Fedora 30 update for cutter-re, radare2



| Updated: 2025-04-25
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2019-12790
CVE-2019-12802
CVE-2019-12865
CWE-ID CWE-125
CWE-119
CWE-415
Exploitation vector Network
Public exploit N/A
Vulnerable software
Fedora
Operating systems & Components / Operating system

radare2
Operating systems & Components / Operating system package or component

cutter-re
Operating systems & Components / Operating system package or component

Vendor Fedoraproject

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Out-of-bounds read

EUVDB-ID: #VU33387

Risk: Medium

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2019-12790

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in In radare2 through 3.5.1, there is a heap-based buffer over-read in the r_egg_lang_parsechar function of egg_lang.c. This. A remote attacker can perform a denial of service (application crash) or possibly have unspecified other impact because of missing length validation in libr/egg/egg.c.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 30

radare2: before 3.6.0-1.fc30

cutter-re: before 1.8.3-1.fc30

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2019-2a16e1ab93


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Buffer overflow

EUVDB-ID: #VU33388

Risk: Low

CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2019-12802

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local non-authenticated attacker to execute arbitrary code.

In radare2 through 3.5.1, the rcc_context function of libr/egg/egg_lang.c mishandles changing context. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact (invalid memory access in r_egg_lang_parsechar; invalid free in rcc_pusharg).

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 30

radare2: before 3.6.0-1.fc30

cutter-re: before 1.8.3-1.fc30

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2019-2a16e1ab93


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Double Free

EUVDB-ID: #VU32998

Risk: Medium

CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2019-12865

CWE-ID: CWE-415 - Double Free

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attacl.

The vulnerability exists due to a boundary error in the cmd_mount() function in libr/core/cmd_mount.c when processing "ms" command. A remote authenticated user can pass specially crafted data to the application, trigger double free error and crash the service.

Mitigation

Install updates from vendor's repository.

Vulnerable software versions

Fedora: 30

radare2: before 3.6.0-1.fc30

cutter-re: before 1.8.3-1.fc30

CPE2.3 External links

https://bodhi.fedoraproject.org/updates/FEDORA-2019-2a16e1ab93


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###