Bug 1213168 (CVE-2021-32495) - VUL-0: CVE-2021-32495: radare2: Use after free vulnerability in pyc parser's get_none_object function
Summary: VUL-0: CVE-2021-32495: radare2: Use after free vulnerability in pyc parser's ...
Status: RESOLVED FIXED
Alias: CVE-2021-32495
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P5 - None : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/371582/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2023-07-10 06:37 UTC by Thomas Leroy
Modified: 2023-07-10 13:01 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Thomas Leroy 2023-07-10 06:37:39 UTC
CVE-2021-32495

Radare2 has a use-after-free vulnerability in pyc parser's get_none_object
function. Attacker can read freed memory afterwards. This will allow attackers
to cause denial of service.



References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32495
https://bugzilla.redhat.com/show_bug.cgi?id=2221284
https://www.cve.org/CVERecord?id=CVE-2021-32495
https://github.com/radareorg/radare2/issues/18666
https://github.com/radareorg/radare2/commit/5e16e2d1c9fe245e4c17005d779fde91ec0b9c05
Comment 1 Thomas Leroy 2023-07-10 06:37:59 UTC
Factory and Backports codestreams already fixed. Closing