-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2024-e7c0a0d876 2024-11-09 00:57:22.589812 -------------------------------------------------------------------------------- Name : radare2 Product : Fedora 39 Version : 5.9.6 Release : 1.fc39 URL : https://radare.org/ Summary : The reverse engineering framework Description : The radare2 is a reverse-engineering framework that is multi-architecture, multi-platform, and highly scriptable. Radare2 provides a hexadecimal editor, wrapped I/O, file system support, debugger support, diffing between two functions or binaries, and code analysis at opcode, basic block, and function levels. -------------------------------------------------------------------------------- Update Information: fix CVE-2024-48241 -------------------------------------------------------------------------------- ChangeLog: * Wed Oct 16 2024 Michal Ambroz <rebus@xxxxxxxxx> - 5.9.6-1 - bump to 5.9.6 -------------------------------------------------------------------------------- References: [ 1 ] Bug #2318484 - iaito-5.9.6 is available https://bugzilla.redhat.com/show_bug.cgi?id=2318484 [ 2 ] Bug #2319076 - radare2-5.9.6 is available https://bugzilla.redhat.com/show_bug.cgi?id=2319076 [ 3 ] Bug #2322791 - CVE-2024-48241 radare2: OOB write via __bf_div function may lead to denial of service [epel-8] https://bugzilla.redhat.com/show_bug.cgi?id=2322791 [ 4 ] Bug #2322792 - CVE-2024-48241 radare2: OOB write via __bf_div function may lead to denial of service [epel-9] https://bugzilla.redhat.com/show_bug.cgi?id=2322792 [ 5 ] Bug #2322793 - CVE-2024-48241 radare2: OOB write via __bf_div function may lead to denial of service [fedora-39] https://bugzilla.redhat.com/show_bug.cgi?id=2322793 [ 6 ] Bug #2322794 - CVE-2024-48241 radare2: OOB write via __bf_div function may lead to denial of service [fedora-40] https://bugzilla.redhat.com/show_bug.cgi?id=2322794 [ 7 ] Bug #2322795 - CVE-2024-48241 radare2: OOB write via __bf_div function may lead to denial of service [fedora-41] https://bugzilla.redhat.com/show_bug.cgi?id=2322795 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2024-e7c0a0d876' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- -- _______________________________________________ package-announce mailing list -- package-announce@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to package-announce-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@xxxxxxxxxxxxxxxxxxxxxxx Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue