Your message dated Thu, 25 Apr 2024 14:52:15 +0000
with message-id <e1s00sn-002vfu...@fasolo.debian.org>
and subject line Bug#1014478: fixed in radare2 5.9.0+dfsg-1
has caused the Debian Bug report #1014478,
regarding radare2: CVE-2022-1714 CVE-2022-1809 CVE-2022-1899 CVE-2022-0849 
CVE-2022-1052 CVE-2022-1061 CVE-2022-1207 CVE-2022-1237 CVE-2022-1238 
CVE-2022-1240 CVE-2022-1244 CVE-2022-0476 CVE-2022-0518 CVE-2022-0519 
CVE-2022-0521 CVE-2022-0523 CVE-2022-0559 CVE-2022-0676 CVE-2022-0695 
CVE-2022-0712 CVE-2022-0713 CVE-2022-0139 CVE-2022-0173 CVE-2022-0419 
CVE-2022-1031 CVE-2022-1283 CVE-2022-1284 CVE-2022-1296 CVE-2022-1297 
CVE-2022-1382 CVE-2022-1444 CVE-2022-1437 CVE-2022-1451 CVE-2022-1452 
CVE-2022-1649 CVE-2022-1383
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1014478: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: radare2
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for radare2.

CVE-2022-1714[0]:
| Heap-based Buffer Overflow in GitHub repository radareorg/radare2
| prior to 5.7.0. The bug causes the program reads data past the end of
| the intented buffer. Typically, this can allow attackers to read
| sensitive information from other memory locations or cause a crash.

https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0
https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e

CVE-2022-1809[1]:
| Access of Uninitialized Pointer in GitHub repository radareorg/radare2
| prior to 5.7.0.

https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17
https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d

CVE-2022-1899[2]:
| Out-of-bounds Read in GitHub repository radareorg/radare2 prior to
| 5.7.0.

https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04
https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d

CVE-2022-0849[3]:
| Use After Free in r_reg_get_name_idx in GitHub repository
| radareorg/radare2 prior to 5.6.6.

https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6
https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24

CVE-2022-1052[4]:
| Heap Buffer Overflow in iterate_chained_fixups in GitHub repository
| radareorg/radare2 prior to 5.6.6.

https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7
https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4

CVE-2022-1061[5]:
| Heap Buffer Overflow in parseDragons in GitHub repository
| radareorg/radare2 prior to 5.6.8.

https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7
https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522

CVE-2022-1207[6]:
| Out-of-bounds read in GitHub repository radareorg/radare2 prior to
| 5.6.8. This vulnerability allows attackers to read sensitive
| information from outside the allocated buffer boundary.

https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb
https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1

CVE-2022-1237[7]:
| Improper Validation of Array Index in GitHub repository
| radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow
| and may be exploitable. For more general description of heap buffer
| overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html).

https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40
https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6

CVE-2022-1238[8]:
| Heap-based Buffer Overflow in libr/bin/format/ne/ne.c in GitHub
| repository radareorg/radare2 prior to 5.6.8. This vulnerability is
| heap overflow and may be exploitable. For more general description of
| heap buffer overflow, see
| [CWE](https://cwe.mitre.org/data/definitions/122.html).

https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200
https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778

CVE-2022-1240[9]:
| Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub
| repository radareorg/radare2 prior to 5.8.6. If address sanitizer is
| disabled during the compiling, the program should executes into the
| `r_str_ncpy` function. Therefore I think it is very likely to be
| exploitable. For more general description of heap buffer overflow, see
| [CWE](https://cwe.mitre.org/data/definitions/122.html).

https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc
https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4

CVE-2022-1244[10]:
| heap-buffer-overflow in GitHub repository radareorg/radare2 prior to
| 5.6.8. This vulnerability is capable of inducing denial of service.

https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82
https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3

CVE-2022-0476[11]:
| Denial of Service in GitHub repository radareorg/radare2 prior to
| 5.6.4.

https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d
https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b

CVE-2022-0518[12]:
| Heap-based Buffer Overflow in GitHub repository radareorg/radare2
| prior to 5.6.2.

https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184
https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa

CVE-2022-0519[13]:
| Buffer Access with Incorrect Length Value in GitHub repository
| radareorg/radare2 prior to 5.6.2.

https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3
https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5

CVE-2022-0521[14]:
| Access of Memory Location After End of Buffer in GitHub repository
| radareorg/radare2 prior to 5.6.2.

https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca
https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5

CVE-2022-0523[15]:
| Expired Pointer Dereference in GitHub repository radareorg/radare2
| prior to 5.6.2.

https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69
https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269

CVE-2022-0559[16]:
| Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2.

https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e
https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e

CVE-2022-0676[17]:
| Heap-based Buffer Overflow in GitHub repository radareorg/radare2
| prior to 5.6.4.

https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485
https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6

CVE-2022-0695[18]:
| Denial of Service in GitHub repository radareorg/radare2 prior to
| 5.6.4.

https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea
https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf

CVE-2022-0712[19]:
| NULL Pointer Dereference in GitHub repository radareorg/radare2 prior
| to 5.6.4.

https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466
https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7

CVE-2022-0713[20]:
| Heap-based Buffer Overflow in GitHub repository radareorg/radare2
| prior to 5.6.4.

https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c
https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1

CVE-2022-0139[21]:
| Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0.

https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0/
https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c
 (5.6.0)

CVE-2022-0173[22]:
| radare2 is vulnerable to Out-of-bounds Read

https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5
https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c

CVE-2022-0419[23]:
| NULL Pointer Dereference in GitHub repository radareorg/radare2 prior
| to 5.6.0.

https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa
https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6
 (5.6.0)
https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/

CVE-2022-1031[24]:
| Use After Free in op_is_set_bp in GitHub repository radareorg/radare2
| prior to 5.6.6.

https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457
https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb

CVE-2022-1283[25]:
| NULL Pointer Dereference in r_bin_ne_get_entrypoints function in
| GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability
| allows attackers to cause a denial of service (application crash).

https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013
https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67

CVE-2022-1284[26]:
| heap-use-after-free in GitHub repository radareorg/radare2 prior to
| 5.6.8. This vulnerability is capable of inducing denial of service.

https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7
https://github.com/radareorg/radare2/commit/64a82e284dddabaeb549228380103b57dead32a6

CVE-2022-1296[27]:
| Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub
| repository radareorg/radare2 prior to 5.6.8. This vulnerability may
| allow attackers to read sensitive information or cause a crash.

https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0
https://github.com/radareorg/radare2/commit/153bcdc29f11cd8c90e7d639a7405450f644ddb6

CVE-2022-1297[28]:
| Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub
| repository radareorg/radare2 prior to 5.6.8. This vulnerability may
| allow attackers to read sensitive information or cause a crash.

https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac
https://github.com/radareorg/radare2/commit/0a557045476a2969c7079aec9eeb29d02f2809c6

CVE-2022-1382[29]:
| NULL Pointer Dereference in GitHub repository radareorg/radare2 prior
| to 5.6.8. This vulnerability is capable of making the radare2 crash,
| thus affecting the availability of the system.

https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1
https://github.com/radareorg/radare2/commit/48f0ea79f99174fb0a62cb2354e13496ce5b7c44

CVE-2022-1444[30]:
| heap-use-after-free in GitHub repository radareorg/radare2 prior to
| 5.7.0. This vulnerability is capable of inducing denial of service.

https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa
https://github.com/radareorg/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5

CVE-2022-1437[31]:
| Heap-based Buffer Overflow in GitHub repository radareorg/radare2
| prior to 5.7.0. The bug causes the program reads data past the end of
| the intented buffer. Typically, this can allow attackers to read
| sensitive information from other memory locations or cause a crash.

https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038
https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136

CVE-2022-1451[32]:
| Out-of-bounds Read in r_bin_java_constant_value_attr_new function in
| GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the
| program reads data past the end 2f the intented buffer. Typically,
| this can allow attackers to read sensitive information from other
| memory locations or cause a crash. More details see [CWE-125: Out-of-
| bounds read](https://cwe.mitre.org/data/definitions/125.html).

https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7
https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529

CVE-2022-1452[33]:
| Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function
| in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes
| the program reads data past the end 2f the intented buffer. Typically,
| this can allow attackers to read sensitive information from other
| memory locations or cause a crash. More details see [CWE-125: Out-of-
| bounds read](https://cwe.mitre.org/data/definitions/125.html).

https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6
https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168

CVE-2022-1649[34]:
| Null pointer dereference in libr/bin/format/mach0/mach0.c in
| radareorg/radare2 in GitHub repository radareorg/radare2 prior to
| 5.7.0. It is likely to be exploitable. For more general description of
| heap buffer overflow, see
| [CWE](https://cwe.mitre.org/data/definitions/476.html).

https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449
https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1

CVE-2022-1383[35]:
| Heap-based Buffer Overflow in GitHub repository radareorg/radare2
| prior to 5.6.8. The bug causes the program reads data past the end of
| the intented buffer. Typically, this can allow attackers to read
| sensitive information from other memory locations or cause a crash.

https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9
https://github.com/radareorg/radare2/commit/1dd65336f0f0c351d6ea853efcf73cf9c0030862

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-1714
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1714
[1] https://security-tracker.debian.org/tracker/CVE-2022-1809
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1809
[2] https://security-tracker.debian.org/tracker/CVE-2022-1899
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1899
[3] https://security-tracker.debian.org/tracker/CVE-2022-0849
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0849
[4] https://security-tracker.debian.org/tracker/CVE-2022-1052
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1052
[5] https://security-tracker.debian.org/tracker/CVE-2022-1061
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1061
[6] https://security-tracker.debian.org/tracker/CVE-2022-1207
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1207
[7] https://security-tracker.debian.org/tracker/CVE-2022-1237
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1237
[8] https://security-tracker.debian.org/tracker/CVE-2022-1238
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1238
[9] https://security-tracker.debian.org/tracker/CVE-2022-1240
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1240
[10] https://security-tracker.debian.org/tracker/CVE-2022-1244
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1244
[11] https://security-tracker.debian.org/tracker/CVE-2022-0476
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0476
[12] https://security-tracker.debian.org/tracker/CVE-2022-0518
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0518
[13] https://security-tracker.debian.org/tracker/CVE-2022-0519
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0519
[14] https://security-tracker.debian.org/tracker/CVE-2022-0521
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0521
[15] https://security-tracker.debian.org/tracker/CVE-2022-0523
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0523
[16] https://security-tracker.debian.org/tracker/CVE-2022-0559
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0559
[17] https://security-tracker.debian.org/tracker/CVE-2022-0676
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0676
[18] https://security-tracker.debian.org/tracker/CVE-2022-0695
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0695
[19] https://security-tracker.debian.org/tracker/CVE-2022-0712
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0712
[20] https://security-tracker.debian.org/tracker/CVE-2022-0713
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0713
[21] https://security-tracker.debian.org/tracker/CVE-2022-0139
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0139
[22] https://security-tracker.debian.org/tracker/CVE-2022-0173
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0173
[23] https://security-tracker.debian.org/tracker/CVE-2022-0419
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0419
[24] https://security-tracker.debian.org/tracker/CVE-2022-1031
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1031
[25] https://security-tracker.debian.org/tracker/CVE-2022-1283
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1283
[26] https://security-tracker.debian.org/tracker/CVE-2022-1284
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1284
[27] https://security-tracker.debian.org/tracker/CVE-2022-1296
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1296
[28] https://security-tracker.debian.org/tracker/CVE-2022-1297
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1297
[29] https://security-tracker.debian.org/tracker/CVE-2022-1382
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1382
[30] https://security-tracker.debian.org/tracker/CVE-2022-1444
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1444
[31] https://security-tracker.debian.org/tracker/CVE-2022-1437
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1437
[32] https://security-tracker.debian.org/tracker/CVE-2022-1451
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1451
[33] https://security-tracker.debian.org/tracker/CVE-2022-1452
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1452
[34] https://security-tracker.debian.org/tracker/CVE-2022-1649
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1649
[35] https://security-tracker.debian.org/tracker/CVE-2022-1383
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1383

Please adjust the affected versions in the BTS as needed.

--- End Message ---
--- Begin Message ---
Source: radare2
Source-Version: 5.9.0+dfsg-1
Done: Alex Myczko <t...@debian.org>

We believe that the bug you reported is fixed in the latest version of
radare2, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1014...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alex Myczko <t...@debian.org> (supplier of updated radare2 package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 25 Apr 2024 15:46:50 +0200
Source: radare2
Architecture: source
Version: 5.9.0+dfsg-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Security Tools <team+pkg-secur...@tracker.debian.org>
Changed-By: Alex Myczko <t...@debian.org>
Closes: 950372 1014478 1014490 1016979 1027144 1029037 1032667 1034180 1034862 
1051898 1054908 1055854 1056930 1060127
Changes:
 radare2 (5.9.0+dfsg-1) unstable; urgency=medium
 .
   * New upstream version. (Closes: #1034862, #1060127, #950372)
     (Closes: #1056930) (CVE-2023-47016)
     (Closes: #1032667) (CVE-2023-27114)
     (Closes: #1055854) (CVE-2023-5686)
     (Closes: #1054908) (CVE-2023-46570) (CVE-2023-46569)
     (Closes: #1051898) (CVE-2023-4322)
     (Closes: #1034180) (CVE-2023-1605)
     (Closes: #1029037) (CVE-2023-0302)
     (Closes: #1027144) (CVE-2022-4398)
     (Closes: #1016979) (CVE-2022-34502) (CVE-2022-34520)
     (Closes: #1014490) (CVE-2021-44975) (CVE-2021-44974) (CVE-2021-4021)
     (Closes: #1014478) (CVE-2022-1714 CVE-2022-1809 CVE-2022-1899 CVE-2022-0849
                         CVE-2022-1052 CVE-2022-1061 CVE-2022-1207 CVE-2022-1237
                         CVE-2022-1238 CVE-2022-1240 CVE-2022-1244 CVE-2022-0476
                         CVE-2022-0518 CVE-2022-0519 CVE-2022-0521 CVE-2022-0523
                         CVE-2022-0559 CVE-2022-0676 CVE-2022-0695 CVE-2022-0712
                         CVE-2022-0713 CVE-2022-0139 CVE-2022-0173 CVE-2022-0419
                         CVE-2022-1031 CVE-2022-1283 CVE-2022-1284 CVE-2022-1296
                         CVE-2022-1297 CVE-2022-1382 CVE-2022-1444 CVE-2022-1437
                         CVE-2022-1451 CVE-2022-1452 CVE-2022-1649 
CVE-2022-1383)
Checksums-Sha1:
 6aaf46d1cd2d740cc4129753d4bee1f84b50c740 2424 radare2_5.9.0+dfsg-1.dsc
 fd7a9ff7105bd15f313182c8c02496f9f47ac78e 7248984 radare2_5.9.0+dfsg.orig.tar.xz
 6b9d0e7d6d3e892bc8f9924abc2f89c681cd75a3 17232 
radare2_5.9.0+dfsg-1.debian.tar.xz
 4f936e002d5b6662f8f3699bc5f9f87444f76bc5 8546 
radare2_5.9.0+dfsg-1_source.buildinfo
Checksums-Sha256:
 d54adc2144a010999089f5c309adb46c8a64a9a8a35571975f7fd840e9066c47 2424 
radare2_5.9.0+dfsg-1.dsc
 02932c7eabc63878b4ab6375e7e6603ef84dcb9c6352c351919021d3d2c89765 7248984 
radare2_5.9.0+dfsg.orig.tar.xz
 cb2ac3cc22c084bec7c2ba24e9474f71ccd1861e62d4c82224deb3ed98c06b6f 17232 
radare2_5.9.0+dfsg-1.debian.tar.xz
 327a2bec8c87c421c892a5967d85e2ccd3c7c428347d8d638b2197b73124ee24 8546 
radare2_5.9.0+dfsg-1_source.buildinfo
Files:
 ac7b3678ec07629d7005825fe0f2eab8 2424 devel optional radare2_5.9.0+dfsg-1.dsc
 c67ae12ae0b3a6497aababa89862d8ae 7248984 devel optional 
radare2_5.9.0+dfsg.orig.tar.xz
 5f5218a3ce37466455be75e9b4b1d00a 17232 devel optional 
radare2_5.9.0+dfsg-1.debian.tar.xz
 1666f9e10e4e76ea65f27c812677bb57 8546 devel optional 
radare2_5.9.0+dfsg-1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=ZgBH
-----END PGP SIGNATURE-----

Attachment: pgpm4vNLRssry.pgp
Description: PGP signature


--- End Message ---

Reply via email to