--------------------------------------------------------------------------------
Fedora EPEL Update Notification
FEDORA-EPEL-2019-6459239aba
2019-07-19 00:31:53.451068
--------------------------------------------------------------------------------
Name : radare2
Product : Fedora EPEL 7
Version : 3.6.0
Release : 1.el7
URL :
https://radare.org/
Summary : The reverse engineering framework
Description :
The radare2 is a reverse-engineering framework that is multi-architecture,
multi-platform, and highly scriptable. Radare2 provides a hexadecimal
editor, wrapped I/O, file system support, debugger support, diffing
between two functions or binaries, and code analysis at opcode,
basic block, and function levels.
--------------------------------------------------------------------------------
Update Information:
Rebase to upstream version 3.6.0 and fix CVE-2019-12865, CVE-2019-12790,
CVE-2019-12802
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1725677 - CVE-2019-12865 radare2: double free in cmd_mount in
libr/core/cmd_mount.c [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1725677
[ 2 ] Bug #1723356 - CVE-2019-12790 radare2: heap-based buffer over-read in function
r_egg_lang_parsechar in egg_lang.c [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1723356
[ 3 ] Bug #1722736 - CVE-2019-12802 radare2: denial of service in function rcc_context
in /libr/egg/egg_lang.c [epel-7]
https://bugzilla.redhat.com/show_bug.cgi?id=1722736
--------------------------------------------------------------------------------
This update can be installed with the "yum" update programs. Use
su -c 'yum update radare2' at the command line.
For more information, refer to "YUM", available at
https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7\
/html/System_Administrators_Guide/ch-yum.html
All packages are signed with the Fedora EPEL GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------