing List https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E6YBRQ3UCFWJVSOYIKPVUDASZ544TFND/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BZTIMAS53YT66FUS4QHQAFRJOBMUFG6D/

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:* radare2 >= None < 5.6.2

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
radare2 3.15-community 5.5.0-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable