Bug 33853 - radare2 new security issue CVE-2024-29645
Summary: radare2 new security issue CVE-2024-29645
Status: RESOLVED FIXED
Alias: None
Product: Mageia
Classification: Unclassified
Component: Security (show other bugs)
Version: 9
Hardware: All Linux
Priority: Normal normal
Target Milestone: ---
Assignee: QA Team
QA Contact: Sec team
URL:
Whiteboard: MGA9-64-OK
Keywords: advisory, validated_update
Depends on:
Blocks:
 
Reported: 2024-12-13 15:09 CET by Nicolas Salguero
Modified: 2025-01-12 07:41 CET (History)
4 users (show)

See Also:
Source RPM: radare2-5.8.8-1.3.mga9.src.rpm
CVE: CVE-2024-29645
Status comment:


Attachments

Nicolas Salguero 2024-12-13 15:10:29 CET

Status comment: (none) => Patch available from upstream
Source RPM: (none) => radare2-5.8.8-1.3.mga9.src.rpm
CVE: (none) => CVE-2024-29645

Comment 1 Lewis Smith 2024-12-17 21:53:15 CET
Note M9 only.
Thanks for the patch ref.
Assigning directly to you, David, as you seem to update this routinely.

Assignee: bugsquad => geiger.david68210

Comment 2 Nicolas Salguero 2025-01-10 09:39:29 CET
Suggested advisory:
========================

The updated packages fix a security vulnerability:

Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function. (CVE-2024-29645)

References:
https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VM7ZHZ5AWQKW4RJJZ5LN6TSZLENLQ2GZ/
========================

Updated packages in core/updates_testing:
========================
lib(64)radare2_5.8.8-5.8.8-1.4.mga9
lib(64)radare2-devel-5.8.8-1.4.mga9
radare2-5.8.8-1.4.mga9

from SRPM:
radare2-5.8.8-1.4.mga9.src.rpm

Status: NEW => ASSIGNED
Assignee: geiger.david68210 => qa-bugs
Status comment: Patch available from upstream => (none)

Comment 3 PC LX 2025-01-10 11:48:27 CET
Installed and tested without issues.

Tested using the Cutter GUI.
Tested on multiple binaries.
All looks OK.



System: Mageia 9, x86_64, Plasma DE, AMD Ryzen 5 5600G with Radeon Graphics using amdgpu driver.



$ uname -a
Linux jupiter 6.6.65-desktop-2.mga9 #1 SMP PREEMPT_DYNAMIC Thu Dec 12 12:42:26 UTC 2024 x86_64 GNU/Linux
$ rpm -qa | grep radare2 | sort
lib64radare2_5.8.8-5.8.8-1.4.mga9
radare2-5.8.8-1.4.mga9
radare2-cutter-2.2.1-2.mga9

CC: (none) => mageia

katnatek 2025-01-10 19:46:13 CET

Keywords: (none) => advisory

Comment 4 Herman Viaene 2025-01-11 11:44:03 CET
MGA9-64 Plasma Wayland on Compaq H000SB
No installation issues.
Ref. bug 32521 for testing
$ rabin2 -I  firefox.exe
arch     x86
baddr    0x400000
binsz    517072
bintype  pe
bits     32
canary   true
retguard false
class    PE32
cmp.csum 0x0008c46c
compiled Thu Jun 21 15:53:30 2018
crypto   false
dbg_file c:\builds\moz2_slave\m-esr52-w32-000000000000000000\build\src\obj-firefox\browser\app\firefox.pdb
endian   little
havecode true
hdr.csum 0x0008c46c
guid     CA62060F00F14226994F5C4935BE72192
laddr    0x0
lang     msvc
linenum  false
lsyms    false
machine  i386
nx       true
os       windows
overlay  true
cc       cdecl
pic      true
relocs   false
signed   true
sanitize false
static   false
stripped false
subsys   Windows GUI
va       true

and

$ rax2 0011000011111111d
12543
$ rasm2 ret
c3
$ radare2 firefox.exe
[0x00405eed]> aa
INFO: Analyze all flags starting with sym. and entry0 (aa)
INFO: Analyze all functions arguments/locals (afva@@@F)
[0x00405eed]>  s/ fire
Searching 4 bytes in [0x480e00-0x481000]
hits: 0
Searching 4 bytes in [0x47f000-0x480e00]
hits: 0
Searching 4 bytes in [0x47ea00-0x47f000]
hits: 0
Searching 4 bytes in [0x43d000-0x47ea00]
hits: 0
Searching 4 bytes in [0x43c200-0x43d000]
hits: 0
Searching 4 bytes in [0x43c000-0x43c200]
hits: 0
Searching 4 bytes in [0x43a200-0x43c000]
hits: 0
Searching 4 bytes in [0x43a000-0x43a200]
hits: 0
Searching 4 bytes in [0x439c00-0x43a000]
hits: 0
Searching 4 bytes in [0x422000-0x439c00]
[# ]0x00423028 hit0_0 .MozillaFirefoxfirefox52.9.02018.

Looks OK.

CC: (none) => herman.viaene
Whiteboard: (none) => MGA9-64-OK

Comment 5 Thomas Andrews 2025-01-11 17:25:40 CET
Validating.

Keywords: (none) => validated_update
CC: (none) => andrewsfarm, sysadmin-bugs

Comment 6 Mageia Robot 2025-01-12 07:41:47 CET
An update for this issue has been pushed to the Mageia Updates repository.

https://advisories.mageia.org/MGASA-2025-0006.html

Resolution: (none) => FIXED
Status: ASSIGNED => RESOLVED


Note You need to log in before you can comment on or make changes to this bug.