Debian Package Tracker
Register | Log in
Subscribe

radare2

free and advanced command line hexadecimal editor

Choose email to subscribe with

general
  • source: radare2 (main)
  • version: 5.5.0+dfsg-1
  • maintainer: Debian Security Tools (DMD)
  • uploaders: Sebastian Reichel [DMD] – Andrej Shadura [DMD]
  • arch: all any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • unstable: 5.5.0+dfsg-1
versioned links
  • 5.5.0+dfsg-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libradare2-5.0.0
  • libradare2-common
  • libradare2-dev
  • radare2 (1 bugs: 0, 0, 1, 0)
action needed
A new upstream version is available: 5.8.8 high
A new upstream version 5.8.8 is available, you should consider packaging it.
Created: 2021-12-09 Last update: 2023-09-30 06:13
The VCS repository is not up to date, push the missing commits. high
vcswatch reports that this package has been uploaded into the archive but the debian/changelog in the VCS is still UNRELEASED. You should consider pushing the missing commits or updating the VCS.
Created: 2021-12-01 Last update: 2023-09-26 02:40
46 security issues in sid high

There are 46 open security issues in sid.

46 important issues:
  • CVE-2021-4021: A vulnerability was found in Radare2 in versions prior to 5.6.2, 5.6.0, 5.5.4 and 5.5.2. Mapping a huge section filled with zeros of an ELF64 binary for MIPS architecture can lead to uncontrolled resource consumption and DoS.
  • CVE-2022-0139: Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.
  • CVE-2022-0173: radare2 is vulnerable to Out-of-bounds Read
  • CVE-2022-0419: NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.0.
  • CVE-2022-0476: Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.
  • CVE-2022-0518: Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.
  • CVE-2022-0519: Buffer Access with Incorrect Length Value in GitHub repository radareorg/radare2 prior to 5.6.2.
  • CVE-2022-0521: Access of Memory Location After End of Buffer in GitHub repository radareorg/radare2 prior to 5.6.2.
  • CVE-2022-0523: Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
  • CVE-2022-0559: Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.
  • CVE-2022-0676: Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.
  • CVE-2022-0695: Denial of Service in GitHub repository radareorg/radare2 prior to 5.6.4.
  • CVE-2022-0712: NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.4.
  • CVE-2022-0713: Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.4.
  • CVE-2022-0849: Use After Free in r_reg_get_name_idx in GitHub repository radareorg/radare2 prior to 5.6.6.
  • CVE-2022-1031: Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 prior to 5.6.6.
  • CVE-2022-1052: Heap Buffer Overflow in iterate_chained_fixups in GitHub repository radareorg/radare2 prior to 5.6.6.
  • CVE-2022-1061: Heap Buffer Overflow in parseDragons in GitHub repository radareorg/radare2 prior to 5.6.8.
  • CVE-2022-1207: Out-of-bounds read in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to read sensitive information from outside the allocated buffer boundary.
  • CVE-2022-1237: Improper Validation of Array Index in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
  • CVE-2022-1238: Out-of-bounds Write in libr/bin/format/ne/ne.c in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow and may be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
  • CVE-2022-1240: Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub repository radareorg/radare2 prior to 5.8.6. If address sanitizer is disabled during the compiling, the program should executes into the `r_str_ncpy` function. Therefore I think it is very likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).
  • CVE-2022-1244: heap-buffer-overflow in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.
  • CVE-2022-1283: NULL Pointer Dereference in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability allows attackers to cause a denial of service (application crash).
  • CVE-2022-1284: heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of inducing denial of service.
  • CVE-2022-1296: Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.
  • CVE-2022-1297: Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability may allow attackers to read sensitive information or cause a crash.
  • CVE-2022-1382: NULL Pointer Dereference in GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability is capable of making the radare2 crash, thus affecting the availability of the system.
  • CVE-2022-1383: Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.8. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
  • CVE-2022-1437: Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
  • CVE-2022-1444: heap-use-after-free in GitHub repository radareorg/radare2 prior to 5.7.0. This vulnerability is capable of inducing denial of service.
  • CVE-2022-1451: Out-of-bounds Read in r_bin_java_constant_value_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
  • CVE-2022-1452: Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end 2f the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash. More details see [CWE-125: Out-of-bounds read](https://cwe.mitre.org/data/definitions/125.html).
  • CVE-2022-1649: Null pointer dereference in libr/bin/format/mach0/mach0.c in radareorg/radare2 in GitHub repository radareorg/radare2 prior to 5.7.0. It is likely to be exploitable. For more general description of heap buffer overflow, see [CWE](https://cwe.mitre.org/data/definitions/476.html).
  • CVE-2022-1714: Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the program reads data past the end of the intented buffer. Typically, this can allow attackers to read sensitive information from other memory locations or cause a crash.
  • CVE-2022-1809: Access of Uninitialized Pointer in GitHub repository radareorg/radare2 prior to 5.7.0.
  • CVE-2022-1899: Out-of-bounds Read in GitHub repository radareorg/radare2 prior to 5.7.0.
  • CVE-2022-4398: Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0.
  • CVE-2023-0302: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in GitHub repository radareorg/radare2 prior to 5.8.2.
  • CVE-2023-1605: Denial of Service in GitHub repository radareorg/radare2 prior to 5.8.6.
  • CVE-2023-4322: Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.9.0.
  • CVE-2021-44974: radareorg radare2 version 5.5.2 is vulnerable to NULL Pointer Dereference via libr/bin/p/bin_symbols.c binary symbol parser.
  • CVE-2021-44975: radareorg radare2 5.5.2 is vulnerable to Buffer Overflow via /libr/core/anal_objc.c mach-o parser.
  • CVE-2022-34502: Radare2 v5.7.0 was discovered to contain a heap buffer overflow via the function consume_encoded_name_new at format/wasm/wasm.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted binary file.
  • CVE-2022-34520: Radare2 v5.7.2 was discovered to contain a NULL pointer dereference via the function r_bin_file_xtr_load_buffer at bin/bfile.c. This vulnerability allows attackers to cause a Denial of Service (DOS) via a crafted binary file.
  • CVE-2023-27114: radare2 v5.8.3 was discovered to contain a segmentation fault via the component wasm_dis at p/wasm/wasm.c.
Created: 2022-07-04 Last update: 2023-09-14 06:31
The package has not entered testing even though the delay is over normal
The package has not entered testing even though the 5-day delay is over. Check why.
Created: 2021-12-06 Last update: 2023-09-30 07:38
lintian reports 15 warnings normal
Lintian reports 15 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2020-07-29 Last update: 2023-02-18 08:05
debian/patches: 2 patches to forward upstream low

Among the 2 debian patches available in version 5.5.0+dfsg-1 of the package, we noticed the following issues:

  • 2 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-02-27 20:59
Build log checks report 1 warning low
Build log checks report 1 warning
Created: 2017-10-26 Last update: 2021-01-05 23:30
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.5.1).
Created: 2021-08-18 Last update: 2022-12-17 19:17
testing migrations
  • This package will soon be part of the auto-capstone transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
  • excuses:
    • Migrates after: freebsd-glue
    • Migration status for radare2 (- to 5.5.0+dfsg-1): BLOCKED: Rejected/violates migration policy/introduces a regression
    • Issues preventing migration:
    • ∙ ∙ Updating radare2 would introduce bugs in testing: #1014478, #950372
    • ∙ ∙ Build-Depends(-Arch): radare2 freebsd-glue
    • Additional info:
    • ∙ ∙ Piuparts tested OK - https://piuparts.debian.org/sid/source/r/radare2.html
    • ∙ ∙ 668 days old (needed 5 days)
    • Not considered
news
[rss feed]
  • [2021-12-01] Accepted radare2 5.5.0+dfsg-1 (source) into unstable (Andrej Shadura) (signed by: Andrew Shadura)
  • [2021-01-05] Accepted radare2 5.0.0+dfsg-1 (source amd64 all) into unstable, unstable (Debian FTP Masters) (signed by: Sebastian Reichel)
  • [2020-03-27] Accepted radare2 4.3.1+dfsg-1 (source amd64 all) into unstable, unstable (Debian FTP Masters) (signed by: Sebastian Reichel)
  • [2020-02-20] Accepted radare2 4.2.1+dfsg-2 (source) into unstable (Sebastian Reichel)
  • [2020-02-18] Accepted radare2 4.2.1+dfsg-1 (source amd64 all) into unstable, unstable (Sebastian Reichel)
  • [2020-02-14] radare2 REMOVED from testing (Debian testing watch)
  • [2020-01-04] Accepted radare2 4.0.0+dfsg-1 (source amd64 all) into unstable, unstable (Sebastian Reichel)
  • [2020-01-03] Accepted radare2 3.9.0+dfsg-1 (source amd64 all) into unstable, unstable (Sebastian Reichel)
  • [2020-01-03] Accepted radare2 3.8.0+dfsg-1 (source amd64 all) into unstable, unstable (Sebastian Reichel)
  • [2019-03-13] radare2 3.2.1+dfsg-5 MIGRATED to testing (Debian testing watch)
  • [2019-03-02] Accepted radare2 3.2.1+dfsg-5 (source) into unstable (Hilko Bengen)
  • [2019-02-11] radare2 3.2.1+dfsg-4 MIGRATED to testing (Debian testing watch)
  • [2019-02-05] Accepted radare2 3.2.1+dfsg-4 (source amd64 all) into unstable (Sebastian Reichel)
  • [2019-02-05] Accepted radare2 3.2.1+dfsg-3 (source amd64 all) into unstable (Sebastian Reichel)
  • [2019-01-31] radare2 3.2.1+dfsg-2 MIGRATED to testing (Debian testing watch)
  • [2019-01-26] Accepted radare2 3.2.1+dfsg-2 (source) into unstable (Hilko Bengen)
  • [2019-01-25] Accepted radare2 3.2.1+dfsg-1 (source amd64) into unstable, unstable (Hilko Bengen)
  • [2018-12-21] radare2 3.1.2+dfsg-1.1 MIGRATED to testing (Debian testing watch)
  • [2018-12-16] Accepted radare2 3.1.2+dfsg-1.1 (source) into unstable (Iain Lane)
  • [2018-12-04] Accepted radare2 3.1.2+dfsg-1 (source amd64 all) into unstable (Sebastian Reichel)
  • [2018-12-03] Accepted radare2 3.1.0+dfsg-1 (source amd64 all) into unstable, unstable (Sebastian Reichel)
  • [2018-10-26] radare2 3.0.1+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2018-10-21] Accepted radare2 3.0.1+dfsg-1 (source amd64 all) into unstable (Sebastian Reichel)
  • [2018-10-17] Accepted radare2 3.0.0+dfsg-1 (source amd64 all) into unstable, unstable (Sebastian Reichel)
  • [2018-09-10] radare2 2.9.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2018-09-05] Accepted radare2 2.9.0+dfsg-1 (source amd64 all) into unstable, unstable (Sebastian Reichel)
  • [2018-08-14] radare2 2.8.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2018-08-09] Accepted radare2 2.8.0+dfsg-1 (source amd64 all) into unstable, unstable (Sebastian Reichel)
  • [2018-07-21] radare2 2.7.0+dfsg-1 MIGRATED to testing (Debian testing watch)
  • [2018-07-12] Accepted radare2 2.7.0+dfsg-1 (source amd64 all) into unstable, unstable (Sebastian Reichel)
  • 1
  • 2
bugs [bug history graph]
  • all: 11
  • RC: 2
  • I&N: 7
  • M&W: 2
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 15)
  • buildd: logs, checks, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5.5.0+dfsg-1ubuntu1
  • 3 bugs (1 patch)
  • patches for 5.5.0+dfsg-1ubuntu1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing