Your message dated Thu, 25 Apr 2024 14:52:15 +0000 with message-id <e1s00sn-002vfu...@fasolo.debian.org> and subject line Bug#1014478: fixed in radare2 5.9.0+dfsg-1 has caused the Debian Bug report #1014478, regarding radare2: CVE-2022-1714 CVE-2022-1809 CVE-2022-1899 CVE-2022-0849 CVE-2022-1052 CVE-2022-1061 CVE-2022-1207 CVE-2022-1237 CVE-2022-1238 CVE-2022-1240 CVE-2022-1244 CVE-2022-0476 CVE-2022-0518 CVE-2022-0519 CVE-2022-0521 CVE-2022-0523 CVE-2022-0559 CVE-2022-0676 CVE-2022-0695 CVE-2022-0712 CVE-2022-0713 CVE-2022-0139 CVE-2022-0173 CVE-2022-0419 CVE-2022-1031 CVE-2022-1283 CVE-2022-1284 CVE-2022-1296 CVE-2022-1297 CVE-2022-1382 CVE-2022-1444 CVE-2022-1437 CVE-2022-1451 CVE-2022-1452 CVE-2022-1649 CVE-2022-1383 to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what this message is talking about, this may indicate a serious mail system misconfiguration somewhere. Please contact ow...@bugs.debian.org immediately.) -- 1014478: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014478 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems
--- Begin Message ---Source: radare2 X-Debbugs-CC: t...@security.debian.org Severity: grave Tags: security Hi, The following vulnerabilities were published for radare2. CVE-2022-1714[0]: | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 | prior to 5.7.0. The bug causes the program reads data past the end of | the intented buffer. Typically, this can allow attackers to read | sensitive information from other memory locations or cause a crash. https://huntr.dev/bounties/1c22055b-b015-47a8-a57b-4982978751d0 https://github.com/radareorg/radare2/commit/3ecdbf8e21186a9c5a4d3cfa3b1e9fd27045340e CVE-2022-1809[1]: | Access of Uninitialized Pointer in GitHub repository radareorg/radare2 | prior to 5.7.0. https://huntr.dev/bounties/0730a95e-c485-4ff2-9a5d-bb3abfda0b17 https://github.com/radareorg/radare2/commit/919e3ac1a13f753c73e7a8e8d8bb4a143218732d CVE-2022-1899[2]: | Out-of-bounds Read in GitHub repository radareorg/radare2 prior to | 5.7.0. https://huntr.dev/bounties/8a3dc5cb-08b3-4807-82b2-77f08c137a04 https://github.com/radareorg/radare2/commit/193f4fe01d7f626e2ea937450f2e0c4604420e9d CVE-2022-0849[3]: | Use After Free in r_reg_get_name_idx in GitHub repository | radareorg/radare2 prior to 5.6.6. https://huntr.dev/bounties/29c5f76e-5f1f-43ab-a0c8-e31951e407b6 https://github.com/radareorg/radare2/commit/10517e3ff0e609697eb8cde60ec8dc999ee5ea24 CVE-2022-1052[4]: | Heap Buffer Overflow in iterate_chained_fixups in GitHub repository | radareorg/radare2 prior to 5.6.6. https://huntr.dev/bounties/3b3b7f77-ab8d-4de3-999b-eeec0a3eebe7 https://github.com/radareorg/radare2/commit/0052500c1ed5bf8263b26b9fd7773dbdc6f170c4 CVE-2022-1061[5]: | Heap Buffer Overflow in parseDragons in GitHub repository | radareorg/radare2 prior to 5.6.8. https://huntr.dev/bounties/a7546dae-01c5-4fb0-8a8e-c04ea4e9bac7 https://github.com/radareorg/radare2/commit/d4ce40b516ffd70cf2e9e36832d8de139117d522 CVE-2022-1207[6]: | Out-of-bounds read in GitHub repository radareorg/radare2 prior to | 5.6.8. This vulnerability allows attackers to read sensitive | information from outside the allocated buffer boundary. https://huntr.dev/bounties/7b979e76-ae54-4132-b455-0833e45195eb https://github.com/radareorg/radare2/commit/605785b65dd356d46d4487faa41dbf90943b8bc1 CVE-2022-1237[7]: | Improper Validation of Array Index in GitHub repository | radareorg/radare2 prior to 5.6.8. This vulnerability is heap overflow | and may be exploitable. For more general description of heap buffer | overflow, see [CWE](https://cwe.mitre.org/data/definitions/122.html). https://huntr.dev/bounties/ad3c9c4c-76e7-40c8-bd4a-c095acd8bb40 https://github.com/radareorg/radare2/commit/2d782cdaa2112c10b8dd5e7a93c134b2ada9c1a6 CVE-2022-1238[8]: | Heap-based Buffer Overflow in libr/bin/format/ne/ne.c in GitHub | repository radareorg/radare2 prior to 5.6.8. This vulnerability is | heap overflow and may be exploitable. For more general description of | heap buffer overflow, see | [CWE](https://cwe.mitre.org/data/definitions/122.html). https://huntr.dev/bounties/47422cdf-aad2-4405-a6a1-6f63a3a93200 https://github.com/radareorg/radare2/commit/c40a4f9862104ede15d0ba05ccbf805923070778 CVE-2022-1240[9]: | Heap buffer overflow in libr/bin/format/mach0/mach0.c in GitHub | repository radareorg/radare2 prior to 5.8.6. If address sanitizer is | disabled during the compiling, the program should executes into the | `r_str_ncpy` function. Therefore I think it is very likely to be | exploitable. For more general description of heap buffer overflow, see | [CWE](https://cwe.mitre.org/data/definitions/122.html). https://huntr.dev/bounties/e589bd97-4c74-4e79-93b5-0951a281facc https://github.com/radareorg/radare2/commit/ca8d8b39f3e34a4fd943270330b80f1148129de4 CVE-2022-1244[10]: | heap-buffer-overflow in GitHub repository radareorg/radare2 prior to | 5.6.8. This vulnerability is capable of inducing denial of service. https://huntr.dev/bounties/8ae2c61a-2220-47a5-bfe8-fe6d41ab1f82 https://github.com/radareorg/radare2/commit/2b77b277d67ce061ee6ef839e7139ebc2103c1e3 CVE-2022-0476[11]: | Denial of Service in GitHub repository radareorg/radare2 prior to | 5.6.4. https://huntr.dev/bounties/81ddfbda-6c9f-4b69-83ff-85b15141e35d https://github.com/radareorg/radare2/commit/27fe8031782d3a06c3998eaa94354867864f9f1b CVE-2022-0518[12]: | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 | prior to 5.6.2. https://huntr.dev/bounties/10051adf-7ddc-4042-8fd0-8e9e0c5b1184 https://github.com/radareorg/radare2/commit/9650e3c352f675687bf6c6f65ff2c4a3d0e288fa CVE-2022-0519[13]: | Buffer Access with Incorrect Length Value in GitHub repository | radareorg/radare2 prior to 5.6.2. https://huntr.dev/bounties/af85b9e1-d1cf-4c0e-ba12-525b82b7c1e3 https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5 CVE-2022-0521[14]: | Access of Memory Location After End of Buffer in GitHub repository | radareorg/radare2 prior to 5.6.2. https://huntr.dev/bounties/4d436311-bbf1-45a3-8774-bdb666d7f7ca https://github.com/radareorg/radare2/commit/6c4428f018d385fc80a33ecddcb37becea685dd5 CVE-2022-0523[15]: | Expired Pointer Dereference in GitHub repository radareorg/radare2 | prior to 5.6.2. https://huntr.dev/bounties/9d8d6ae0-fe00-40b9-ae1e-b0e8103bac69 https://github.com/radareorg/radare2/commit/35482cb760db10f87a62569e2f8872dbd95e9269 CVE-2022-0559[16]: | Use After Free in GitHub repository radareorg/radare2 prior to 5.6.2. https://huntr.dev/bounties/aa80adb7-e900-44a5-ad05-91f3ccdfc81e https://github.com/radareorg/radare2/commit/b5cb90b28ec71fda3504da04e3cc94a362807f5e CVE-2022-0676[17]: | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 | prior to 5.6.4. https://huntr.dev/bounties/5ad814a1-5dd3-43f4-869b-33b8dab78485 https://github.com/radareorg/radare2/commit/c84b7232626badd075caf3ae29661b609164bac6 CVE-2022-0695[18]: | Denial of Service in GitHub repository radareorg/radare2 prior to | 5.6.4. https://huntr.dev/bounties/bdbddc0e-fb06-4211-a90b-7cbedcee2bea https://github.com/radareorg/radare2/commit/634b886e84a5c568d243e744becc6b3223e089cf CVE-2022-0712[19]: | NULL Pointer Dereference in GitHub repository radareorg/radare2 prior | to 5.6.4. https://huntr.dev/bounties/1e572820-e502-49d1-af0e-81833e2eb466 https://github.com/radareorg/radare2/commit/515e592b9bea0612bc63d8e93239ff35bcf645c7 CVE-2022-0713[20]: | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 | prior to 5.6.4. https://huntr.dev/bounties/d35b3dff-768d-4a09-a742-c18ca8f56d3c https://github.com/radareorg/radare2/commit/a35f89f86ed12161af09330e92e5a213014e46a1 CVE-2022-0139[21]: | Use After Free in GitHub repository radareorg/radare2 prior to 5.6.0. https://huntr.dev/bounties/3dcb6f40-45cd-403b-929f-db123fde32c0/ https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c (5.6.0) CVE-2022-0173[22]: | radare2 is vulnerable to Out-of-bounds Read https://huntr.dev/bounties/727d8600-88bc-4dde-8dea-ee3d192600e5 https://github.com/radareorg/radare2/commit/37897226a1a31f982bfefdc4aeefc2e50355c73c CVE-2022-0419[23]: | NULL Pointer Dereference in GitHub repository radareorg/radare2 prior | to 5.6.0. https://huntr.dev/bounties/1f84e79d-70e7-4b29-8b48-a108f81c89aa https://github.com/radareorg/radare2/commit/feaa4e7f7399c51ee6f52deb84dc3f795b4035d6 (5.6.0) https://census-labs.com/news/2022/05/24/multiple-vulnerabilities-in-radare2/ CVE-2022-1031[24]: | Use After Free in op_is_set_bp in GitHub repository radareorg/radare2 | prior to 5.6.6. https://huntr.dev/bounties/37da2cd6-0b46-4878-a32e-acbfd8f6f457 https://github.com/radareorg/radare2/commit/a7ce29647fcb38386d7439696375e16e093d6acb CVE-2022-1283[25]: | NULL Pointer Dereference in r_bin_ne_get_entrypoints function in | GitHub repository radareorg/radare2 prior to 5.6.8. This vulnerability | allows attackers to cause a denial of service (application crash). https://huntr.dev/bounties/bfeb8fb8-644d-4587-80d4-cb704c404013 https://github.com/radareorg/radare2/commit/18d1d064bf599a255d55f09fca3104776fc34a67 CVE-2022-1284[26]: | heap-use-after-free in GitHub repository radareorg/radare2 prior to | 5.6.8. This vulnerability is capable of inducing denial of service. https://huntr.dev/bounties/e98ad92c-3a64-48fb-84d4-d13afdbcbdd7 https://github.com/radareorg/radare2/commit/64a82e284dddabaeb549228380103b57dead32a6 CVE-2022-1296[27]: | Out-of-bounds read in `r_bin_ne_get_relocs` function in GitHub | repository radareorg/radare2 prior to 5.6.8. This vulnerability may | allow attackers to read sensitive information or cause a crash. https://huntr.dev/bounties/52b57274-0e1a-4d61-ab29-1373b555fea0 https://github.com/radareorg/radare2/commit/153bcdc29f11cd8c90e7d639a7405450f644ddb6 CVE-2022-1297[28]: | Out-of-bounds Read in r_bin_ne_get_entrypoints function in GitHub | repository radareorg/radare2 prior to 5.6.8. This vulnerability may | allow attackers to read sensitive information or cause a crash. https://huntr.dev/bounties/ec538fa4-06c6-4050-a141-f60153ddeaac https://github.com/radareorg/radare2/commit/0a557045476a2969c7079aec9eeb29d02f2809c6 CVE-2022-1382[29]: | NULL Pointer Dereference in GitHub repository radareorg/radare2 prior | to 5.6.8. This vulnerability is capable of making the radare2 crash, | thus affecting the availability of the system. https://huntr.dev/bounties/d8b6d239-6d7b-4783-b26b-5be848c01aa1 https://github.com/radareorg/radare2/commit/48f0ea79f99174fb0a62cb2354e13496ce5b7c44 CVE-2022-1444[30]: | heap-use-after-free in GitHub repository radareorg/radare2 prior to | 5.7.0. This vulnerability is capable of inducing denial of service. https://huntr.dev/bounties/b438a940-f8a4-4872-b030-59bdd1ab72aa https://github.com/radareorg/radare2/commit/14189710859c27981adb4c2c2aed2863c1859ec5 CVE-2022-1437[31]: | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 | prior to 5.7.0. The bug causes the program reads data past the end of | the intented buffer. Typically, this can allow attackers to read | sensitive information from other memory locations or cause a crash. https://huntr.dev/bounties/af6c3e9e-b7df-4d80-b48f-77fdd17b4038 https://github.com/radareorg/radare2/commit/669a404b6d98d5db409a5ebadae4e94b34ef5136 CVE-2022-1451[32]: | Out-of-bounds Read in r_bin_java_constant_value_attr_new function in | GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes the | program reads data past the end 2f the intented buffer. Typically, | this can allow attackers to read sensitive information from other | memory locations or cause a crash. More details see [CWE-125: Out-of- | bounds read](https://cwe.mitre.org/data/definitions/125.html). https://huntr.dev/bounties/229a2e0d-9e5c-402f-9a24-57fa2eb1aaa7 https://github.com/radareorg/radare2/commit/0927ed3ae99444e7b47b84e43118deb10fe37529 CVE-2022-1452[33]: | Out-of-bounds Read in r_bin_java_bootstrap_methods_attr_new function | in GitHub repository radareorg/radare2 prior to 5.7.0. The bug causes | the program reads data past the end 2f the intented buffer. Typically, | this can allow attackers to read sensitive information from other | memory locations or cause a crash. More details see [CWE-125: Out-of- | bounds read](https://cwe.mitre.org/data/definitions/125.html). https://huntr.dev/bounties/c8f4c2de-7d96-4ad4-857a-c099effca2d6 https://github.com/radareorg/radare2/commit/ecc44b6a2f18ee70ac133365de0e509d26d5e168 CVE-2022-1649[34]: | Null pointer dereference in libr/bin/format/mach0/mach0.c in | radareorg/radare2 in GitHub repository radareorg/radare2 prior to | 5.7.0. It is likely to be exploitable. For more general description of | heap buffer overflow, see | [CWE](https://cwe.mitre.org/data/definitions/476.html). https://huntr.dev/bounties/c07e4918-cf86-4d2e-8969-5fb63575b449 https://github.com/radareorg/radare2/commit/a5aafb99c3965259c84ddcf45a91144bf7eb4cf1 CVE-2022-1383[35]: | Heap-based Buffer Overflow in GitHub repository radareorg/radare2 | prior to 5.6.8. The bug causes the program reads data past the end of | the intented buffer. Typically, this can allow attackers to read | sensitive information from other memory locations or cause a crash. https://huntr.dev/bounties/02b4b563-b946-4343-9092-38d1c5cd60c9 https://github.com/radareorg/radare2/commit/1dd65336f0f0c351d6ea853efcf73cf9c0030862 If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2022-1714 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1714 [1] https://security-tracker.debian.org/tracker/CVE-2022-1809 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1809 [2] https://security-tracker.debian.org/tracker/CVE-2022-1899 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1899 [3] https://security-tracker.debian.org/tracker/CVE-2022-0849 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0849 [4] https://security-tracker.debian.org/tracker/CVE-2022-1052 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1052 [5] https://security-tracker.debian.org/tracker/CVE-2022-1061 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1061 [6] https://security-tracker.debian.org/tracker/CVE-2022-1207 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1207 [7] https://security-tracker.debian.org/tracker/CVE-2022-1237 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1237 [8] https://security-tracker.debian.org/tracker/CVE-2022-1238 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1238 [9] https://security-tracker.debian.org/tracker/CVE-2022-1240 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1240 [10] https://security-tracker.debian.org/tracker/CVE-2022-1244 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1244 [11] https://security-tracker.debian.org/tracker/CVE-2022-0476 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0476 [12] https://security-tracker.debian.org/tracker/CVE-2022-0518 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0518 [13] https://security-tracker.debian.org/tracker/CVE-2022-0519 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0519 [14] https://security-tracker.debian.org/tracker/CVE-2022-0521 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0521 [15] https://security-tracker.debian.org/tracker/CVE-2022-0523 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0523 [16] https://security-tracker.debian.org/tracker/CVE-2022-0559 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0559 [17] https://security-tracker.debian.org/tracker/CVE-2022-0676 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0676 [18] https://security-tracker.debian.org/tracker/CVE-2022-0695 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0695 [19] https://security-tracker.debian.org/tracker/CVE-2022-0712 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0712 [20] https://security-tracker.debian.org/tracker/CVE-2022-0713 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0713 [21] https://security-tracker.debian.org/tracker/CVE-2022-0139 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0139 [22] https://security-tracker.debian.org/tracker/CVE-2022-0173 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0173 [23] https://security-tracker.debian.org/tracker/CVE-2022-0419 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0419 [24] https://security-tracker.debian.org/tracker/CVE-2022-1031 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1031 [25] https://security-tracker.debian.org/tracker/CVE-2022-1283 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1283 [26] https://security-tracker.debian.org/tracker/CVE-2022-1284 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1284 [27] https://security-tracker.debian.org/tracker/CVE-2022-1296 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1296 [28] https://security-tracker.debian.org/tracker/CVE-2022-1297 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1297 [29] https://security-tracker.debian.org/tracker/CVE-2022-1382 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1382 [30] https://security-tracker.debian.org/tracker/CVE-2022-1444 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1444 [31] https://security-tracker.debian.org/tracker/CVE-2022-1437 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1437 [32] https://security-tracker.debian.org/tracker/CVE-2022-1451 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1451 [33] https://security-tracker.debian.org/tracker/CVE-2022-1452 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1452 [34] https://security-tracker.debian.org/tracker/CVE-2022-1649 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1649 [35] https://security-tracker.debian.org/tracker/CVE-2022-1383 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1383 Please adjust the affected versions in the BTS as needed.
--- End Message ---
--- Begin Message ---Source: radare2 Source-Version: 5.9.0+dfsg-1 Done: Alex Myczko <t...@debian.org> We believe that the bug you reported is fixed in the latest version of radare2, which is due to be installed in the Debian FTP archive. A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to 1014...@bugs.debian.org, and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Alex Myczko <t...@debian.org> (supplier of updated radare2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing ftpmas...@ftp-master.debian.org) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Format: 1.8 Date: Thu, 25 Apr 2024 15:46:50 +0200 Source: radare2 Architecture: source Version: 5.9.0+dfsg-1 Distribution: unstable Urgency: medium Maintainer: Debian Security Tools <team+pkg-secur...@tracker.debian.org> Changed-By: Alex Myczko <t...@debian.org> Closes: 950372 1014478 1014490 1016979 1027144 1029037 1032667 1034180 1034862 1051898 1054908 1055854 1056930 1060127 Changes: radare2 (5.9.0+dfsg-1) unstable; urgency=medium . * New upstream version. (Closes: #1034862, #1060127, #950372) (Closes: #1056930) (CVE-2023-47016) (Closes: #1032667) (CVE-2023-27114) (Closes: #1055854) (CVE-2023-5686) (Closes: #1054908) (CVE-2023-46570) (CVE-2023-46569) (Closes: #1051898) (CVE-2023-4322) (Closes: #1034180) (CVE-2023-1605) (Closes: #1029037) (CVE-2023-0302) (Closes: #1027144) (CVE-2022-4398) (Closes: #1016979) (CVE-2022-34502) (CVE-2022-34520) (Closes: #1014490) (CVE-2021-44975) (CVE-2021-44974) (CVE-2021-4021) (Closes: #1014478) (CVE-2022-1714 CVE-2022-1809 CVE-2022-1899 CVE-2022-0849 CVE-2022-1052 CVE-2022-1061 CVE-2022-1207 CVE-2022-1237 CVE-2022-1238 CVE-2022-1240 CVE-2022-1244 CVE-2022-0476 CVE-2022-0518 CVE-2022-0519 CVE-2022-0521 CVE-2022-0523 CVE-2022-0559 CVE-2022-0676 CVE-2022-0695 CVE-2022-0712 CVE-2022-0713 CVE-2022-0139 CVE-2022-0173 CVE-2022-0419 CVE-2022-1031 CVE-2022-1283 CVE-2022-1284 CVE-2022-1296 CVE-2022-1297 CVE-2022-1382 CVE-2022-1444 CVE-2022-1437 CVE-2022-1451 CVE-2022-1452 CVE-2022-1649 CVE-2022-1383) Checksums-Sha1: 6aaf46d1cd2d740cc4129753d4bee1f84b50c740 2424 radare2_5.9.0+dfsg-1.dsc fd7a9ff7105bd15f313182c8c02496f9f47ac78e 7248984 radare2_5.9.0+dfsg.orig.tar.xz 6b9d0e7d6d3e892bc8f9924abc2f89c681cd75a3 17232 radare2_5.9.0+dfsg-1.debian.tar.xz 4f936e002d5b6662f8f3699bc5f9f87444f76bc5 8546 radare2_5.9.0+dfsg-1_source.buildinfo Checksums-Sha256: d54adc2144a010999089f5c309adb46c8a64a9a8a35571975f7fd840e9066c47 2424 radare2_5.9.0+dfsg-1.dsc 02932c7eabc63878b4ab6375e7e6603ef84dcb9c6352c351919021d3d2c89765 7248984 radare2_5.9.0+dfsg.orig.tar.xz cb2ac3cc22c084bec7c2ba24e9474f71ccd1861e62d4c82224deb3ed98c06b6f 17232 radare2_5.9.0+dfsg-1.debian.tar.xz 327a2bec8c87c421c892a5967d85e2ccd3c7c428347d8d638b2197b73124ee24 8546 radare2_5.9.0+dfsg-1_source.buildinfo Files: ac7b3678ec07629d7005825fe0f2eab8 2424 devel optional radare2_5.9.0+dfsg-1.dsc c67ae12ae0b3a6497aababa89862d8ae 7248984 devel optional radare2_5.9.0+dfsg.orig.tar.xz 5f5218a3ce37466455be75e9b4b1d00a 17232 devel optional radare2_5.9.0+dfsg-1.debian.tar.xz 1666f9e10e4e76ea65f27c812677bb57 8546 devel optional radare2_5.9.0+dfsg-1_source.buildinfo -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEtgob82PcExn/Co6JEWhSvN91FcAFAmYqYygACgkQEWhSvN91 FcD8KxAAjBu59z1TyLPQI4YhzT48O8bUPZ0Va9l+TrFaQZ0Cdwr1Es6QOxtM8BL+ B6c0DyRX/3oqpjdtgkGUm+/vrrgHXXQNWbb/ue56a3R1hrnadJdTqM7DmyaBrlTX aNAWcIWEodHMysUU+d4JFnwCj/YmsCDFpakqVkT+YZB23I0agOB/Tr0yySI6vPSK OUdGKKzS5aB6+tRd9MnbSS0dFeHpvovBY4jkxXG8BJO6Cqv4jjP1SapcXGTqfl9Y QJDfpFT9xkCVN1DyOCmXN7jMATPRr0xbeiM5Pf/1VRnic/s6feE78MGs14HGISlT RSCEbwTHuREI58SYSv4YtBuJRrEMcFylaZT5la3eX/dp4uc6KggcPhw0csVPxLwi YxQZU7mxqb84G2+CFM2jBDCrq7yffivAVt+DZ8CVKFhJ7o3hRhVDKNT2lT9cwPDt lqL4C0Ije1wq8ldYTe7YL3c8BWwh4pxzOgppTMWRN1KdF6gDwdz/JTjYeIUywhSe lzCGuIGOvw4NFavC/2rDr3hYkuKMHTIRwFswI7vyJlg29n5eMlKZX+plEP+G5aNN a1rDrZyD+aNV1eqjFinRPrqI1eSekBizzT3mBSow8I4jv6A36GxLk/flmcbuvozH 3E9aCxmjork1cAwr9vzfxQY9cnk3Y99gAo+3GsVIbtfE7Me8fMI= =ZgBH -----END PGP SIGNATURE-----pgpm4vNLRssry.pgp
Description: PGP signature
--- End Message ---