Bug 27751

Summary: radre2 security issue CVE-2020-15121
Product: Mageia Reporter: Zombie Ryushu <zombie_ryushu>
Component: SecurityAssignee: Mageia Bug Squad <bugsquad>
Status: RESOLVED DUPLICATE QA Contact: Sec team <security>
Severity: normal    
Priority: Normal    
Version: Cauldron   
Target Milestone: ---   
Hardware: All   
OS: Linux   
URL: https://nvd.nist.gov/vuln/detail/CVE-2020-15121
Whiteboard:
Source RPM: radare2-4.5.0-1.mga8.src CVE: CVE-2020-15121
Status comment:

Description Zombie Ryushu 2020-12-05 15:18:39 CET
In radare2 before version 4.5.0, malformed PDB file names in the PDB server path cause shell injection. To trigger the problem it's required to open the executable in radare2 and run idpd to trigger the download. The shell code will execute, and will create a file called pwned in the current directory.
Zombie Ryushu 2020-12-05 15:19:00 CET

CVE: (none) => CVE-2020-15121

Comment 1 David Walser 2020-12-05 15:45:25 CET
Already reported and fixed.

*** This bug has been marked as a duplicate of bug 27060 ***

Status: NEW => RESOLVED
Resolution: (none) => DUPLICATE