CVE-2024-11858

Name
CVE-2024-11858
Description
A flaw was found in Radare2, which contains a command injection vulnerability caused by insufficient input validation when handling Pebble Application files. Maliciously crafted inputs can inject shell commands during command parsing, leading to unintended behavior during file processing​
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
issue-tracking https://bugzilla.redhat.com/show_bug.cgi?id=2329102

Match rules

CPE URI Source package Min version Max version
shopxo >= 0.9.7 < 5.9.9
cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:* radare2 >= None <= 5.9.8

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
radare2 edge-community 5.9.8-r0 omni <omni+alpine@hack.org> possibly vulnerable
radare2 edge-community 5.8.2-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.8.0-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.7.2-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.7.0-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.6.8-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.6.6-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.6.4-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.6.2-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.6.0-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.5.4-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.5.2-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.4.0-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 5.3.1-r0 Valery Kartel <valery.kartel@gmail.com> possibly vulnerable
radare2 edge-community 4.5.1-r0 None possibly vulnerable
radare2 edge-community 4.5.0-r0 None possibly vulnerable
radare2 edge-community 4.4.0-r0 None possibly vulnerable
radare2 edge-community 4.0.0-r0 None possibly vulnerable
radare2 edge-community 3.9.0-r0 None possibly vulnerable
radare2 3.22-community 5.9.8-r0 omni <omni+alpine@hack.org> possibly vulnerable
radare2 3.22-community 5.8.2-r0 None possibly vulnerable
radare2 3.22-community 5.8.0-r0 None possibly vulnerable
radare2 3.22-community 5.7.2-r0 None possibly vulnerable
radare2 3.22-community 5.7.0-r0 None possibly vulnerable
radare2 3.22-community 5.6.8-r0 None possibly vulnerable
radare2 3.22-community 5.6.6-r0 None possibly vulnerable
radare2 3.22-community 5.6.4-r0 None possibly vulnerable
radare2 3.22-community 5.6.2-r0 None possibly vulnerable
radare2 3.22-community 5.6.0-r0 None possibly vulnerable
radare2 3.22-community 5.5.4-r0 None possibly vulnerable
radare2 3.22-community 5.5.2-r0 None possibly vulnerable
radare2 3.22-community 5.4.0-r0 None possibly vulnerable
radare2 3.22-community 5.3.1-r0 None possibly vulnerable
radare2 3.22-community 4.5.1-r0 None possibly vulnerable
radare2 3.22-community 4.5.0-r0 None possibly vulnerable
radare2 3.22-community 4.4.0-r0 None possibly vulnerable
radare2 3.22-community 4.0.0-r0 None possibly vulnerable
radare2 3.22-community 3.9.0-r0 None possibly vulnerable